Well, clearly this is a credible source, even has it’s own substack domain, what could possibly be suss?
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
Well, clearly this is a credible source, even has it’s own substack domain, what could possibly be suss?
Bruce Perens is currently working on a new licensing model called Post Open requiring that business with sufficient revenue to pay up.
In my opinion it’s criminal just how often this happens. Big business making obscene profit off the back of volunteer work like yours and many others across the OSS community.
Is it just me who is sceptical about anything new from Intel at the moment?
Mind you, this is not the first time that this feeling has existed, there was a standing joke amongst IT professionals in the mid 1990s that the sticker “Intel Inside” was actually a warning label, referencing the Pentium FDIV bug.
Paywalled , or so horribly broken that you cannot scroll past the first page using Firefox Focus on Android.
And many of them are heading to BlueSky…
My first recommendation is to become familiar with one flavour of Linux. Debian is a solid choice and it will give you a good understanding of how a great many derivatives operate.
The command line is a tool to get things done, it’s not an end to itself. Some things are easier to do with a GUI, many things are easier to do with the command line interface or CLI.
Many Linux tools are tiny things that take an input, process it and produce an output. You can string these commands together to achieve things that are complex with a GUI.
Manipulation of text is a big part of this. Converting things, extracting or filtering data, counting words
For example, how many times do you use the words “just” and “simply” in the articles you write?
grep -oiwE "just|simple" *.txt | sort | uniq -c
That checks all the text files in a directory for the occurrence of either word and shows you how many occurred and what capitalisation they used.
In other words, learning to use the CLI is about solving problems, one by one, until you don’t have to look things up before you understand why or how it works.
I understand your point. I’m not sure that you understood mine.
Let’s say that we do as you say. To issue the signature, the Government would need to verify your identity, which as you point out, they already can. Here’s the kicker. After verification, the signature is now linked to those same details in their systems. This makes them a massive target. One that they are ill-equiped to deal with.
That’s why I am not a fan of this idea.
Do you really trust a Government to keep your data secure?
How is such a card anything other than a universal identification card, which can then be stored by all and sundry as “proof”, right until one of them gets hacked and your card needs replacing … everywhere.
I think I’ll pass.
A bank should not need to store your passport and driving licence after you’ve opened the account.
It should never have to phone you to verify your identity.
It should not use a random mobile phone number to send an SMS request to confirm a credit card transaction.
Each of those things are security theatre and actually make the whole system less secure.
As for 2FA, it should not be SMS based and it should be when you login, not when you transfer funds between your own accounts as the OP mentioned.
It’s interesting that you’re getting downvoted. There’s plenty of evidence that things are getting worse in this field, not the least of it caused by ignorant policymakers who are hellbent on protecting their arse by being seen to be doing something, anything.
Then there’s the ambulance chasers who amplify the fear factor up to eleven just so they can justify their retainers.
Finally, there’s Microsoft who in my opinion shows the whole world, time and again, how not to do security whilst all the while preaching to its victims, uh, customers, what “best practice” looks like, whilst chanting"Do as I say, not as I do".
Security is about education above all else. The vast majority of breaches start by social engineering, getting a target to inadvertently install something or reveal something that gives an attacker a toehold into a system. It might be an unexpected PDF, a clicked link, a weak password, or personal information retrieved from someone who has no business storing your passport and driving licence on a system.
If you’re not a programmer, then what you’re saying sounds reasonable, but if you are, it’s not.
Different operating systems use different ways to interact with the outside world, in fact, it’s pretty much the only thing an operating system does.
Consider for example responding to a mouse click.
Each operating system handles this differently, sometimes within the same OS it’s different depending on what else is happening, (Linux X11 vs Linux Wayland).
A mouse is pretty trivial on the face of it, but the operating system needs to be able to track each pulse from a mouse and respond to that and then it needs to tell your program about it. In other words, it needs to interrupt your program, deal with the pulse, update the relevant information, then resume your program.
The same is true for the screen, disk storage, keyboard, memory and even the CPU itself.
Even if the various operating systems use the same CPU, and these days they mostly don’t, running the same program in multiple places is extremely rare, and that’s for companies who have the source code to the software they sell.
Some programs are more universal, because they’re written in a language like python that’s compiled when you launch it, but dig inside and you’ll find code specific to each operating system.
Source: I’ve been writing software for over 40 years.
I’d set-up a static website on an AWS S3 bucket. Then you can use AWS Cloudfront to distribute access around the planet.
Cost is mostly negligible unless you are serving big files.
Yeah, no.
That’s covered by political activity in the same laws. The list of exemptions here is pretty broad and goes well beyond actual officially registered political parties.
Here’s the list for the Australian Privacy Laws: https://www.alrc.gov.au/publication/for-your-information-australian-privacy-law-and-practice-alrc-report-108/41-political-exemption/exemption-for-registered-political-parties-political-acts-and-practices/
And here’s the restrictions around spam: https://www.acma.gov.au/political-calls-emails-and-text-messages
In Australia laws like what you describe exist, but political parties are exempt. I doubt that we’re the only country where that is the case.
There is not enough information in your post to help you. Here’s a preliminary list of questions that need an answer before anyone can give you a meaningful contribution.
Where did you get “Davinci resolve” from?
What instructions were you following to install it?
Did the installation finish?
Have you attempted to login using a text console?
Which version of Kubuntu were you using and which version of “Davinci resolve” were you attempting to install.
I use Docker and (currently) VMware and host whatever I need for as long (or short) as I need it.
This allows me to keep everything separate and isolated and prevents incompatible stuff interacting with each other. In addition, after I’m done with a test, I can dispose of the experiment without needing to track down spurious files or impacting another project.
I also use this to run desktop software by only giving a container access to the specific files I want it to access.
I’m in the process of moving this to AWS, so I have less hardware in my office whilst gaining more flexibility and accessibility from alternative locations.
The ultimate aim is a minimal laptop with a terminal and a browser to access what I need from wherever I am.
One side effect of this will be the opportunity to make some of my stuff public if I want to without needing to start from scratch, just updating permissions will achieve that.
One step at a time :)
Seems to me that they’re giving you ample incentive to migrate to another supplier.
You could use a cron job to grep through the file and reformat the output into a webpage, markdown, or plain-text file.