

The PC itself as in hardware? Hardly… Your data is at risk. So ignoring updates for both Mint and Windows will put you at a more vulnerable position from a security standpoint.
The PC itself as in hardware? Hardly… Your data is at risk. So ignoring updates for both Mint and Windows will put you at a more vulnerable position from a security standpoint.
If you are asking if not updating Windows will make your Mint system insecure, the answer is no. At least to me an exploit leveraging an unmounted Windows partition is unheard of. It will of course make your Windows system less secure for the 2% of the time you do use it. Another side effect of updating it is that it may break your dual booting.
While another comment covered the matter of security updates, another point that is safer about repositories is the security of the binary and the transaction. Meaning, the place you get your software from and how this transference is accomplished are also security sensitive.
When you get the software from a repository, you typically have some assurance that (a) the binary you are getting was compiled from the source that is published (b) the source from which you are downloading is known and trusted © the method through which you are transferring is somewhat secure (e.g. TLS) (d) the changes made were inspected by at least one more independent party (depends on the repository’s policies).
Repositories will also have criteria for inclusion, which can bar you from software you want, but still could also mean software with bad security practices never reached you to begin with. Being included in the repository might also mean it’s up to more scrutiny, as it may be removed depending on what security events happen in the future.
Say that instead we were to get the software directly from the original source. How will this source transfer the software to you? If they publish it on a website, that adds one more attack surface where, if an attacker tampers with files, hashes and/or links, you are now no longer getting it from the source. Say instead you get it from a Git forge such as e.g. GitHub. Is the binary being built form source in CI? Or is it uploaded manually? Does it provide a hash? How can we know the manually uploaded binary, even if it has a hash, was compiled from the publicly available source? There is no trusted, independent third party involved to confirm that.
I can think of a few other reasons unrelated to security, such as repositories, particularly distro/OS-specific repositories but not only them, will tailor the software to your OS, resolve dependencies for you and add niceties such as init system integration, shell completions, man pages and sample configuration that is specific to your OS.
If you see yourself facing this often, you can also use a browser extension to make it easier to see the post you are at in your instance.
For Firefox and derivatives, the simplest one is Lemmy Link, which places a Lemmy icon next to links such as the sibebar’s !community link in the instructions for logged out users to find the community in their own instance. It has not been updated in two years, but still works.
Another option is Kbin Link, which does the same thing and has seen recent updates but tends to trigger “this extension is slowing down…” notifications.
A third one I found is Instance Assistant, which instead adds a “Find in my home instance” button to the sidebar. It does have some additional features, but I couldn’t get them to work. This one is also available for Chromium-based browsers.
basically I never follow any feed (be it Mastodon, RSS, Lemmy, newsletters, whatever) that is too high volume. If something is sending too much content I’ll just unsubscribe/unfollow. So for instance Lemmy communities for news are soo overwhelming, I’d rather sign up for a newsletter with a selection of five or so important news for the day.
Yeah, sorry! I realized that after sending the comment, but I guess I was too late to delete it. I’d also like to find a Mastodon app that does that
deleted by creator
Wow! Congrats on doing this. This community keeps impressing me, sure one of the most impressive OC stuff I’ve found on Lemmy.
It’s built against the latest version and kept up to date with it, so you should be fine. The only extension I had an issue with was KeePassXC, but because it communicates with an application outside the browser. I had to symlink a single directory and now everything works just the same.
Surprised this hasn’t been picked up yet, is it still available? I’ll gladly take it if so
I think you really miss the point. It’s as if your suggestion that romanization methods have imperfections dismisses the actual reasons why people will refuse to make the effort to learn how to pronounce a name from a language other than their own, which go far beyond whether or not the spelling “makes sense”.
The comic gives a very concrete example of that. It wouldn’t matter if the letters exactly mapped to a perfect pronunciation, the mere fact it does not roll of the tongue, i.e. “sounds foreign”, coupled with the underlying xenophobia+racism combo is what’s at work there.
I use PDF Arranger a lot for that
aaaa thank you so much!!! 💜
I switched recently from neomutt to aerc and yes, if you want less complicated configuration, it’s a great pick. I find it less buggy and just best designed overall.
I never tried Gmail or Exchange on it, but this should have some helpful info on that: https://man.sr.ht/~rjarry/aerc/providers/
it’s really cool how in your art I sense simultaneous struggle against technocracy and a sense of empathy for sentient machines and their potential for freedom
oh my it makes even less sense than I figured
My guess is it starts on top left, then moves right, then goes down all the way to bottom right, and comes full circle to the left and back up.
So “doesn’t make you look any better making me look bad”.
It’s the only thing left after I’ve reduced my tab bar to a row of favicons.
Not so much what’s preventing, but how hard it is to get away with it.
Whatever closed-source software is doing on your system, there is no way to know to begin with, what it is that it is doing. You can only look at the outer effects it has, but you can’t examine it much. So even if a closed system is doing all sorts of things, as long as it’s stealthy enough, there would be no consequences at all.
This is the very opposite is what you get with FOSS, not to mention the difference on how software is developed, built, distributed and managed in unix systems compared to proprietary ones.