i knew i was forgetting something
i knew i was forgetting something
Except solar. And wind. And hydro.


The design is very human.
I’ve no idea, never really had an ultrawide.
I used to be a dual monitor user, but nowadays I’m using a single large monitor because I had to rearrange some things in my work room. For work a single monitor is fine, but I’m also doing some Twitch streaming, and multiplayer gaming, and for that I actually am now thinking of going back to two monitors.
The other important thing for me personally is resolution. If I’m working with text, 4k is absolutely necessary, for gaming UHD is fine.
Monitor arms do help with desk space a lot. However, you should also keep in mind that you will need some clearance behind the deck for the “elbow” of the arm.
The other option to save space is a shelf stand, which raises your monitor a little above the table and allows you to store something under it.
I think the basic premise of this question, that Windows and Linux somehow have a different foundational security model that is or isn’t based on passwords, is not really true. Passwords play more or less the same role for any modern operating system – be it Linux, MacOS, Android, iOS, etc.
The only major difference is that instead of UAC, Linux has a variety of options (sudo, policykit, run0), which are implemented differently across different distributions. If your privileged user doesn’t have a password, in some cases this could lead to any program being able to elevate their privilege quietly, unlike UAC.
However, in many distributions you can set up a user with a password and enable passwordless local login, which would be almost equivalent to windows with no password.
Answering your question directly, the major threat to most consumer users is physical compromise or theft of device. Your statement that “physical access is game over” is not entirely accurate: disk encryption with a password is a very strong protection against unauthorized data access, but you need to use a password (doesn’t matter if it’s Linux or Windows).
I guess it was Zachariah’s joke that you didn’t get :)


It’s that a T5 on the right? I used to have one of those.
The blog is authored by someone called Ollie Williams, this is what I meant.
I’m not sure how much this matters seeing as it works in all browsers regardless, but use of <style> inside the <body> is technically invalid according to the HTML specification.
What a bizzare statement to put your name next to.


I agree with other comments here, but, to be honest, this year has been really good! Expedition 33, Silksong, Hades, The Alters, Nightreign, Blue Prince, Dispatch, to name just a few.
Think about it this way: you’re downloading someone else’s code and running it on your system. The OS doesn’t care: it will give it access to everything your user has access to, but won’t give access to anything else.
So (under the caveat below) the software won’t be able to mess with your system because your user generally can’t mess with your system. However, you still need to trust the software, since it will be able to access e.g. your saved passwords, SSH keys, install a keylogger, etc. In comparison, the binary packages can be seen as safer, because they have more “eyes” on them, and there is more time between the code being published and you running that code on your system.
Caveat: if you run something like sudo make install, then, of course the risk is way higher, and the package definitely will be able to mess with your system up to and including destroying it.
Micah’s talks are always worth
Can you modify the script to release the lock after the process has started?


At least train drivers in Japan can read.
This is not entirely correct. Many distributions do enable encryption by default. Also, encrypting the /boot partition does not guarantee the integrity of the boot sequence, you need to enable and correctly configure Secure Boot for that.
Not even a good Terminal film.