• 1 Post
  • 106 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle



  • The article also mentions that Israel has started using it in their own propaganda videos. showing the triangle over targets as they’re hit, and when you flip it like that there’s a very clear implication of destroying the symbol of freedom… Which is to say, I still fail to see your ultimate point. You’re just pointing at the news article and saying “SEE! THEY SAY ITS BAD!”

    Could you provide some actual argumentation to go with that?

    And just so it doesnt seem like I’m running, “Targeting reticle” would imply a weapon optic or similar, hence my confusion. “using it to mark targets” would have been clearer.







  • MetaCubed@lemmy.worldtoMemes@lemmy.mlThe worst place in the galaxy
    link
    fedilink
    arrow-up
    18
    arrow-down
    2
    ·
    2 months ago

    Well… “They’re all” is kinda rhetorical shorthand, but the vast, vast majority of Israeli citizens are colonizers definitionally, just like how “all” north Americans are colonizers (obviously except indigenous people). The difference is that the USA/Canadian settler colonial projects have already “”“succeeded”“”.



  • A. Care to provide any evidence for your “gender is a mental disorder” point? Even a little?

    B. No one actually cuts a penis off, just FYI

    C. Its not uncommom for Cis teenage girls get breast reduction surgery, or even implants. Do you have issue with this? Or do you only have an issue when it’s trans men getting a mastectomy?

    D. Why you gotta be weird dude? I guarantee you’ve interacted with at least a handful of trans people in your life and were genuinely clueless about it. (I’m pre-empting the “we can always tell”)

    Edit: didnt notice he’s banned. Leaving it anyway.


  • I did it with Debian 12 bookworm. I’m working on getting the web interface accessible externally, as it’s bound to local host only by default.

    Theres 2 steps where you need to watch for noob traps if you plan on using Debian, one in particular being where the link to Rustup is contained within the command block, you need to navigate there in your web browser to grab the rustup install script before you run the commands. If you hit a wall, feel free to message me and I may be able to help!


  • Just about to get the web interface running!

    The build from source is actually incredibly straightforward! There’s a few noob issues if you don’t fully read the command blocks included in the instructions (They have some links you need to navigate to to install dependencies) but beyond that, for how large everything is, I’m very surprised how easy they make it! If it was difficult last time you tried, I’d give it another shot!






  • Not to jump at you in another comment thread, but any OS that is deployed in a business environment should have some form of endpoint protection installed unless it is fully airgapped + isolated.

    Despite the myth that “Linux doesn’t get malware”, it absolutely does and should have protection installed. Even if the OS itself was immune to infection, any possible update can introduce a vulnerability to that.

    Additionally, again, even if the OS (or kernel in the case of linux) couldn’t be infected or attacked, the packages or services installed can be attacked, infected, or otherwise messed with and should be protected.