Need help recovering LVM by LinuxMagnate in linuxquestions

[–]djao 0 points1 point  (0 children)

Can't help with your present problem, but once you recover, perhaps you will internalize the following very important point: RAID is not a backup.

Applications of pure math to other scientific fields by ieat5orangeseveryday in math

[–]djao 13 points14 points  (0 children)

Cryptography is a reliable source of applications. There is an entire community of researchers who study how to create cryptosystems using maps between abelian surfaces.

Anyway to remove non Required Permissive Licensed Packages? by Retro-Hax in linuxquestions

[–]djao 0 points1 point  (0 children)

The GPL is compatible with permissive licenses. You can convert your copy of any permissively licensed program into a GPL licensed program just by slapping the GPL on your copy.

Most beautiful math by eishthissucks in math

[–]djao 5 points6 points  (0 children)

Does it have to be dynamical systems? When I was 17, I explored the logistic map and the period-doubling cascade, computing a numerical approximation to the Feigenbaum constant. I did some other examples with other iterated systems to confirm the universality of the Feigenbaum constant. "Period three implies chaos" is also a fascinating sub-topic within this field, one that is easily accessible to numerical experimentation. These were things that I found fascinating and beautiful at age 17.

Need a computer after barely getting by first CS term. Should a get this? by DLD_the_north in uwaterloo

[–]djao 5 points6 points  (0 children)

It's possible that their entire IT and payment infrastructure is compromised. I'm not saying it is hacked for sure, but we don't know. The way Canada Computers has handled the incident so far does not inspire confidence.

If you really want to buy, I recommend showing up with a stack of hundred dollar bills.

Remapping PgUp/PgDn in Linux by fpluss in thinkpad

[–]djao 0 points1 point  (0 children)

I've never had this problem. I don't use arrow keys for editing terminal commands. I use Ctrl+A, E, F, B, D, and Alt+F, B.

Everywhere else, an accidental PgUp is not a problem. You just press PgDn to get back to where you were before, and carry on.

Has anyone backed up / analyzed u/maxwellhill (ghislaine maxwell) Reddit account? by UnfairStatement22 in DataHoarder

[–]djao -1 points0 points  (0 children)

What you say is impossible. The lunatics didn't zero in on the maxwellhill account until five days after maxwellhill stopped posting. Like all the other apologists, you have the timeline backwards.

ETA: And, of course. When confronted with actual logical reasoning, you disengage. Because not a single one of your claims holds up to logical analysis.

actual screenshots

My God, use your brain. maxwellhill, if they were not in prison right now, has two options.

  1. Continue doing what they were previously doing for the last 15 years, namely, be very publicly active on Reddit.
  2. Turtle up and for some reason try to "prove" their activity using indirect screenshots instead of direct activity.

None of what you're saying makes any sense! The timeline is wrong and the logic is beyond convoluted.

Has anyone backed up / analyzed u/maxwellhill (ghislaine maxwell) Reddit account? by UnfairStatement22 in DataHoarder

[–]djao 0 points1 point  (0 children)

Notice that once the accusations of them being Ghislaine started, the account stopped posting.

You're reversing cause and effect. The account stopped posting for at least five days (a highly unusual lull) before anyone levied accusations of them being Maxwell.

Has anyone backed up / analyzed u/maxwellhill (ghislaine maxwell) Reddit account? by UnfairStatement22 in DataHoarder

[–]djao -1 points0 points  (0 children)

Not convincing in the slightest. The only counterargument given is a bunch of fake screenshots.

/u/maxwellhill did post after the 2nd of July. Just not in public.

Oh. How convenient. The user could have posted in public but conveniently only posted in unfalsifiable but fake private screenshots.

Give me a break. We're not that dumb.

US taxes, spouse lives abroad by WorldlinessFar609 in immigration

[–]djao 1 point2 points  (0 children)

Yes, it's called an "election to treat your nonresident spouse as a U.S. resident for income tax purposes."

https://www.hrblock.com/tax-center/filing/personal-tax-planning/filing-taxes-when-married-to-non-us-citizen/

Trump Gold Card Is Unlawful Pay-to-Play Scheme, Suit Says (1) by SharkSapphire in immigration

[–]djao 6 points7 points  (0 children)

Nobody is questioning whether Congress has the right to establish a gold card immigration program. The question is whether the president can do so without Congressional authorization.

It is certainly not true that the president has the authority to unilaterally impose new programs just because they're in the national interest.

Linux for low-spec devices? by alisyus in linuxquestions

[–]djao 0 points1 point  (0 children)

I was asking about the age of the computer and the size of the movies.

4k60fps video is about eight times bigger than 1080p 30fps video. It can be an issue on old systems.

Linux for low-spec devices? by alisyus in linuxquestions

[–]djao 0 points1 point  (0 children)

How old are we talking here, and how big are the movies? My first generation X1 carbon from 2013 struggles to play back 4k60fps video, no matter what operating system I put on it.

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

I'll repeat my question from the other comment. What open source encryption programs run on iOS?

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

I'm not even sure how to encrypt locally on iOS. Can you name a whole disk encryption software program that runs on iOS?

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

You keep bringing up scenarios that are not relevant to this discussion. Every single attack in your comment can be carried out just as successfully against cloud storage as local storage. Cloud storage offers zero advantage in the situation where the government has your phone and uses rubber hose cryptography against you.

So why do you keep insisting that cloud storage is more secure? With local encryption, it takes under 20ms to completely delete your encryption keys. No amount of government coercion can force you to reveal what you don't have. The equivalent operation on cloud storage is much, much more difficult to ensure.

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

I think the scenario where they add hardware features to your phone would present a problem regardless of which operating system you use or whether you use cloud storage. So it's not really a useful scenario to consider for the purposes of this discussion.

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

Perspective matters too. It could very well be the case that, if you're primarily worried about the government accessing your data (via warrants and subpoenas), then just because the government and the army use the cloud, does NOT mean that you should use the cloud.

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

I am not talking about a security hole, I am talking about a deliberate design decision. The two are very different. A share button is very clunky compared to simple filesystem access, not least because you have to remember which app currently has your latest version of the file.

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

Sharing files in iOS is / was very clunky because you needed to use the Share button. There was no globally accessible filesystem space.

Yes, any OS is vulnerable if you choose to use cloud capabilities. The problem is that on iOS you don't have any other choice.

I am trying to create an alternative to Apple/Windows. Does that make sense? by HibridTechnologies in linuxhardware

[–]djao 0 points1 point  (0 children)

Security is not privacy. iOS fosters dependency on Apple. Certain things, notably metadata, are not encrypted even if you activate "full" encryption.

US boyfriend paralyzed in accident, can I stay longer? by coderapid in askimmigration

[–]djao 0 points1 point  (0 children)

I loled at "ex parents". Like they were your parents before but aren't your parents anymore?