

I’ll take one. Feel free to DM me.
I’ll take one. Feel free to DM me.
No country has a significantly larger population than any other. The difference is only how out they are and thus how easy it is to find out they are LGBTQ+. Countries that allow trans people to use their actual gender on their travel documents, for example, are more likely to be detained or deported as the US no longer recognizes actual gender as a valid identifying trait for travel document purposes. It must list a marker for genitals at birth or genitals chosen by the parent at birth for intersex people. And those with X or similar non-binary markers may not be accepted at all since that’s not a recognized valid marker in the US anymore. And it’s difficult to prove that your genitals at birth were what they are now and the same as your gender marker on your passport. Genitals at birth is not an identifying trait for an adult, but that’s what the US expects. Gender is barely an identifying trait, but is slightly more relevant in some cases at least than how you looked as a baby. So if the marker doesn’t match their expectation, then they could consider that as being deceptive based on your appearance or behavior and thus reason to deny entry or detain or deport. And being detained in a for profit US immigration prison could result in abuse and death. Especially for trans people put in the wrong gender section of a prison.
Calgon, take me away…
please!
If you want to keep your LDAP as the source of truth, then Keycloak is also a very good option. I did that originally, but decided I only had a couple of things needing LDAP and that wasn’t worth keeping it around. Authentik was a good way to emulate an LDAP but with a different back end. But Keycloak is definitely my recommendation in your case.
Keycloak. Took me a bit to learn the basics, but it has been way easier to troubleshoot than Authentik and has more features. If you need something that mimics LDAP rather than syncing with an existing LDAP, then Authentik is pretty good. I don’t use LDAP, though.
With lots of free condoms this time…and so hopefully less AIDS.
Most could, but most are also designed not to because adding a virtualization type of layer allows for ways to circumvent it. Anticheat needs to trust the environment it is running in so it can rely on the information. Wine is designed to replicate things it trusts in Windows, but not actually necessarily replicate the way the kernel actually does those things, so the things they are relying on might not mean the same thing as the do in Windows. So they’d need to analyze and possibly implement things a bit differently. This takes time and money and for companies like this, the customer isn’t the user, so they have little reason to cater to users needs. Pro gaming and a few online game companies are their primary customers and they generally don’t want to support Linux anyway.
Usually it uses your IP address first, bit it’s not the only information in cases where the IP address is a known VPN or similar. Are you saying you were tunneling over TOR the first time?
When you switched to VPN you didn’t mention what browser. If it’s one that supports advertising IDs, that could be used, for example.
And when you connected to copilot did you get a captcha popup? If so, did you have to actually solve a captcha or click a button? If not, then it likely is getting information from somewhere that you are trustworthy.
Clear all browser data, make sure enhanced tracking protection is not disabled for the site. Go to a site that tells your IP address and verify it’s the Tor endpoint to verify the setup there is correct. Then try again.
Also, assuming you’re not clicking through any popups to allow tracking info or logging in to any accounts on this browser beforehand. If you log into a Microsoft account or any other account for a site that Microsoft gets info from first, it can use those logins to track you. You can disable this in the browser, but so many sites will break without it.
Nope it doesn’t add anything for me. The _netdev option tells mount to wait until the network is connected before attempting to mount. And the nofail option tells it not to error or block the process that called it if the mount doesn’t work or is delayed.
Now if the mount contains your etc or other critical config files, it could cause problems and maybe you want to wait, so don’t want the nofail. And of course this kind of thing is somewhat OS specific depending on what boot system and service manager, etc., is used, so YMMV, but on Fedora, Rocky, and Ubuntu, it has worked for me for many years.
But it’s “just business”. You can’t blame them. That’s the get out of jail free card, often literally.
/s
Try adding the nofail and _netdev options in your fstab entry. I have this on a few computers that connect to nfs shares including my laptop that obviously can only connect when I’m at home or on VPN. Example:
server:/path /mnt/path nfs4 defaults,nofail,_netdev 0 0
I haven’t used OpenSUSE before, but I don’t really experience those issues, though I don’t use caps lock that way. I use Fedora with Plasma for desktop these days since Ubuntu is heading too corporate for my taste and plain Debian is missing too much hardware support. I’m sure Fedora will eventually, too, but I also use Rocky on all of my server installs so I prefer RHEL-based over Debian-based, for consistency anyway. Install and setup has always been smooth for me. The Discover app is there for installing stuff. It lags a lot, but otherwise makes installing things pretty easy. I’m sure there must be an equivalent for OpenSUSE. That said, Linux does rely on the command line a lot more than windows. In Windows the command line is bolted on, but in Linux it’s more that the GUI is bolted on, though that has smoothed quite a bit and even on Windows the v7 powershell has smoothed out command line a little bit even if powershell commands aren’t that intuitive IMHO. At least this version understands some dos formatted commands. I use Windows 11 for work.
I never used Twitter really because Facebook filled that need and more. I might eventually go to Friendica, or at least have considered it. Basically, at the time, I was looking for two kinds of communication/conversation. One topic based and one user based. The user based side has two parts, friends and content producers. Since i don’t have many friends on the fediverse, that side isn’t as easy to fulfill. Lemmy covers the topic based, and Mastodon covers the user based for content producers well. If I get more friends converted, I’d probably be more interested in Friendica.
Primarily Lemmy and Mastodon to replace Reddit and Facebook respectively. Those are the only social media platforms I used extensively, really, anyway. And I’m hosting a Mobilizon instance to replace the lost event organizing of Facebook that moved to chat rooms on Signal for now.
I use Arthurian legend related stuff. Servers and desktops are locations. My portable devices are the names of swords. IoT devices are more explicitly descriptive since I won’t need to type in, but it’s more important to recognize them when I see them, like lightswitch-livingroom.
If the Apple security decision in the UK is anything to go by as well as the Trump administration in the US pushing hard for government backdoors in cloud storage and messaging apps, which has been asked for for a long time but didn’t have much chance of getting past court oversight in the US until the Supreme Court was so corrupted, then likely this is going to be a way that governments can enforce the idea of having encrypted data transmissions to keep data out of the hands of foreign hackers, but still have corporate backdoors that allow governments to access the unencrypted data. That’s exactly what the UK said the Apple thing was supposed to help with. Of course data is only as secure as the weakest link and corporations are often much easier targets than individual users anyway. So it has the same result, but it appeases the majority who don’t get it.
This is what I use.
And this is the latest sync server that doesn’t rely on discontinued versions of Python: https://github.com/mozilla-services/syncstorage-rs/. It’s not a full, plug and play solution, and it doesn’t support PostgreSql so I haven’t set it up in my self hosted environment yet, but plan to eventually.
Yes IronFox is a fork of Mull, and though it does have a couple of differences in opinion on the balance of privacy and usability, it’s very similar. I’ve been using it since shortly after we lost Mull.
Generally the key fobs have a circuit and antenna inside and the circuit has a code that it broadcasts when it is near the transceiver. Some systems are more complex, but at the lowest level the system disrupts a magnetic field around the transceiver in a certain way to generate the code or is powered up by the transceiver and transmits the code using that power. That way no battery is required and it can fit inside a thin card or fob. Some older ones have a very small battery to increase range or create a more complex or modifiable code or for proximity use rather than touch.
That code is then authorized or not to open the door in the security system. And yes every time the fob is used, it is logged. And depending on if the fob has a battery, it is possible it tracks leaving. If they don’t have to touch the fob to a panel and just need to have it on them, then it logs any time they approach the door regardless of entering or leaving. If it requires touching or bringing it close to a panel and they don’t have to do that when leaving then it probably doesn’t log them by proximity.
Whether or not the log has the person’s name or just the code or ID of the fob depends on how old or cheap the system is. But there’s definitely some document somewhere that lists the peoples’ names and which fob they were assigned if it’s not in the system. So it’s easy enough to find out.
Any system that has the same code in every fob would be either super old or super cheap and unlikely to be used on secure doors. Having unique codes means that if a fob is lost or stolen it can be deactivated among other things. Which is a no-brainer for security if there is no real significant cost. The only reason older systems didn’t is because the tech couldn’t create long enough codes on the circuits that existed. And super cheap systems don’t want to create too many different codes since it’s cheaper to mass produce the same one over and over. Basically why car fobs can often open other people’s cars. Either they’re old or the car company’s too cheap and it’s not their security at risk, so they don’t care.