Another option is to use a filesystem such as btrfs or zfs which stores checksums in metadata, then use the included tools to verify file integrity and identify bit rot.
https://btrfs.readthedocs.io/en/latest/btrfs-scrub.html
https://openzfs.github.io/openzfs-docs/man/8/zpool-scrub.8.html
If in doubt about the brilliance of this phone, have a watch of these videos by engineer behind this phone:
Copy-pasting the central chunk of the article for those of us too lazy to click the link:
Since a truce was declared in Tigray three weeks ago, about 2,000 trucks should have been able to bring food, medicines and other essentials to the conflict-ridden area, he said during a virtual press briefing from Geneva on Wednesday. Instead, only about 20 trucks had arrived, he said.
“As we speak, people are dying of starvation,” said Tedros, a former health minister in Ethiopia and an ethnic Tigrayan. “This is one of the longest and worst sieges by both Eritrean and Ethiopian forces in modern history.”
He acknowledged that the war in Ukraine was globally significant, but asked whether other crises were being accorded enough attention.
“I need to be blunt and honest that the world is not treating the human race the same way,” he said. “Some are more equal than others.”
Tedros described the situation in Tigray as tragic and said he “hopes the world comes back to its senses and treats all human life equally”.
He also criticised the media’s failure to document atrocities in Ethiopia, noting that people had been burned alive. “I don’t even know if that was taken seriously by the media,” he said.
Security is a really good point. If you’re not running any screen lock then not a consideration.
Some ways to remedy the problem:
exec startx
instead of just startx
[…] The researchers discovered that even if individual users turned off data tracking and didn’t share their own information, their mobility patterns could still be predicted with surprising accuracy based on data collected from their acquaintances.
“Worse,” says Ghoshal, “almost as much latent information can be extracted from perfect strangers that the individual tends to co-locate with.”
In many (most?) jurisdictions it is illegal to make a recording of a conversation either which you are not party to, or without consent of all parties involved; sometimes with consideration towards whether there was reasonable expectation that the conversation be private. Even when legal, there are often restrictions on how that recording can be used.
The laws aren’t always written specific to audio/video recording (not that always-recording by google/apple/amazon/etc isn’t a problem already…) – how does such surveillance figure in to existing legislation around the world?
“The tech executive turned data justice warrior is celebrated as a truth-telling hero, but there’s something a bit too smooth about this narrative arc.” – Maria Farrell, March 5, 2020
You don’t build a conclusion for a technology based on sweeping aside risks of your favoured solution while emphasising the risks of your favoured solution, which is what you did with your “There are zero catastrophes with[…]” comment.
You lay it all out and compare the whole model.
I think laying it all out for wind, solar, hydro, and nuclear, will raise a whole lot of issues with all the technologies. Some specific models of tech will have unresolvable issues (e.g, megadams, dense solar-farms on arable land, any nuclear tech which can feed proliferation).
I suspect the whole supply/waste-chain for nuclear will have unresolvable issues, and very few of the hydro/solar will have unresolvable issues.
Trouble is getting people to agree on how to compare the risk of a well-engineered dam failing and the risk of your nuclear waste storage leaking into the water table, or a contaminated coolant pipe spraying vapour into the prevailing wind, or radioactive contaminated scrap metal making its way into the commercial steel market, or…
Anyone suggesting the thorium-pebble-bed or similar “holy-grail” 100% safe theoretical tech seems to be living between fantasy and pipe-dream.
I only mean it’s a false claim to imply that wind/water/solar energy are inherently zero catastrophe risk.
That said, I think coming close to fully understanding and assessing (and mitigating) the risk of wind/water/solar power projects/economies is far more achievable than for nuclear energy projects/economies.
Especially so when considering the unavoidable context of the (un)predictability of both humans and environment over the next 10,000 - 100,000 years.
There are zero catastrophes with wind, water or earth energy because when you shut it down, it is off and possess no further potential to harm people.
Turn the hyperbole down a little:
Not many results contain signal Search only for dessalines why "signal"?
) gives a clue that not
has a special interpretation and that the parsing algorithm is very confused about what it’s being told to do.Tinfoil hat or Hanlon’s razor? :-P
I tried a couple more:
…looks like DDG has an undocumented NOT operator, which for some reason is not deactivated when in a long quote, but is deactivated when the phrase is bracketed in quoted nothings. “” “”
But still doesn’t quite explain how "why not signal" dessalines
does return a result.
“regex is hard”, I guess.
Here’s an interesting snippet from the article regarding matrix’s efforts to be interoperable with existing protocols:
We could run the bridge somewhere relatively safe - e.g. the user’s client. There’s a bunch of work going on already in Matrix to run clientside bridges, so that your laptop or phone effectively maintains a connection over to iMessage or WhatsApp or whatever as if it were logged in… but then relays the messages into Matrix once re-encrypted. By decentralising the bridges and spreading them around the internet, you avoid them becoming a single honeypot that bad actors might look to attack: instead it becomes more a question of endpoint compromise (which is already a risk today).
Not wasting any timber here!