![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
haha nice. I’ll try that next time
haha nice. I’ll try that next time
gotcha, thanks for clarifying :)
“NOPE” as in “not a dark pattern” or as in “I’m not touching this site”? if former, can you clarify on the reason?
can you clarify on the 7?
thanks for confirming my suspicion. as for your question, conda in general is good for installing non-python binaries when needed, and managing env. I don’t use anaconda but it provides a good enough interface for beginners and folks without much coding experience. It’s usually the easiest to use that than other variants for them, or the python route of setting up environments
If you’ve never worked before, this can be considered practice runs for the when you do.
Like one of the other commentors said, assume everything is accessible by Google and/or your university (and later, your boss, company, organization, …).
And not just you, but the people who interact with you through it. So that means you may be able to put up defenses, but if they don’t (and they most likely do not), the data that you interact with them would likely be accessible as well.
So here are some potential suggestions to minimize private-data access by Google/university while still being able to work with others (adjust things depending on your threat model of course):
I’m also curious. A quick search came up with these. Not sure which one is most reliable/updated
Many things are called “AI models” nowadays (unfortunately due to the hype). I wouldn’t dismiss the tools and methodology yet.
That said, the article (or the researchers) did a disservice to the analysis by not including a link to the report (and code) that outlines the methodology and how the distribution of similarities look. I couldn’t find a link in the article and a quick search didn’t turn up anything.
you should try to ask the same question using xAI / Grok if possible. May also ask ChatGPT about Altman as well
Based on this reddit comment, that website is not affiliated with the magic-wormhole
CLI tool
re 1: out of curiosity, do you encounter dnsleaks when using wireguard?
re 4: you can also check out https://starship.rs/, which helps configure shell prompt very intuitively with a toml file.
As much as I despise snap, this instance bring some questions into how other popular cross-linux platform app stores like flathub and nix-channels/packages provide guardrails against malwares.
I’m aware flathub has a “verified” checks for packages from the same maintainers/developers, but I’m unsure about nix-channels. Even then, flathub packages are not reviewed by anyone, are they?
Not related to warp, but just out of curiosity, which protocols have you tried? In one or two univs I visited, I had to switch to TCP instead UDP for it to work. Not sure why.
Others have mentioned using interactive tools like zoxide
to easily get to frequently visited directories.
In addition, I also use nnn
(https://github.com/jarun/nnn), which is a terminal file manager that you can navigate through. You can create shortcuts, snippets and bookmarks with this. I use this and zoxide
+ fzf
regularly on CLI to navigate.
Some here also mention ranger
, which is another terminal file manager. In my limited experience with ranger
, I feel like the start up time is much slower than nnn
; but I haven’t tried much. Tho with ranger
+ graphic-accelerated terminals like kitty
, I believe you can preview images and files, which seems to be a great feature. So it depends on your need.
a follow might be: Do the people know better vote? Can they?
to add on to this, cheat with some similar functions to tldr but also allows editing and writing one’s one cheat sheet
omg that is lovely. Kinda like https://regex101.com/ for regular expressions.
lol I know it’s a GUI. I asked not to be snarky but to know whether functionally they do the same thing, so I/people who have used the CLI can evaluate whether we miss anything when using that command.
what’s the difference between flatsweep and using flatpak uninstall —unused —delete-data
?
thanks for clarifying! that’s really helpful!