asap

joined 2 years ago
[–] asap 10 points 4 months ago (3 children)

I'm running ProtonVPN on Bluefin from a flatpak with zero issues.

[–] asap 5 points 4 months ago* (last edited 4 months ago) (15 children)

I would love if someone could answer this with quick examples. What exactly are people watching on YouTube that can't be replaced elsewhere? If I'm needing informational content I will generally seek it out in textual format, as it's painful to sit through a video on that sort of thing. And if it's entertainment, there are many other options.

edit: Genuine appreciation to those who responded. It's great to get alternative perspectives.

[–] asap 3 points 4 months ago* (last edited 4 months ago)

stores my notes metadata in proprietary database format?

Obsidian note metadata is stored in YAML in the markdown note file itself. That's about as non-proprietary as it gets.

Not sure why you hate Obsidian. I don't love it and would switch to a FOSS alternative if there was something comparable, but at least I'm not making crap up about it.

[–] asap 7 points 4 months ago* (last edited 4 months ago)

It makes for very handy use cases where other applications can work on the same data. This could be easily adding content into your notes (without needing an API to do so), using external editors for working on certain aspects of your notes, or even just the super handy convenience of having everything in one directory structure.

My Obsidian notes are right inside the same folders as the PDFs and other resources they refer to. I don't have to have a tree structure inside my notes and then the same tree structure in my hard drive or Dropbox or wherever with all my other files.

I was a 10+ year Evernote veteran, and I couldn't go back to the single DB style like Evernote or Trillium. I wish there was an open source competitor to Obsidian, but alas not yet.

And as @[email protected] rightly points out, people (me!) have been burned in the past by a program becoming obsolete and having your files stuck in some proprietary format. Plain files right in a folder on the disk is the way to go.

[–] asap 8 points 4 months ago* (last edited 4 months ago)

I mean in your linked thread it says:

I have some 15K notes in Obsidian and it runs fine.

I personally have 4000+ notes in Obsidian and it runs fine 🤷

Here's also Obsidian with 100,000 notes and it performs fine. This test is also 2 years out of date.

[–] asap 6 points 4 months ago* (last edited 4 months ago) (1 children)

Add in the local REST API as well if you want to easily interact with your notes programmatically:

https://github.com/coddingtonbear/obsidian-local-rest-api

[–] asap 6 points 4 months ago (1 children)

They might be talking about posts like this (which I would love to have refuted, as this kind of info has so far kept me from using Docker significantly):

https://security.stackexchange.com/a/169649

[–] asap 6 points 4 months ago* (last edited 4 months ago) (2 children)

Containers are isolated from the host by default.

Are you certain about that? My understanding is that Docker containers are literally just processes running on the host (ideally rootless), but with no isolation in the way that VMs are isolated from the host.

If you have some links for further reading it would be great, as I have been extremely cautious with my Docker usage so far.

I haven't found anything to refute this, but this post from 2017 states:

In 2017 alone, 434 linux kernel exploits were found, and as you have seen in this post, kernel exploits can be devastating for containerized environments. This is because containers share the same kernel as the host, thus trusting the built-in protection mechanisms alone isn’t sufficient.

If someone exploits a kernel bug inside a container, they exploited it on the host OS. If this exploit allows for code execution, it will be executed on the host OS, not inside the container.

If this exploit allows for arbitrary memory access, the attacker can change or read any data for any other container.

[–] asap 1 points 4 months ago* (last edited 4 months ago) (2 children)

First of all, you can pay with crypto and use a burner email, but secondly, they don't link searches to your payment or sign in. (Assuming of course you take their word for it, but that's the same for every service that you do not host or compile yourself, and for which you've also read the entire source code yourself.)

I'm not saying people should use Kagi, I'm merely pointing out you can't claim it's "misleading and not private" without providing some sort of proof.

At best you can say you can't verify for yourself that they are indeed private as they claim.

[–] asap 1 points 4 months ago

So all of your internet searches are tied to one kagi account?

Kagi states in their privacy policy, "To ensure your privacy and security, we don’t monitor, log or store your queries or associate them with your account".

Of course you have to believe them, but that's the same for every service that you do not host or compile yourself, and for which you've read the entire source code yourself.

[–] asap 1 points 4 months ago (4 children)

Kagi isn’t private and it is misleading to advertise it as such.

What is your reasoning for this statement?

Going directly from Kagi's own privacy policy, "To ensure your privacy and security, we don’t monitor, log or store your queries or associate them with your account".

Of course you have to believe them, but that's the same for every service that you do not host or compile yourself, and for which you've read the entire source code yourself.

[–] asap 1 points 4 months ago* (last edited 4 months ago)

If your sender sends an unencrypted message, yes Proton can see the plain text as would be expected. (Note, sending via TLS doesn't count as an encrypted email.) However according to their many audits their process is to immediately encrypt with zero-knowledge encryption in such a way that only you can access.

If you can't trust their published open source code and their multiple audits, then sure, you should look for alternate solutions.

mental outlaw video

For anyone else, it's this video. I'm 5 minutes in and it's talking about how SMTP isn't encrypted so Proton can read unencrypted email. Yeah, no shit...

view more: ‹ prev next ›