

I’m gonna try to guess the most likely LLM response to your post, trained on reddit data:
“This.”
How’d I do?
I’m gonna try to guess the most likely LLM response to your post, trained on reddit data:
“This.”
How’d I do?
And many folks have headless setups — raspberry pis, home servers, VPSs, etc. It’s kinda overkill to install a desktop environment on a headless box if the only reason you need it is so you can VNC into it for a simple task that could be done over ssh.
For some (most?) of us, we don’t have ssh access open to the world, so everything is over a VPN. So I can just use NFS over WireGuard which afaik is fairly secure, if you trust your endpoints, and works great over the Internet.
On linux you can"t install or uninstall anything if you are not root
That’s not true at all. You generally can’t use your distribution’s package manager to install or uninstall without elevated privileges. But you can download packages, or executables with their own installer, and unpack/install under your home directory. Or, you can compile from source, and if you ./configure
’d it properly make install
will put it under your home.
Standard Linux distributions don’t place restrictions on what you can and cannot execute; if it needs permissions for device access of course you’ll need to sort that out.
But this is a weird thing to lie about — the only reason to implement toner DRM is to get people to buy your cartridges. But if your public statement is, “it’s ok to buy off brand cartridges,” then…well… that’s kinda weird.
Not saying you’re wrong, and they could be trying to have their cake and eat it too (court the anti-DRM crowd but also scare people into sticking with their toner). I’m just saying your snarky/sarcastic response seems unwarranted here.
Lemmy is not encrypted, my comments are public, your comments are public, we both know that. Anyone with a raspberry pi or an old netbook can scrape them.
If I use an encrypted service and all of a sudden everything that I thought was encrypted was decrypted by the service provider without my consent? That’s breaking encryption.
If on the other hand I use an encrypted service and they tell me that they can no longer offer the service, my data will be destroyed after X days, and I need to find another way of storing my encrypted data because of privacy invading government policies? That is not breaking encryption.
For many things I completely agree.
That said, we just had our second kid, and neither set of grandparents live locally. That we can video chat with our family — for free, essentially! — is astonishing. And it’s not a big deal, not something we plan, just, “hey let’s say hi to Gramma and Gramps!”
When I was a kid, videoconferencing was exclusive to seriously high end offices. And when we wanted to make a long distance phone call, we’d sometimes plan it in advance and buy prepaid minutes (this was on a landline, mid 90s maybe). Now my mom can just chat with her friend “across the pond” whenever she wants, from the comfort of her couch, and for zero incremental cost.
I think technology that “feels like tech” is oftentimes a time sink and a waste. But the tech we take for granted? There’s some pretty amazing stuff there.
Newer macOS is not Unix certified.
It’s UNIX 03 compliant https://en.m.wikipedia.org/wiki/Single_UNIX_Specification
One or two Linux distros were (are?) UNIX certified, though.
Haha yeah that was the counter example I was thinking of. I agree completely — you could make a Gentoo from source beginner distro, and I think you could make it reasonably “idiot proof,” but it would still be a bad user experience most likely (too much time spent compiling).
If your distro can’t be forked into a “beginner distro” then it’s fundamentally flawed IMHO.
To be clear, I’ve used Arch as my daily drivers for a while, and while it’s not the best fit for my needs (I use Debian mostly), there’s nothing that I experienced that was incompatible with a “beginner” distro.
You can also drop cache for debugging by running something like echo 3 | sudo tee /proc/sys/vm/drop-caches
But remember that the kernel knows best — this RAM will automatically be freed up when needed and you should never run this except for debugging (or maybe benchmarking).
I’ve been super happy with it. Knock on wood it’s been super reliable. I have a single ZFS drive, take snapshots with various retention policies, nothing fancy.
Another fun thing is to set up a reverse proxy on it as an endpoint for services on your local (home) network which can only be accessed by VPN. For example, my Jellyfin service isn’t public facing, but I didn’t want e.g. my parents to need to set up WireGuard. So instead they can point their TV to a raspberry pi on their network to access the service — even a first gen RPI can handle Jellyfin reverse proxy over WireGuard for moderate bitrates!
WireGuard, and an external HDD. Run at a remote location for off-site backup.
I do this with a raspberry pi 3 at the in-laws. I copied the data over locally before setting it up, and after that it’s just nightly incremental rsync, which is fine even over my slow (35Mbps) upload.
IIRC chvt
is a privileged command, which makes sense (if an unprivileged user could execute this command they could effectively brick the computer for a local user).
That said, my understanding is that modern DE’s are given a lot of access, so presumably chvt
is allowed (and in this case, is required because as others mentioned, password is required). So the only other option is to fail unlocked, which is all kinds of Bad.
It’s overpriced hardware
Have you seen the M4 benchmarks?
If you’re memory bound then sure, you can get way more bang for your buck with Intel/AMD. But for pretty amazing CPU performance I think the “Apple is overpriced” trope isn’t really true any more.
Maybe they mean four year uptime…
For very simple tasks you can usually blindly log in and run commands. I’ve done this with very simple tasks, e.g., rebooting or bringing up a network interface. It’s maybe not the smartest, but basically, just type root
, the root password, and dhclient eth0
or whatever magic you need. No display required, unless you make a typo…
In your specific case, you could have a shell script that stops VMs and disables passthrough, so you just log in and invoke that script. Bonus points if you create a dedicated user with that script set as their shell (or just put in the appropriate dot rc file).
With Windows, there is 1 current version of Windows (11), 1 “almost current” (10), 1 “outdated but you’ll maybe see it” (8.x) and only a few “you’ll probably only see this in obscure situations” versions. Linux has as many “parent” distros/package management systems (apt, rpm, pacman, etc.). This definitely complicates things, as each distro family does things slightly differently.
And we haven’t even touched the window manager/DE choices, of which there are a ton (as opposed to Windows). “Combinatorical explosion” maybe isn’t the right phrase, but you get the idea — Debian with i3wm is wildly different from Fedora Plasma.
This is all a good thing though, as Linux users tend to like the choice and flexibility — but it does mean that the “right way” to do something on Linux is very dependent on your particular setup, which isn’t the case with Windows.
(I have used Linux for the last 20+ years, and it’s definitely my preferred setup, and am lucky enough that I rarely use Windows for work, and never for personal use.)