• 0 Posts
  • 8 Comments
Joined 2 years ago
cake
Cake day: July 3rd, 2023

help-circle
  • I have a 2001 compaq n600 still being used from time to time as a gateway for old tech as it has COM as well as LPT and analog video outs. It has 1.2ghz celeron, 512mb ram, 30 gig drive. Thing is kind of a beast for its time as my own desktop at that time was nowhere close to its spects. Thing was gifted to me after initially being given to install win7 on it. After telling the guy that this isnt going to happen and the best they couldd hope for is winxp and even then it’d struggle, they told me “oh, so linux is the only option then… well, it doesnt work for me. Have it, then, have fun with it!”. I put ubuntu on it, but still gnome ground the poor cpu to a halt, so I had to switch to Xfce. Luckily it turned good enough not to downgrade further to things like bare X or Kolibri OS. Worked as a solitaire machine for my dad for a few years, helped me fix and set up stuff on a few occasions, but nowadays mostly collecting dust in my drawer.


  • It’s not. I carry one(mix 3s) as a pocket laptop for when Im going out but might need to do some work urgently and also as a lightweight backup in case something happens to my main laptop. For the former, it’s been great and saved me many times, but for the latter… this did once happen when I bonked the entire screen out. To say it was a painful week while waiting for the replacement would be an understatement. My back was killing me the entire time, and the thing is so underpowered it was easier to remote into that screenless pc rather than trying to launch stuff locally. And even with that, the thing whirred like crazy. It’s fine for a few minutes at a time but hearing it sll fay got annoying quick. And dont even get me started on the keyboard…





  • You must be severely misunderstanding the idea. The idea is not to encrypt it in a way that it’s only unlockable by a secret and hidden key, like DRM or cable TV does, but to do the the reverse - to encrypt it with a key that is unlockable by publicly available and widely shared key, where successful decryption acts as a proof of content authenticity. If you don’t care about authenticity, nothing is stopping you from spreading the decrypted version, so It shouldn’t affect consumers one bit. And I wouldn’t describe “Get a bunch of cameras, rip the sensors out, carefully and repeatedly strip the top layers off and scan using electron microscope until you get to the encryption circuit, repeat enough times to collect enough scans undamaged by the stripping process to then manually piece them together and trace out the entire circuit, then spend a few weeks debugging it in a simulator to work out the encryption key” as “trivial”