While #Adobe is doing an absolute stupid with their new licensing terms, and (now Canva-owned) #Affinity slashes prices by half in a "flash sale", I am once again asking people to consider supporting #FLOSS tools instead.
Yes, they are far from perfect.
But with a small fraction of what these closed source vendors are raking in, these tools could be made immeasurably better.
And they won't end up bought up and enshittified, as experience with past attempts at doing that to FLOSS tools shows.
@rysiek chipping in to mention i've used Krita (for digital painting), Gimp (for general-purpose processing) and Inkscape (vector art) for digital art and they are pretty good! one can even script automations to deal with repetitive processing.
When I see general* "security advice" that mentions "do not use public WiFi" or "use a VPN", I am immediately suspicious about all other advice offered.
Yes, a decade ago that was a consideration, because most sites were not using HTTPS. Credentials were flying cleartext on the wire.
Today, almost all sites use HTTPS. Doesn't mean the risk is zero, but it's way lower.
*) "general" meaning "without a very specific threat model in mind", meant for general public, etc.
@rysiek@letsencrypt I mean… I‘m very wary of „works for most“ solutions but this is the exception that improves many people’s lives and lowers the bar of implementing previously tedious measures without any negative impact on the rest.
I just spent two hours trying to get #Firefox to use #KDE Dolphin as the default file manager.
I went on a journey from .desktop files and mimeinfo.cache, through DBus, to .service files.
I shook with anger when everything seemed configured correctly, but Firefox would just not launch a file manager at all. Click that "show in folder" button and nothing happens.
I have now found the problem.
The problem was: systemd. :angery:
Why. Is. Systemd. Involved. In. Launching. A file manager. 👀
This is the kind of stuff that drives me crazy in software. 👀
Konqueror is an amazing file manager, I love the ability to split the window horizontally and vertically as many times as I want. I would love to use Konqueror as my main file manager. :blobcat:
But... there is no way, apparently, to make Konqueror always show the sidebar. Every time I open it, I need to hit F9 to explicitly show the sidebar.
@rysiek
I'm not blind, so this response is mostly off-topic for the question you posed…
I recognize and appreciate the art and what it represents. 😊
In your bio, you could even add a line below it that reads something like “Alt-text: ASCII-art rendering of a glider structure from Conway's Game of Life.”
Not only have others established that the art won't run afoul of screen readers, but also this would make the depiction accessible.
This might be a good moment to add a certain US former president's name to your filters if you swing that way, as a certain jury reached a verdict, apparently.
> Na stronie internetowej komunikatora znajdziemy informację, że „wiadomości są silnie szyfrowane”. Podobnie Telegram promuje się m.in. w mediach społecznościowych.
> To mocno sugeruje, że wiadomości wymieniane za pomocą tego komunikatora są dostępne tylko dla ich nadawców i odbiorców – i że nikt poza nimi nie może odczytać. Takie szyfrowanie nazywane jest „end-to-end”.
> Dla rozmów komunikator ten ma dwa tryby. Domyślnie wiadomości szyfrowane są między naszym urządzeniem a serwerami Telegrama. Firma nazywa to „czatami w chmurze”. Wysyłane przez nas wiadomości są szyfrowane, ale tylko między nami a infrastrukturą komunikatora, po czym między tą infrastrukturą a odbiorcą wiadomości. Podobnie wiadomości, które odbieramy.
> To zdecydowanie nie jest szyfrowanie end-to-end.
> Operator usługi ma pełny dostęp do treści naszych rozmów wykorzystujących ten tryb.
Wbrew obietnicom na swojej stronie internetowej, spółka wydaje się współpracować ze służbami i dostarczać dane osób korzystających z tego komunikatora na polecenie sądów.
A jego protokół zaprojektowany jest tak, że umożliwia dokładne śledzenie osób z niego korzystających poprzez obserwację sieci. Z czego, najwyraźniej, korzystały rosyjskie służby w okupowanym Chersoniu.