It's money saving for the general public, but cuts a lot of money from the coal and gas industries, and that's who they serve, not the general public.
irotsoma
But it's such a waste of effort to move to a platform that is heading in the exact same direction. It takes so much effort to get people to switch. Why do they insist on using something else that will eventually be just as bad?
It you're talking about TOTP exclusively, that only needs the secret and the correct time on the device. The secret is cached along with the passwords on the device.
LLMs are perfectly fine, and cool tech. Problem is they're billed as being actual intelligence or things that can replace humans. Sure they mimic humans well enough, but it would take a lot more than just absorbing content to be good enough at it to replace a human, rather than just aiding them. Either the content needs to be manually processed to add social context, or new tech needs to be made that includes models for how to interpret content in every culture represented by every piece of content, including dead cultures who's work is available to the model. Otherwise, "hallucinations" (e.g. misinterpretation and thus miscategorization of data) will make them totally unreliable without human filtering.
That being said, there many more targeted uses of the tech that are quite good, but always with the need for a human to verify.
Exactly how this version of "AI" should be used. Not treated as an independent intelligence, which it's not, but treated as a tool for those with independent intelligence.
There's not a need to have vaultwarden up all of the time unless you use new devices often or create and modify entries really often. The data is cached on the device and kept encrypted by the app locally. So a little downtime shouldn't be a big issue in the large majority of cases.
Not a new thing, and I can definitely see good uses for this information. What they should have done is made it so that the one being tracked gets a log and real time notification any time someone is tracking them. This would alleviate some of the toxic spying behavior simply by making it transparent rather than covert.
A desktop environment is a waste of resources on a system where you'll only use it to install and occasionally upgrade a few server applications. The RAM, CPU power, and electricity used to run the desktop environment could be instead powering another couple of small applications.
Selfhosting is already inefficient with computing resources just like everyone building their own separate infrastructure in a city is less efficient. Problem is infrastructure is shared ownership whereas most online services are not owned by the users so selfhosting makes sense, but requires extra efficiencies.
Not really. I can't think of a major social media software company that isn't exploitative. If that's where their specialty lies, then they either learn new skills which takes time, requires partially resetting your career, and money only to have that company then absorbed by an exploitative big company in a decade and do it all again, or just keep your job that started as a decent company and got corrupted already.
See the context mentioned by OP. It was a reply to a post about Recall on Windows.
Unfortunately, not everyone has a choice in who they work for in end-stage-capitalism. Work is about survival, not ideology. The majority of Americans are not far-right capitalists, but the vast majority of CEOs are, and it's not really possible to survive long enough to start a small business in most of the US without investment from a far-right capitalist or inheritance (usually also from a far-right capitalist family member).
Signal isn't that kind of app. It protects your data in flight, but only has minimal protections after the recipient gets the message. It's a whole other game to protect data at the endpoint. If you can't trust your recipients to protect data, then you shouldn't send them data needing protection. In order to do that you need control over all levels of the device receiving the data, hardware, operating system, file system, and software. Anything else will always leave openings for data at rest at tge destination to be compromised by untrustworthy recipients.