

Why is there a need to comply with foolish laws? I’m sure I type stuff on lemmy.ml or elsewhere on the internet that doesn’t comply with some idiot law somewhere in like Myanmar or the DPRK. Why would I concern myself with those laws.


Why is there a need to comply with foolish laws? I’m sure I type stuff on lemmy.ml or elsewhere on the internet that doesn’t comply with some idiot law somewhere in like Myanmar or the DPRK. Why would I concern myself with those laws.


Not black text on white, but light grey/purple on dark grey was pretty popular with Sun Microsystems. I think OG Apple Macintosh used Black on White, or at least close enough colors.
That said I use something like this for work.


I guess if you don’t see any difference between a government supported telecom company and a company that exists in different nation that has a necessarily hostile relationship to the local government, then sure they are comparable.


yea, ever since TPM was first making the conspiracy rounds in the 90’s there has been a huge misunderstanding of its purpose, let alone its capabilities. I 100% agree with the author that looking at the TPM as an evil blackbox is really just depriving users of a tool that can be implemented in an open source way to secure user privacy. The GPU however is impossible to implement in an opensource way by everyone except a small handful of semiconductor companies, and even then you would rely on proprietary microcode that woul take millions of manhours to reverse engineer if it were even possible. So if I were some megacorp who relied on Imaginary Property, the GPU that was exclusively created by a fellow megacorp is where I’d place my trust.
I also dont know why Win11 requires a tpm2.0, but since it does, and my current computer doesnt have one, I’m certanly not going to run it.
You need to understand subnetting. Allowing 192.168.1.0/24 also allows 192.168.1.135/24 In fact 192.168.1.135/24 shouldn’t be valid syntax at all, but it is easier to accept it and then let subnet math fix the mistake.
I assume your router is 192.168.1.135 for whatever reason, so as long as your router is contained in the configured iptables allowed network, it’ll work with all of the following networks.
192.168.1.135/32
192.168.1.134/31
192.168.1.132/30
192.168.1.128/29
192.168.1.128/28
192.168.1.128/27
192.168.1.128/26
192.168.1.128/25
192.168.1.0/24
192.168.0.0/23
… And 22 even larger networks.
If you don’t configure a subnet mask for the rule, iptables will accept the IP address you put in as a single host, the /32 is implied. The same behavior would be seen using any kind of network filter, though they may not allow you to specify 192.168.1.135/24, they may require a bit boundary, but mathematically, it’s the same.