- 25 Posts
- 225 Comments
who@feddit.orgto Privacy@lemmy.ml•What is the catch with Epic Games' free games?English1·16 hours agoYou might want to read my other comments elsewhere on this post.
Please keep in mind that no matter what technical measures you take, accepting Epic’s “free” games requires agreeing to their terms and conditions, which they can change after you get the games. I really don’t recommend it.
who@feddit.orgto Privacy@lemmy.ml•What is the catch with Epic Games' free games?English1·16 hours agoI do not recommend running Epic software at all.
who@feddit.orgto News@lemmy.world•Trump’s birthday parade may be cancelled over thunderstormsEnglish38·18 hours agoPerhaps he could order Immigration and Customs Enforcement to deport the weather.
who@feddit.orgto Privacy@lemmy.ml•What is the catch with Epic Games' free games?English1·13 hours agoYou could download and play the games on a machine that is never used for any other purpose, but it would still be able to collect biometric data (mouse movement, keystroke patterns, voice if you have a microphone, etc.) and probe/fingerprint your network.
Short of a dedicated machine, the closest you’re likely to get is a hypervisor-based virtual machine. Of course, that won’t safeguard your biometrics or (in most cases) your network, either.
Such a machine would be safer if you never gave it network access, so it couldn’t exfiltrate any data that it had collected, but downloading games requires network access at some point, and it would only take milliseconds for a “helper” process (perhaps quietly installed/launched with the game) to leak the data.
In general, hostile code will always be unsafe. If it concerns you, it’s best to avoid it entirely.
who@feddit.orgto Privacy@lemmy.ml•What is the catch with Epic Games' free games?English1·23 hours agoFlatpak permissions are famously coarse, and its sandboxing mechanism is weak and full of holes. It can be useful for guarding against damage caused by programming mistakes, but I would not recommend it to anyone wanting protection from adversarial software.
Heroic Games Launcher doesn’t change the code in the game executable itself, so yes, it is still an issue when using Heroic.
who@feddit.orgto Privacy@lemmy.ml•What is the catch with Epic Games' free games?English484·2 days agoOne catch is that Epic’s mystery code is allowed to execute on your computer.
Note that I don’t mean just their launcher. Often, if not always, the games themselves are linked with Epic code, ostensibly for license checks and/or integration with Epic services. This gives them the ability to snoop on stored data, installed/executing processes, biometrics, etc.
Running those free games with an alternative launcher does not protect against this.
It’s not just a theoretical concern, either. Epic has already been caught copying Steam files, collecting friends play history, and scanning running processes.
https://old.reddit.com/r/fuckepic/comments/wakewr/epic_games_spyware_vs_steam_vs_as_comparision_ea/
https://www.pcgamesn.com/epic-launcher-spyware
I don’t trust them, their CEO, or Tencent (which owns a significant chunk of Epic), so I don’t run games that come from them.
Tencent owns a substantial portion of the company, and therefore has substantial access and influence. Nitpicking about the percentages is irrelevant.
who@feddit.orgto News@lemmy.world•1,800+ 'No Kings' Rallies Planned Across US as Trump Deploys Military to Crush ProtestsEnglish18·2 days agoThe site shows rallies nearest to you:
who@feddit.orgto Privacy@lemmy.ml•Browsers are complicit in browser fingerprinting.English241·2 days agoLet’s be careful how we phrase things here. JavaScript form submission and navigation are choices, not needs.
Also, progressive enhancement / graceful degradation exists. When competent developers (or bosses) want script effects on our sites, we can include them and make the sites continue to function with scripts disabled. It might require more work, but it is absolutely possible.
Framing the script-based approaches to these things as if they were needs contributes to the problem, IMHO.
(I am referring to the vast majority of web sites, of course, not special-purpose web applications like games.)
who@feddit.orgto Privacy@lemmy.ml•Browsers are complicit in browser fingerprinting.English784·3 days agoWeb developers are complicit in browser fingerprinting, by insisting that sites require JavaScript (or WASM).
All of us are complicit in browser fingerprinting, because we tolerate it.
IMHO, a web site being allowed to execute arbitrary code on visitors’ hardware should be an anomaly. The vast majority of them could be built to deliver the same information without requiring that inherently dangerous permission.
who@feddit.orgto PC Gaming@lemmy.ca•My Steam Deck is aging -- but I'm not letting it goEnglish15·3 days agoIt’s important not to get caught up in the “constantly upgrade everything” hype, even though it gets the spotlight a lot more than solid midrange gaming gear. As far as I’m concerned, four years is nothing; a gaming system that can’t hold up for that long would have been a poor system even on day one.
Glad you’re still enjoying your Steam Deck. I would be surprised if you don’t get another four years out of it. :)
who@feddit.orgto News@lemmy.world•LA riot police shoot protester in the head with rubber bulletEnglish144·4 days agoThe raids are part of a coordinated response across the U.S. after President Donald Trump vowed to instigate mass deportations of undocumented migrants.
Response? Response to what? It looks to me more like a military force invading a city and attacking civilians.
who@feddit.orgto News@lemmy.world•British photojournalist hit by non lethal rounds during Los Angeles protestsEnglish72·4 days ago“Deputies will be defending themselves. I don’t think anybody expects our deputy sheriffs to take rocks and bottles without defending themselves.”
Raising a shield would be defending.
Retaliation is not defending.
Hurting random people because someone threw a rock is not defending.
Shooting a peaceful journalist is not defending.
who@feddit.orgto News@lemmy.world•2,000 National Guard troops will be sent to L.A. amid clashes over immigration raids - Los Angeles TimesEnglish53·5 days agoI would like to see California boldly and forcefully repel this invasion, but I don’t know how it would work.
The California National Guard is part of the National Guard of the United States, a dual federal-state military reserve force.
When National Guard troops are called to federal service, the president serves as Commander-In-Chief. The federal mission assigned to the National Guard is: “To provide properly trained and equipped units for prompt mobilization for war, national emergency or as otherwise needed.”
The governor of California may call individuals or units of the California National Guard into state service during emergencies or special situations. The state mission of the National Guard is: “To provide trained and disciplined forces for domestic emergencies or as otherwise provided by state law.”
Role: Organized militia
Size: 24,000https://en.wikipedia.org/wiki/California_National_Guard
EDIT:
When I look at this as Trump and his gang deliberately inciting conflict with state/local governments in order to have an excuse to seize control from them before the next election, the situation becomes even trickier.
who@feddit.orgto Science@beehaw.org•Scientist Dissolves Soda Can To Reveal A Thin Plastic Liner InsideEnglish2·6 days agoI bought an empty stainless steel bottle and fill it myself. :) It doesn’t take long for that to be cheaper than buying plastic bottled water.
Debian’s installer accepts a preseed file that will automate answering the questions it normally asks.
You can also ask Debian’s package manager for a list of packages marked as manually installed (
apt-mark showmanual
) and then use it to install those same packages on a fresh system. I think there’s a more formal way to do this as well, but I haven’t needed it in so long that I forgot the details. :PAs for why most distros don’t consolidate all the configs for all system components in a master text file, I expect the main reason is the Unix heritage: A great many of those components have been around for longer than Linux has existed, or derive from those that have, and their configurations evolved separately. (Almost all of them are configured with text files, though.)