Lucky me I rarely get spam calls
pending anonymous user
Lucky me I rarely get spam calls
Photos are never a concrete representation of the reality. Photos are being pre-processed by image processor already and we also got Photoshop. One can even fake a film based photo if he knows what to do. The proliferation of image generation models and impainting models make the access easier but image manipulation tools always exist.
Does that counts as emtrapment?
So how are they going to detect, proof, and enforce?
As long as it fits into the slot, it should work.
That “ethical” is problematic. What considered to be ethical is very subjective to the culture context.
Edit: better wording
I think OP is quite clear that he wants something resembles to Telegram’s UI, but works with XMPP instead. The title is just part of the context. You still have to read the body, which uses terms “interface” and “UI”. This means he never intend something server side.
I won’t say your comment is inaccurate, but taken out of context and misinterpret what the OP means.
OP, I understand what you look for, but that’s not easy task. From my limited knowledge of apps development, achieving what you requested would likely be:
This is akin to swaping to a new engine for a car, with incompatible mounts. Diffcult to execute, and (I believe) low interest. You can try if you got the skills. I don’t and even I have, I will just use SimpleX which fits my needs.
OP already clearly stated he want to use XMPP. What OP is asking is some client features the functionality of Telegram client. Or a fork of Telegram client, gutted out every signle line of code interact with the backend, replace them with a XMPP client library.
Typo thanks for heads up
Restic. You just need a s3-compatible object store in k8s to make it work. All else is handled by the client. That’s what I used (not with k8s), with resticprofile.
I also heard Borg is a great alternative, but never try personally, nor how it works. Both are CLI only I believe.
tl;dr: only applies to NY Eastern District, and likely only US citizen can enjoy
Thanks for the hint. I followed and checked: safe
$ efi-readvar -v PK
Variable PK, length 983
PK: List 0, type X509
Signature 0, size 955, owner 3cc24e96-22c7-41d8-8863-8e39dcxxxxxx
Subject:
C=JP, ST=Kanagawa, L=Yokohama, O=Lenovo Ltd., CN=Lenovo Ltd. PK CA 2012
Issuer:
C=JP, ST=Kanagawa, L=Yokohama, O=Lenovo Ltd., CN=Lenovo Ltd. PK CA 2012
Except the directory structure is totally gone. At least I can’t see it with either by mounting or with archive software.
Tried. They only release it for Windows, or a bootable ISO, which I can’t see what files are in there. I also tried getting the firmware from LVFS but I’m not sure if I done it right as non of them start with "EFI " header (which I assume that’s the file I should be looking at).
That “security related reasons” will likely applied everytime and makes everything behind closed door. I won’t trust this. Seen too much “security” shenanigans.
IMO LLMs are ok to get a head start of searching. Like got a vague idea of something but don’t know the exact keywords. LLMs can help and use the output on whatever search engine you like. This saves a lots of time tinkering the right keywords.
You can try integrating with SEPIA. Not that I used it befote but it surely looks promising.
ctrl+alt+f1 get to tty and install back those uninstalled?
Surprising to see after the CrowdStrike debacle.