A quick look at the #PantherX Desktop: Here we've got the Menu with global search that can dig into PDF's and other documents, Hub with all online accounts and recent messages and of course System - at the top, right - with clear connection information; supporting all modern standards, including special cases such as OpenVPN with stunnel.
Still alive, just busy coding! #PantherX
Anyone any luck with a BCM4360 wireless on #Guix?
@horia would you consider offering set-up (and occasional service) for a caesonia install on openbsd.amsterdam?
If you're in #Brussels, this is probably worth a look: Meet Guix at FOSDEM
"For the second time, we are also organizing the Guix Days as a FOSDEM fringe event, a two-day Guix workshop where contributors and enthusiasts will meet." https://www.gnu.org/software/guix/blog/2019/meet-guix-at-fosdem-2019/
Maybe it's time for someone to have a second look at: GuixSD: mastodon. An experiment in theoretic packaging. https://n0is.noblogs.org/post/2017/04/18/guixsd-mastodon-an-experiment-in-theoretic-packaging-very-early-draftthoughtcollection/ #GuixSD #Guix
It's official: The lightweight, Qt5 based Linux Desktop LXQt 0.14.0 went live this morning. Congrats to the LXQt team and cheers to everyone's hard work! https://forum.lxqt.org/t/release-lxqt-0-14-0/572
So there is this peer to peer, chat system. It has no tracking or ads, it doesnt require any infrastructure to be 100% effective. You can use it with your computer and type to folks, similar to IRC. You can literally run a BBS over it and many actually do.
How male privilege produces such hapless men: The internet abounds with tales of male incompetence. What’s up with all these morons? https://theoutline.com/post/6994/men-are-idiots-how-did-we-get-here
The latest and greatest #LXQt 0.14.0 is expected by the end of this week! Kudos to the LXQt team and everyone that has contributed - something to be excited for!
Find out if your email has been found after a previous data breach, which potentially exposed personal information and passwords: https://monitor.firefox.com/. Mind you, this happens more often, than is publicized.
How sloppy OPSEC gave researchers an inside look at the exploit industry
“Those government developers were testing out the WhatsApp malware on their own devices, and it was storing their discussions on the program’s servers.
The nation-state essentially had hacked itself and accidentally dumped highly sensitive information on the open internet—including details of its interactions with the secretive vendors who sell spyware to governments.”