• 0 Posts
  • 27 Comments
Joined 1 year ago
cake
Cake day: August 20th, 2023

help-circle

  • I read it as just better than chrome, if you use chrome switching to any other popular browser is better. Not that edge is a particularly good browser.

    Firefox, Brave, Edge, and Safari offer stronger privacy protections by default than you get from Chrome, which is the world’s most popular browser.

    In the rest of the article they seem to suggest Firefox, safari and brave are the better options and point to evidence. And that Microsoft claim edge is a better option. Overall its suggest Firefox it better at evading tracking and safari at evading fingerprinting (largely because all the safari devices are so similar, and apple try to make them look more similar).



  • Nixos is an os that’s defined by its config stored in .nix files. Everything is defined here all the software and configurations. Two people with the same script will have the exact same os.

    Any changes you make that aren’t in the scripts won’t be present when you reboot.

    You could maintain a very custom linux distribution (kinda) by just maintaining these config scripts.

    So a user wouldn’t need to install all required software and dependencies. They could get a nixos and the self-host config and adjust some settings and have a working system straight after install.










  • Could be Chinese creating reasonable doubt. Making this sort of mistake makes explanations that this wasn’t Chinese sound plausible. Even if evidence other than the name comes out, this rebuttal can be repeated and create confusion amongst the public, reasonable suspicions against accusers and a plausible excuse for other states to not blame China (even if they believe it was China).

    Confusion and multiple narratives is a technique carried out often by Soviet, Russian and Chinese government. We are unlikely to be able to answer the question ourselves. It will be up to the intelligence agencies to do that.

    If someone wanted to blame China for this, they would take the name of a real Chinese person to do it. There is over a billion real people they could take a name from. It unlikely that a person creating a name for someone for this type of espionage would make a mistake like picking an implausible name accidentally.



  • Hinges are often made of sheet metal.

    This can be cut, drilled and bent to fit. A vice, a drill, a file, a hammer and hacksaw would be enough for most hinges.

    If the door remains suspended with just one hinge a plastic one may work for a short while. The hinge only suspended half the load.

    You can also print the hinge with a high infill percentage to improve strength and resist deformation.




  • PCB are designed with things on top of them. Typically they are mounted with the bottom of the PCB at the bottom of a case. So following normal conventions there wouldn’t be a place for the bottom screw to go into something. Unless you used a bespoke case. It’s much easier to have the two screw design place the screws above the PCB.

    It may seem like a minor change, but it costs substantial more in design time and effort. New folded steel cases and injection moulded cases would have to be developed. Designers would use a different port, or worse deploy their own two horizontal screw design. There would then be several two screw designs (metric/imperial/very close/very far etc).

    Anyone with the niche need of the two screw vertical design would likely rotate the whole connector or use a flex cable to join the connector to the main board.