• 0 Posts
  • 117 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle




  • I will continue to argue that GenX is the only true technology literate generation because we grew up with the technology as it evolved.

    This is a terrible argument. Technology is always evolving. There have been like 10 different versions of Windows that I’ve used growing up as a millennial, across 3 different architectures, with huge advances in storage, memory, CPU speeds, and graphics processing - it’s pretty ignorant to dismiss all that and claim Gen X “grew up with the technology”. Like duh, every generation “grows up with the technology” of their generation.

    I think the point I’ve seen elsewhere on this post is more accurate - every generation has some technologically literate people and some technologically illiterate people. Congrats, you happen to be literate, but I guarantee for every one of you, there’s also a Gen X’er that can barely function a computer enough to check their email. Just like the boomer generation, and the millennials, and even Gen Z and Alpha. This whole “XYZ generation is the most ABC” bullshit is just another way to create divides, and make people forget we’re all way more alike than we are different.









  • You can mod things on Linux, it’s just slightly more of a pain because you have to usually manually place files in the right locations, since the mod managers are kinda hit or miss on Linux.

    That being said, I was recently able to mod Minecraft and Valheim pretty extensively with mod managers (I forget which one for Minecraft, but I used r2modman for Valheim which worked great), and I got the Mass Effect: Legendary Edition mod manager working enough via wine that I could mod that too.







  • Monero is triple encrypted. You crack one and you got no time left before the next chain flips the whole shebang.

    If monero is using sane, modern encryption algorithms, “triple encryption” doesn’t really get you meaningfully more security.

    It already takes an insane amount of time to brute force good encryption algorithms, so if people are cracking your encryption, they’re doing it via some vulnerability/flaw/exploit in the algorithm which allows then to crack things much faster than brute forcing. If you use the same encryption algorithm for all three layers, you just have to exploit it three times instead of one, which isn’t really adding any difficulty to a competent attacker.

    What if you use three different encryption algorithms, you may ask? Well, that’s even worse because you’ve now tripled the attack surface of your encryption scheme.