LazyVim. Didn’t have time to do everything manually when I wanted to cut over from regular vim. I have quite a few customizations on top, but its a pretty solid base. I use with neovim nightly via nixos.
LazyVim. Didn’t have time to do everything manually when I wanted to cut over from regular vim. I have quite a few customizations on top, but its a pretty solid base. I use with neovim nightly via nixos.
Hard agree, but it’s a rather “progressive” view for the political party hell bent on deconstructing reproductive services and eroding privacy to access porn.
It is also still illegal I believe? The lack of any consequence just highlights its a dumb law, demonstrates it only serves as a poor tax, and exposes all their theocratic preaching as just rules for thee and not for me to strip away freedoms.
Immutable Nixos. My entire server deployment from partitioning to config is stored in git on all my machines.
Every time I boot all runtime changes are “wiped”, which is really just BTRFS subvolume swapping.
Persistence is possible, but I’m forced to deal with it otherwise it will get wiped on boot.
I use LVM for mirrored volumes for local redundancy.
My persisted volumes are backed up automatically to B2 Backblaze using rclone. I don’t backup everything. Stuff I can download again are skipped for example. I don’t have anything currently that requires putting a process in “maint mode” like a database getting corrupt if I backup while its being written to. When I did, I’d either script gracefully shutting down the process or use any export functionality if the process supported it.
Don’t Look Up!
I accidentally pirate crap I have legitimate access to because I can’t be bothered to figure out which damn platform its on. I have access to quite a few through work due to my industry at no out of pocket costs.
The times I try to actually search for something, it’ll be listed on multiple platforms but 0 to 1 of those platforms will actually have what I’m looking for included with the subscription forcing me to manually check each one.
It is easier to just pirate.
As another poster said, the underlying tech is not private: https://jmp.chat/privacy
For backwards compatibility, what your proposing is unlikely unless driven through regulation (personal opinion).
Use something over the top (like Signal was suggested), use a non-KYC provider (like Jmp), or use a burner phone.
A non-KYC provider I wouldn’t trust to be private personally, especially as a secondary SIM. Maybe slightly above average (the company can’t sell the number attached to my name), but I’m sure enough information leaks that a state-level actor could correlate the device to me. The IMEI the tower gets is probably enough to run to Google to figure out who bought the phone.
Even burners may trace back to you through GPS or triangulation depending on how private you really want to be.
https://www.goodreads.com/book/show/1098624.When_I_Say_No_I_Feel_Guilty
Its dated and probably misogynistic given the period, but when I did read it many many years ago, the broken record technique is probably the one thing I do remember. It also had some role play dialog for how others may try and break the loop. I found it helpful at the time.
I think I read/heard something similar in one of the Love and Logic parenting books/ebooks. “Maybe so, but <repeat assertion>” comes to mind. Acknowledge the statement that attempts to break the loop, don’t add any new information, and repeat the assertion.