• 0 Posts
  • 78 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle
  • Completely disagree.

    1. Noodle is hilarious and his pregnant pauses are top-tier.

    2. This video was specifically defending the indie dev, Nelson, that made the post that kicked this stuff off. Sure, other AAA devs responded to him, but it was Nelson that got most of the negative attention and death threats, even though his opinions were VERY measured and reasonable. It was also a criticism of the IGN guy that directed everyone’s attention and pitchforks towards Nelson by cherry-picking his statements and taking them out of context.

    3. The specifics of the length/scope of the game are honestly less important, IMO. The video is just a level-headed look at why this excellent game is so excellent, and why it’s unrealistic to expect every game from now on to be like this. That, and he’s trying to get gamers to chill the fuck out and stop with the death threats.












  • Right, a KVM’s usefulness is narrow and you’re ideally using it as a sort of backup to a backup of critical systems. That means you usually only hear about them in server environments, and that means that sysadmins pay a LOT of money for enterprise-grade KVMs.

    But it’s very cool that we can build a dirt cheap, half-decent KVM out of a Pi nowadays. I might have just left mine running if I there wasn’t a Pi shortage; I wanted that Pi for other stuff.



  • It’s good for critical systems that you might need to reboot and do things like see the BIOS (which you can’t see if you’re using a normal VNC-type remote access solution). It’s probably not necessary for most setups, but it can be very useful in certain situations. I made one myself, then literally never used it, and I’m now using that Pi in a different project.


  • Yes, but my point is that you’re asking a flawed question. It’s possible for us to give you a bunch of different services or processes to look for, but it’s trivial for these companies to just make a new service or process with a different name that’s harder to find. You’re trying to play a cat and mouse game that you’re not going to win.

    I work in IT. Most of our clients’ computers are managed by an MDM, which means that we can push ANY package or software to the computer at ANY time, without notifying the user. Most of our clients don’t bother with tracking software, but some do. And make no mistake, tracking software is basically legal spyware.

    So, my point is this: it doesn’t matter whether or not you have evidence of tracking software on your computer. Just assume that it’s there, and don’t use your computer for anything you don’t want your employer to see. That is the safest route.




  • The SIM is just an identifier. There’s nothing particularly special on a SIM card, that’s why the switch to eSIM has happened so seamlessly. So, you’re right; it’s totally POSSIBLE that an eSIM could stick around if you delete. But it’s also possible that your phone could save the info on a SIM card.

    For the record, I don’t think that’s likely. Your phone’s operating system (iPhone or Android) is built by a different company than the carriers that presumably want to track you. I doubt they’re secretly colluding with carriers, because Apple and Google (especially Google) have enormous business models built around tracking you, and profiting off your data.