

“If you’re not having fun, you’re doing it wrong.”
https://rhizomehouse.org/mutualaid/ is a good list of people you can help.
https://nlgmn.org/mass-defense/
https://www.wfmn.org/funds/immigrant-rapid-response/
How to organize a rapid response from a very high level with further detailed resources. https://southerncoalition.org/resources/rapid-response-101/
Good general advice on organizing, also a good resource to find groups near you that are likely aligned. https://www.fiftyfifty.one/organizer-resources
Feel free to reach out for any other resources.


“If you’re not having fun, you’re doing it wrong.”


The problem isn’t that it’s slow, it’s that it’s linear.
That being said, great writeup. I’d love to pass this around the opensource projects that just shove a postgres container into the stack when they’re just trying to get relational keys.


You obviously don’t understand fashion


You say this like it’s a bad thing…


It is just so crazy what happens when we elect people that want to actually govern instead of grift.


790hz is the switching signal, as the contacts corrode the resistance increases so they have to be tested on a schedule.


Oh I definitely know! You can also open up seperate browser windows for a simpler worlflow, no unneeded emcryption.


Thing 0 you can use qm terminal
Thing 1 use ZFS no need for LVM
Thing 2 see above for zfs set share nfs
Thing 3 spice vnc is built in
Thing 4 you should check out QubesOS if you haven’t already…


What’s the GPU have to do with proper sandboxing of a crack? Or are you just being opinionated and offering unsolicited advice?
Also the DRM absolutely has no fucking clue if it’s running in a qemu or on a spinning rust IDE SCSI from 1992.
Lastly the whole point of a bypass crack is that the DRM is bypassed… it’s being told what system it’s running on.


Proxmox --> GPU passthrough --> Gaming VM
Don’t log into anything while you’re playing the game.


I doubt wayland would play nice with their
Nexus, an internal communication layer that manages messaging between system components.


Depends on if they’re tied to the CAN bus. If so, all sensors can be spoofed.


I use WSL at work, I pin max RAM and only leave one CPU running for the host OS. It’s still a nightmare. This upcoming week I’m finally deploying Redhat IDM so that myself and others can use their smartcards and the ancient AD infra to get linux workstations and jumpboxes. Microsoft did me a massive favor by raising our licensing pricing so now it’s cheaper to replace Azure AD.


Can you explain further?


It’s a dark pattern but you can use any MFA provider with Microsoft services.
Exactly this.
"code": "validate-width",
"msg": "Too wide"
}```
stripped the headers, your image didn't make it through the infosec.pub proxy.
X-Firefox-Spdy: h2 access-control-expose-headers: vary, date, content-length, content-encoding, content-type cache-control: public, max-age=60 content-encoding: br content-type: application/json date: Fri, 27 Feb 2026 02:10:57 GMT server: nginx vary: accept-encoding, Origin, Access-Control-Request-Method, Access-Control-Request-Headers
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Encoding: gzip, deflate, br, zstd Accept-Language: en-US,en;q=0.5 Connection: keep-alive DNT: 1 Host: infosec.pub Priority: u=0, i Referer: https://piefed.social/ Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: cross-site Sec-Fetch-User: ?1 Sec-GPC: 1 TE: trailers Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:140.0) Gecko/20100101 Firefox/140.0
ZFS isn’t a backup, but it is a gateway drug
Their position of protecting property and not people, simple as. People who choose people over property, do not become cops. It is a simple filter that selects for bastards.