You actually pointed out that they did, indeed, do miss a period (the one after “run0.”)
you can run a command using run0 it’s only elevating that commads,
You actually pointed out that they did, indeed, do miss a period (the one after “run0.”)
you can run a command using run0 it’s only elevating that commads,
You’ll have to give another example in order to support your point. Because that commit was funny!
I’m trying to understand what you just wrote. Did you miss a period somewhere?
works out pretty well*
Why is it tone-deaf?
(Genuine question.)
as if it lost its* spark.
It’s not that I have something to hide. It’s that it’s none of your business!
Car making without the tracking bullshit!
I understood that. But I don’t see how you came down to this conclusion simply because someone put Linux inside Linux.
When you put matryoshka russian dolls one inside the other, do you also think “man, we live in a simulation”?
Technically, yes. But the article already mentioned the amount of effort for the brute force to succeed (that is, practically never, if the phrase is truly random.)
But anyway. With regular passwords, the attackers already have a list: the alphabet plus numbers and symbols. Not really that different.
Not that I don’t disagree with you, but how did you come down to this conclusion?
I have so much to learn. Last time I was tracking distros and having fun with distro hopping was with Slackware 7, I think.
What is ostree? What is bazzite? Time to google stuff.
Did you really have to use that stupid “fake news headline” phrase? Gross.
They kinda were for me. But then, I was young with plenty of time to spend.
So, this is only available for Fedora users?
Good job, but is this something that us common folks can use?
Otherwise, as much as a noble cause that was, helping a for-profit company save money, for the same amount of pay is like, eh… it wouldn’t be worth my time. But that’s just me.