

It’s the year of the linux phone. /s
It’s the year of the linux phone. /s
Isn’t that another attack vector? You have your email stored in another potential database that might be leaked? Or is there a better way to use aliases that I am missing out on?
I second Dungeon Crawler Carl. Have fun with!
If he only went with void instead of arch, it’s just cheating using a systemd distri
There was also recently something similar with ComfyUI, where an extensions was embedded with a malware.
I’m half retarded, any videos explaining the structure of Lemmy? No idea the difference between .ml and .cafe, is it supposed to be different subreddits? Or different websites?
You need clearly defined requirements to write a good user story.
This is the main reason the last company I worked for lacked in project delivery. They had just transitioned to Agile, and their whole teams lacked proper Agile experience and the training provided was very superficial. They barely put any time in refining the requirements and this trickled down to developers.
First time I hear someone using keycloak for local hosting.