• 46 Posts
  • 251 Comments
Joined 2 years ago
cake
Cake day: November 27th, 2023

help-circle
  • The way I’ve seen people around me use the dryer, for sure. High heat will ruin clothes more than anything else, especially if it continues to run after everything had dried out.

    Back in university, we had timed dryers that could only do either high heat or tumble dry low for an hour. Rooms were too humid and cramped to air dry. Of course, I wasn’t going to spend more money waiting for low heat to do its work. Clothes came out bone dry and metal zippers scalding hot. Only the large towels held up, everything else noticeably faded and thinned over a couple years.

    Night and day difference once I got my own place with a condenser dryer. It takes longer, but everything is just dry enough at the end of each cycle. It’s also a bit smaller so I have to air dry parts of larger loads, but either way, my clothes have held up much better ever since.


  • Functionally, not really. I can get my work done on anything from FVWM to GNOME without a hitch.

    Aesthetically, very much. The Chicago95 theme sparks joy and makes work just a bit more enjoyable. KDE and GNOME might have more creature comforts, but I will happily tolerate XFCE because it works well with Chicago95. I don’t even do fresh installs anymore because of the time it takes for me to configure the visual style just right. I’ll instead image from an install I’ve prepared on a VM.



  • Certainly. I’ve had setups with FVWM as a pure window manager while using XFCE’s xfce4-terminal, MATE’s Caja file browser, and GNOME’s Evolution mail client. Some utilities will pull a few extra dependencies from their native DE, but they won’t get in the way either.

    Display manager won’t matter too much, most should be configurable to point at your WM of choice. LightDM integrates nicely with GTK themes, SDDM for Qt, and GDM for GNOME.

    The biggest pain point from my experience was configuring power management and lid close actions manually, if using a laptop, since those often are only done for you if you install an entire DE at once.

    Also grab a copy of qt5ct if you’re interested in making your Qt packages look more integrated next to GTK packages.


  • If OP indeed has the 6th gen iPod Touch, not the classic, it won’t be as rosy as most of the comment here suggest. From my experience replacing the battery on one, you need a hair dryer to loosen the glue and pry off the screen, then a soldering iron to replace the battery since its ribbon cable is directly soldered to the logic board. No storage expansion or custom firmware is available for such iOS devices, as far as I am aware.

    Also watch out for low-quality replacement batteries, the first replacement I tried only lasted around an hour on a full charge.



  • Are you keen on using wireless headphones or speakers? If not, I’d go all the way for one without Bluetooth so the thought of present or future vulnerabilities won’t have to cross my mind whenever I use it.

    In addition to the Bluetooth vulnerabilities other commenters have mentioned, a recent one affects headsets with Google’s Fast Pair feature. Once forcibly paired, an adversary can register the headset with their Google account. The headset thereafter pings nearby Android devices as part of the find lost devices network and can be used to track the victim.

    Not sure if they are in production any more, but I can recommend the old iPod-looking Walkman and Sansa MP3 players. Currently also using a no-name iPod nano clone for the fact that it has a microSD slot, even upgraded the internal battery a few months ago.







  • If you are in the US, take a look at Fidelity or Vanguard. They haven’t required the use of a smartphone app.

    Using a phone with Android 8 isn’t best practice for security by any means, but unless you are being targeted or going around downloading shady apps, it’s more likely it will run into app incompatibility issues in the coming years than anything else.

    For sites where I’m making a low-value, one-off purchase and never coming back, I’ll use a pseudonym alongside a prepaid gift card, or failing that, a privacy.com virtual card. Not quite a sustainable strategy with eBay or Amazon, especially if the package needs a signature, so I’ll just use a privacy.com virtual card and supply a P.O. Box address

    Mostly accepted that it is the way it is for these things. If the privacy-friendly option is giving up a few conveniences, I’ll take it. But if it’s keeping me from reaching certain goals, I’ll tolerate a compromise. I don’t think I’m being targeted either, so it’s all tolerable in my personal threat model.


  • I did once while abroad. None of the shoe stores had the style I wanted in wide, so I went on Amazon and found a pair which reviewers tended to say fit well. Particularly that the listed size matched their expectations when they tried the actual shoe on. Ordered the size I thought would fit me and it did in fact fit me perfectly. It lasted about a year until it started leaking at the glued seam, which to be fair, wasn’t too disappointing for a 48-Euro no-name pair.

    Granted, that was for men’s hiking shoes, can’t really speak for finding good high heels online. Other than for that one-off occasion, I’ve only shopped for shoes and clothes in-person.








  • Mixed bag. I’m lucky enough that most of my work can be done on a Linux machine. Workplace does require us to bring our own devices, but the policy is extremely lax, no need to install any monitoring software or the like. Which lets me have a Linux desktop chilling on my desk.

    But I do have to keep a laptop with Windows around. We sometimes have to work with overcomplicated Office documents that break on alternatives like LibreOffice or the occasional piece of proprietary software that needs direct USB access, which Wine cannot yet provide.