semi [he/him]

  • 5 Posts
  • 35 Comments
Joined 4 years ago
cake
Cake day: September 3rd, 2021

help-circle



  • I prefer KeePass over Bitwarden because it is just a simple database file, less that can go wrong (no server component).

    I am the original author of the Rust library for decrypting and modifying KeePass databases.. The current best implementation of KeePass, KeePassXC, is written in C++, so there could theoretically be security-relevant memory corruption bugs in it (though the developers of the project are excellent and I don’t think it is super likely). Rust is a language that does not have that class of issues by design, so I thought it would be interesting to see how far I could get. So far, I am still having fun and adding features bit by bit, and it is quite cool to me to be able to write one codebase that deploys to Windows, Linux, MacOS, Android (potentially iOS), and any modern web browser.

    Our son is fortunately very relaxed, he eats and sleeps a lot so I can get some coding done while he is sleeping. Germany has decent parental leave, so my partner and I are both not working the first two months of his life.




  • This is exciting. My only request here is: whenever it works please release a standalone wasm file somewhere (anywhere). So many projects either require building the wasm themselves, or instead of releasing a .wasm, they release a JS wrapper that auto-loads the wasm/wasm-imports. Its a pain to try to extract the wasm out of those projects.

    What I am doing is to create a omnikee-lib crate within the project that will get compiled to WASM, not just plain keepass, because I need additional adapter methods to interface with the web part of the application. I don’t have the bandwidth to turn keepass into a general WASM package that could be npm installed at the moment. As I am dogfooding the crate, I might get to a point where I know what a good JS interface for it would be, though, and the omnikee-lib crate could become the official WASM interface for keepass.










  • semi [he/him]@lemmy.mltoTechnologyInteresting SSH Authentication Mechanism
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    1
    ·
    4 months ago

    I think the Google as an identity provider example is misleading. The more common use case will be medium to small companies where several admins/developers need to login to various servers and where manually adding and revoking keys across these servers will be cumbersome.

    As the other commenter said, in those cases, the organization would also deploy its own IDP.


  • The mirrorlist is a configuration file listing servers that updates can get pulled in from.

    When a package update is installed that contains a configuration file, it will not overwrite the old file but be installed with a pacnew extension so that you can merge the files (like you did). It will keep complaining at you until you remove the pacnew file, which is fine to do after you have merged successfully.

    The graphical issues are probably due to something else that happened during the update.



  • For inference (running previously-trained models that need lots of RAM), the desktop could be useful, but I would be surprised if training anything bigger than toy examples on this hardware would make sense because I expect compute performance to be limited.

    Does anyone here have practical recent experience with ROCm and how it compares with the far-more-dominant CUDA? I would imagine that compatibility is much better now that most models are using PyTorch and that is supported, but what is the performance compared to a dedicated Nvidia GPU?