@realman543 @charlie_root
Yeah, someone posted it here on Fedi some time ago — the video might be different, but the message is essentially the same and it had WAY more swearing 🤣
@santiago
Probably the same thing Ableton Live does when it gives you the option to transpose the audio track, but keep it the same length — not that it was invented there, there were earlier pitch shifting techniques, but the fact that it works on a G4 in real time makes it admirable 😁
@realman543 @charlie_root
Do you have the Polish version? That one was simply the best 😂
@charlie_root @dcc @realman543
Yeah, very temporarily, like postpone them till 2035 😏
https://social.librem.one/@m0xee/113021708657902055
Turning off the updates for good isn't such a good idea IMO — as it prevents Defender malware definition database from getting updated.
@santiago
Don't you have to do some sort of time-stretching to accomplish this without speeding the video up? 🤔
@Hyolobrika
No idea, never used it 😏
@Hyolobrika
No, it's Mozilla's generic white on #1C1B22 (no idea what the name of this colour is) — but you can make it you way with userContent.css — and I never tried making these myself, but I'm pretty sure you can make an extension that does this — or, look it up, maybe someone already made one 🤷
@Hyolobrika
…with self-signed cert your first visit might already be to a forged website, making you trust this "fake" cert, but with LetsEncrypt and the website out of the state's reach (not hosted in Russia) — you're safe.
@Hyolobrika @Hyolobrika
LetsEncrypt at the very least checks that it's indeed you who controls the DNS record — not much and it won't protect you from a malicious hoster (see jabber.ru case), but it might be useful against a malicious ISP and to a degree, a state actor. E.g. in Russia people are encouraged to install a new CA cert, then the state can make ISPs redirect the traffic to a forged website…
@Hyolobrika @Hyolobrika
Self-signed certs do not provide the capability to revoke them. Imagine that a malicious actor isn't just spoofing the site you trust with their own self-signed cert, but that the private key got compromised. With self-signed certs you have no way of telling users that the already trusted certificate is no longer valid, such a capability implies some sort of infrastructure and infrastructure implies hierarchy as someone has to operate it🤷
@iska
Wasn't it shut down?
@romin @prettygood
Damn, you're right! Even concatenating the archive with a JPEG-encoded image probably won't work as it likely re-encodes them 😩
@Hyolobrika
It also keeps the fingerprints so if you get a different cert on a later visit, it will give you a warning again.
To simplify adding an exception on the first visit you might want to consider this: http://kb.mozillazine.org/Browser.xul.error_pages.expert_bad_cert
@Hyolobrika
It almost works like that already.
When you open a page on a server with self-signed cert, it gives you a warning, if you accept it, it adds an exception for that cert — you can see the list in preferences under Privacy & Security → Certificates → View certificates → Servers
@romin @prettygood
🤣
Technically I can just attach a 10 Mb zip file with the post, but would anyone bother reading that? (Or all that alt.text)
@prettygood @romin
It did fly… sideways — I'm splitting my posts into eight parts 🤪
None
Just in case: DMs/PMs simply don't exist on this instance as concept — don't use them, use the other instance if you absolutely have to, or send an email to any address at m0xEE.Net or .Com or .Org, but I prefer keep most communication public.