this post was submitted on 23 Apr 2026
379 points (94.6% liked)

linuxmemes

31160 readers
2399 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • Don't come looking for advice, this is not the right community.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
    (page 2) 19 comments
    sorted by: hot top controversial new old
    [–] bulwark@lemmy.world 15 points 23 hours ago (1 children)

    Jokes on them. I'm a pirate who likes Linux.

    [–] DarrinBrunner@lemmy.world 5 points 22 hours ago* (last edited 22 hours ago)

    Arrgh! Me matey! It's off to Antarctica with us, then! Penguins ho!

    [–] drdiddlybadger@pawb.social 14 points 23 hours ago (1 children)

    They can pry it out of my solid state drives 😀

    [–] Digit@lemmy.wtf 4 points 22 hours ago

    Unwise invite.

    [–] GirthBrooksPLO@lemmy.world 11 points 22 hours ago

    Then I'll die an outlaw

    [–] Jaysyn@lemmy.world 9 points 22 hours ago

    No it's not.

    [–] Skullgrid@lemmy.world 9 points 23 hours ago

    then you move to gentoo, BSD or retro computing using existing cds/floppies/usbs

    [–] yaroto98@lemmy.world 8 points 23 hours ago (2 children)

    They can't really make linux illegal. They'll make selling devices without age verification illegal. Essentially making selling devices with an OS that doesn't play ball illegal.

    [–] pivot_root@lemmy.world 11 points 22 hours ago* (last edited 22 hours ago) (1 children)

    They can't make it illegal, but with a little frog-boiling, they can make it functionally useless for visiting websites you might need to use. No identity verification = no access, and Linux = no identity verification.

    [–] Truscape@lemmy.blahaj.zone 3 points 21 hours ago (1 children)

    I'm certain a "John Doe" false identity signature would be trivial to create.

    [–] pivot_root@lemmy.world 6 points 20 hours ago* (last edited 20 hours ago) (2 children)

    Not if they use cryptographic signing.

    Browser sends website the signed identity verification, then the website checks the signature against some key in a list of trusted identity verifiers. With the verification responsibility being pushed to the OS vendors, that will be a short list of tech megacorporations. And maybe Canonical or Red Hat, if we're lucky.

    load more comments (2 replies)
    load more comments (1 replies)
    [–] Truscape@lemmy.blahaj.zone 6 points 23 hours ago (3 children)

    Archive everything you can. Best time for a personal database was yesterday, second best time is now.

    load more comments (3 replies)
    [–] notsle@kzoo.to 4 points 23 hours ago
    load more comments
    view more: β€Ή prev next β€Ί