arran 🇦🇺

  • 0 Posts
  • 88 Comments
Joined 2 years ago
cake
Cake day: September 23rd, 2023

help-circle









  • I ran Gentoo Linux 2003 to about 2008. I initially picked it up because of a hype. However, I loved the degree of customisation over the system that I got at the time. The install process teaches you of alternatives to things that distributions would include. It gave me a lot more choice as to what I used with my system and the process of installing. It definitely made me understand how the system worked a lot more.

    I reinstalled it 2023 and I’m still using it too today. My reasons are different now. One is a hint of nostalgia. However, another is the package manager. Since the package manager is only text files, it is very easy to extend and change with your own packages. Releasing packages on other systems is much more involved process.

    Another reason is when you compile the code yourself you can choose the options to some it degree with use flags. I still build my own kernel as I can choose what to include and I think I will be moving to a unified Kernel in efi soon and do away with grub.

    Using Gentoo compared to most other distributions the system feels more open and more malleable.

    While I do consider arch rather similar and I did use it for a couple years. The AUR scared me a bit.







  • Udemy with email: Udemy gets your email, and will probably require a verification process to verify that you own it:

    Udemy with Google Sign in: You click through in your browser, to authorize Udemy to obtain some details (usually just email + basic profile details), Udmey gets a “token” (effectively a random string) which they can send to google to retrieve these other details, and verify you still have an account and you (or google) haven’t revoked access, which they can use now and in the future. They don’t need to verify your email as they have a token that is “proof” already. To you it’s a click through, to everyone else it’s a bit more complex. If Udemy has a data leak, if they didn’t store your email directly, it’s possible that the token could be reset before someone is able to obtain it. But it’s unlikely they aren’t obtaining the email address as soon as you log in and storing it.