• 2 Posts
  • 24 Comments
Joined 4 months ago
cake
Cake day: November 7th, 2024

help-circle

  • Thanks for chiming in. I’ve confirmed creating the file in the file browser under “Home > .config > MangoHud” places the file in /var/home/curious_dolphin/.config/MangoHud, so I’m still scratching my head as to why I’m unable to edit the document after the initial save. As a workaround, I’ve placed the config file in my top level home folder (aka /var/home/curious_dolphin) w/ a link to it from /var/home/curious_dolphin/.config/MangoHud where the app expects, and this seems to be working as desired.



  • Can you create any files in $HOME OR $HOME/.config/ ?

    Yes - I can create (and later edit) files under /home/curious_dolphin, even under /home/curious_dolphin/.config, but for some reason once I’ve created a file under /home/curious_dolphin/.config/MangoHud, I cannot edit it even though the file and its parent directory appear to have the same permissions as the other files that I can edit.

    In other words, after creating test.txt under /home/curious_dolphin/.config/MangoHud, I cannot edit it:

    curious_dolphin@bazzite:~$ ls -la ./.config/MangoHud/
    total 20
    drwxr-xr-x. 1 curious_dolphin curious_dolphin   42 Feb 20 14:46 .
    drwxr-xr-x. 1 curious_dolphin curious_dolphin  552 Feb 20 14:47 ..
    -rw-r--r--. 1 curious_dolphin curious_dolphin 9671 Feb 20 12:22 MangoHud.conf
    -rw-r--r--. 1 curious_dolphin curious_dolphin    5 Feb 20 14:46 test.txt
    

    However, after creating test.txt under /home/curious_dolphin/.config, I can edit it:

    curious_dolphin@bazzite:~$ ls -la ./.config
    total 44
    drwxr-xr-x. 1 curious_dolphin curious_dolphin  552 Feb 20 14:47 .
    drwx------. 1 curious_dolphin curious_dolphin  460 Feb 20 14:41 ..
    drwxr-xr-x. 1 curious_dolphin curious_dolphin   42 Feb 20 14:46 MangoHud
    -rw-r--r--. 1 curious_dolphin curious_dolphin   10 Feb 20 14:47 test.txt
    







  • Excerpt from the article:

    The Washington Post reports that the demand was issued in January under the U.K.’s Investigatory Powers Act 2016, also known as the Snoopers’ Charter. Officials demanded “blanket” access to end-to-end encrypted files uploaded to its cloud by any user worldwide, according to the report, rather than asking for narrow access to specific Apple accounts.

    According to the Post, Apple will likely stop offering its encrypted cloud storage offering, Advanced Data Protection, to users in the United Kingdom. That access would not give the U.K. authorities backdoor access to encrypted files in other countries, including the United States.

    Apple did not immediately respond to TechCrunch’s questions but has previously warned that creating a so-called backdoor for law enforcement would expose users’ personal data to hackers.


  • The ITEP report cited by the article calls out the fact Tesla uses the accelerated method of depreciation and amortization instead of the straight line method. This means instead of depreciating an equal amount every year over the course of a machine’s life, they are weighting these expenses more heavily in the near term in exchange for a lower expense (read: lower tax deduction) down the road. This Investopedia article explains it in more detail for those who care to learn more.

    The ITEP report calls out other tax credits as well, such as carrying forward net operating losses from previous years. For anyone who cares, the full details are in their 2024 10-K filing. Open up the document, do a Ctrl+F search for “Note 13 – Income Taxes” and look at the tables on pages 80 through 82. I admit that there are several line items that I do not understand. I plugged them into Perplexity AI and asked it to explain them in layman’s terms. My brain’s too fried at this point, but I’ll leave the link to that explanation here (again, in case anyone out there cares to learn more).







  • You’re mixing multiple subjects here, one being the logistics of blocking a federated system like Lemmy, the other being whether the wrong person finds the content of such a system objectionable and labels it a “national security issue.”

    I’m being a tad pedantic here, but my reason for pointing this out is that I think #2 is not far fetched at all, but I’m unsure of how feasible #1 might be and would love if somebody who knows more than I do would chime in.

    EDIT: Looks like some have already discussed #2 in the other comment thread started by Teknikal.