Also worth mentioning: osu!lazer has a native Linux build, whereas osu!stable still requires WINE to run on Linux. That’s something I was very glad to see.
Also worth mentioning: osu!lazer has a native Linux build, whereas osu!stable still requires WINE to run on Linux. That’s something I was very glad to see.
Use Mullvad, unless you absolutely require port forwarding.
As another commenter said, it’s not possible to verify. You’ll just have to take each instance’s word for it.
Instance lists for some privacy front-ends will point out additonal info, such as if each instance is using CloudFlare or not (this may or may not be useful depending on if you distrust CloudFlare), some other services (like Rimgo, a private Imgur frontend) lets the instance hoster customize the privacy policy. But once again, this is all relying on the instance host telling the truth.
I would try what the other commenter here said first. If that doesn’t fix your issue, I would try using the Forge version of WebUI (a fork of that WebUI with various memory optimizations, native extensions and other features): https://github.com/lllyasviel/stable-diffusion-webui-forge. This is what I personally use.
I use a 6000-series GPU instead of a 7000-series one, so the setup may be slightly different for you, but I’ll walk you through what I did for my Arch setup.
Me personally, I skipped that Wiki section on AMD GPUs entirely and it seems the WebUI still respects and utilizes my GPU just fine. Simply running the webui.sh
file will do most of the heavy lifting for you (you can see in the webui.sh
file that it uses specific configurations and ROCm versions for different AMD GPU series like Navi 2 and 3)
git clone https://github.com/lllyasviel/stable-diffusion-webui-forge stable-diffusion-webui
(the stable-diffusion-webui
directory name is important, webui.sh
’s script seems to reference that directory name specifically)webui.sh
and webui-user.sh
are in the wrong spot, make symlinks to them so the symlinks are at the same level as the stable-diffusion-webui
directory you created: ln stable-diffusion-webui/webui.sh webui.sh
(ditto for webui-user.sh
)webui-user.sh
file. You don’t really have to change much in here, but I would recommend export COMMANDLINE_ARGS="--theme dark"
if you want to save your eyes from burning.yay -S python310
or paru -S python310
or whatever method you use to install packages from the AUR. Once you do that, edit webui-user.sh
so that python_cmd
looks like this: python_cmd="python3.10"
webui.sh
file: chmod u+x webui.sh
, then ./webui.sh
venv
directory from within the stable-diffusion-webui
directory and running the script again. This actually worked in my case, not really sure what went wrong…http://127.0.0.1:7860
. Select the proper checkpoint in the top left, write down a test prompt and hopefully it should be pretty speedy, considering your GPU.I assume 4chan does not sell your data with 3rd parties (it pays the bills from user donations and people who buy a ‘4chan pass’, I think advertisers might’ve pulled out from the site long ago, given its vulgar nature) however it does appear to comply with law enforcement. See this 4chan user who was sending death threats to a Florida sheriff on 4chan, and was later arrested for this: https://www.thedailybeast.com/tyler-meyer-busted-for-threatening-sheriff-mike-chitwood-on-4chan
I believe it’s possible that 4chan had given this user’s IP address to law enforcement. 4chan records your IP address when you post, and only administrators can see it: https://4chan.org/faq#postanon
You can also look at the Wikipedia entry for 4chan, similar users have been arrested for making these death threats: https://en.wikipedia.org/wiki/4chan
I don’t advocate for what these users do, it’s harmful, and they honestly have it coming when they get arrested–but it shows that if 4chan is compelled to reveal your information, they will.
It’s not possible to post under a VPN by default, they’re blocked site-wide to combat spam and automated posts, even though there’s already a captcha when you post? I guess they’re just trying to play it extra safe. You can post under a VPN if you buy the 4chan pass (https://www.4chan.org/pass), however 4chan does not support any privacy-centric options like Monero or even cold hard physical cash, which means even if you post under a VPN, you can still be linked to your posts via payment method.
Me personally? I lurk on there every once in a while, but I’ve never posted, for these reasons. At least I can post under a VPN on Lemmy.
Yes, Proton Mail Bridge. I use it with KMail, works pretty well, I’d say.
Edit: I think this client is only for desktop, however. Android users will have to find another option.
zellij attach --create-background
Nice; this was the only thing preventing me from making a full switch from tmux to zellij.
I think that is completely normal. I run Arch on my main desktop, OpenSUSE Tumbleweed on my laptop and Debian on any and all servers I host. And I think they all work wonderfully. Even outside of these distros, I can still see the use case for many other distros. I think many popular distros each have a specific goal in mind and they execute it well.
I get 8.44 bits (1 in 347.34 browsers). I use Firefox with Arkenfox user.js applied on top, with some of my own custom overrides.
However, I think the biggest factor could be because I have Ublock Origin set to medium-hard mode (block 1st party scripts, 3rd party scripts and 3rd party iframes by default on all websites), so the lack of JavaScript heavily affects what non-whitelisted websites can track. I did whitelist 1st-party scripts on the main domain for this test (coveryourtracks.eff.org), but all the ‘tracker’ site redirects stay off the whitelist.
I actually had to allow Ublock Origin to temporarily visit the tracker sites for the test to properly finish–otherwise it gives me a big warning that I’m about to visit a domain on the filter list.