<<@MarbleGiant says : There is a huge difference between corporate policy and human mischievousness. No document is safe in the hands of other people. Also, ‘used for advertising’ and training an in-house AI are very different.>> <<@AmericanTj-Trump-Vance-2024 says : I think when you think of the m.2 connector people compare it to a m1 Mac or the m2 processor on the Jupiter. Confused me as well but that is a myth.>> <<@dreamyrhodes says : Manwhile Microsoft reads onedrive data. They stated clearly that they look for illegal stuff in the data. Sure they do it automatically however there is still a system scanning your stuff. And what's legal in one place could be illegal in another (or become illegal). And when a dad gets a visit from police because his wife synced her phone with a PC connected to onedrive and had a photo of their daughter bathing on that phone, this is a real issue.>> <<@dainess2919 says : They had chances for years to give a blunt "no we're not expecting Windows 10 to be the last Windows" and chose not to for a business consideration>> <<@IIGrayfoxII says : While you do not NEED to use the terminal in linux. Somethings need the terminal. If you need to install a program that is not provided in the software store by default. You will need to add the repo location. While adding these PPAs can be done via GUI, Websites will not tell you how to do it via the GUI, they will just provide a command to add it by giving you the "sudo apt add-repository" command followed by the "sudo apt update" They wont say go to system settings, software sources, add repositories, add, repository URL, OK.>> <<@cheako91155 says : How would you even know if google didn't use personal files in docks to train AI models? That's quite the assertion.>> <<@retrozmachine1189 says : "Windows is slowing your network down", anyone remember that? Bandwidth Reservation Protocol that appeared in XP's networking protocol list. Of course it didn't blanket reduce your network by chopping out 20 percent or what ever it was. It was merely the limit on the maximum bandwidth on the pool that programs could optionally ask XP to reserve for their activities, typically streaming media players. If no program made a BRP request, it made no difference. Yet magazine after magazine told people to remove BRP because it's slowing your internet!!!>> <<@IanHodgetts says : Urban myth #8 the * is called "Asterix". No, that's "The Gaul", the star chacater is an asteriSK.>> <<@bland9876 says : I kind of considered the myth of having to use the command line in Linux as true because a lot of times when you look up how to install a program on Linux rather than doing it the normal way out Windows the Linux will tell you here's a command line code type it in or copy and paste it and then it'll do everything for you.>> <<@jgarbo3541 says : You believe anything Google says? You should get out more...>> <<@DesordenadoPeroUtil says : I don't trust Google, but I use it. And I have a lot to hide. Or not.>> <<@SnowyRVulpix says : I'd argue you haven't needed to use the terminal in linux for at least 14 years.>> <<@bbman10pwns says : Microsoft and Google scan for CSAM and copyrighted material in emails and files. Allegedly Microsoft even attempts to unlock password-protected zip files using keywords in the email body. So yes, they are reading our documents...>> <<@The_Chad_ says : I think one point that may be lost on you is that people complain about micro-usb because we want to move on to a world with only one connection standard. Micro-USB has a reputation of being very unreliable, wearing out quickly causing bad connections, and is directional. It's not the speed, although sometimes that may be a factor. Other than that, awesome video!>> <<@moopet8036 says : Google has been explicit about a lot of things that aren't true, and just because they might not use Docs for their ad service, doesn't mean they don't use it for something else - AI training, etc.>> <<@JolynBowler says : 💙🌻💙 Thank you.>> <<@jeffsadowski says : Personally I look for usb type-c devices because 3 facts. 1) it is designed for more plugs and unplugs than usb mini or micro. 2) more durable than usb micro or mini. 3) you can plug it in 2 ways. I have had two many issues with mini or micro that I am extremely unlikely to buy another device with any other plug than a USB type-A, type-B, or type-C. Micro or mini are just not as sturdy and deserve to be retired.>> <<@joschafinger126 says : As for needing the terminal in Linux, I've found the following, having used a bunch of distros since 2009 or 2010: - If you use a major desktop environment (DE), you usually don't. - If you run into a problem (while using a major DE), it's often _way_ easier though not necessary to use the terminal. - Using the terminal for stuff that's not more easily achieved by less than four clicks, or for routine stuff, is actually _less_ complicated than using the mouse, especially things like updating or shutting down: most terminals remember your last commands, and [Ctrl] + [t], then hitting the Arrow Up key a few times saves a _lot_ of time. - Following instructions for troubleshooting is _way_ easier if they boil down to, "copy-paste the follow into the terminal, put in your password as prompted, hit [Enter]".>> <<@rika-chan says : 5:57 people care because the micro usb connector is much flimsier and usb c was sold as a "port to end all ports", so people can mix and match cables as they wish (though with the caveat of specific version support). I don't think people really cared if their tablet supported 10gbps or 20gbps since it's obviously not going to push that kind of data>> <<@EasyMoney322 says : Most raid controllers protect drives from power outages by using batteries and data transactions. Also most of nvme drives have supercapacitors to protect drives. Raid1,5,6,7 etc protects not data, but rather the state of block sectors. Its up to FS to detect inconsistency with data on these sectors. Btrfs, for example, is capable of detecting such issues. This is why Mirror-raid is a bad idea, because you may not tell which drives containts the correct information in some cases. It is also possible for the controller itself to fail. I've restored drives from raid controller failure, and wouldnt wish to anyone to restore the raid by the hand.>> <<@lnxguit says : Kudos on a great, informative episode!>> <<@nullx8 says : have to use terminal?? its a choice, and its usually the right one, its much faster, takes less reccources and you get straight to what you want to get done, thats why i almost always have a terminal window open on linux and osx computers (even on windows some times)>> <<@edwardharding5677 says : I just realised that this video sort of reminds me of the 'Annoying Computing Things' series you did a while back. It's nice to hear someone rant on about what big tech have decided to do and some of the lies that are spread in the computing media!>> <<@smb1397 says : i wish youd shown the USB drive in Disk Management before cleaning it, jsut to explain why that happens>> <<@bumbixp says : After "clean" in diskpart I usually just do this to create a new partition: create partition primary format fs=fat32 quick>> <<@alfepalfe says : Wow, formatting a Linux USB through Windows was complicated. Back when I was still using Windows a bit I remember trying a few times and giving up. I just booted back to linux where I could do it with cfdisk and mkfs. Or Gparted if you reallt needed a gui. Also, only trust google drive services if you encrypt everything before uploading and only store the keys locally. Same with Microsoft, can't see the source code so one had to assume it's spyware. At least when libroffice and Linux exists which is just as competent as MS Office. Also, Windows 10 was indeed my last Windows version. When 11 released I was like 'man, this looks awful, how hard could Arch be" and, turns out, for the most part in my experience Archlinux has just worked, even more so than Windows ever did. Windows was always giving me problems which Linux is yet to really do for me, at least after a year of usage.>> <<@Pocket-Calculator says : The biggest myth: "Linux is an operating system.">> <<@cryptearth says : although late to the party and hence the chance getting noticed is rather slim - but as barnacules' video got referenced I had to watch it - and I have to strongly disagree about "raid's not a backup": 1) he used raid completely wrong: not even a raid0/stripe kills the "redundant" part completely from "raid" it's meant and was specified even back in the days of when it was invented to provide speed - and speed only - for the risk of data loss - using it for anything else but volatile data which have to have fast access times and high data rates both in read and write is user error - don't blame raid for it 2) yes, although a raid is not a backup it's the first line of proper data storage: one doesn't need a direct attached raid using a HBA or an expensive RAID card (a: don't use "hardware" raid; b: NEVER! use on-board fake-raid like intel rapid storage or what amd boards come with) - but a nas usually should be in a multi-disk config - either mirror or parity - rely on single drive in a nas isn't any better than using a single external drive 3) raid - or better phrased: multi-drive - highly depends on its implementation: going "hardware" raid (there's no such thing - all "hardware" raid cards are just ASICs running some proprietary algorithm - it's still software instead of physical hardwiring) is stupid - going on-board fake-raid is even stupider - if at all one should go pure software raid - why? because it can be restored on any hardware - preferable one should use an open standard like lvm, md or special designed filesystems like btrfs or zfs (storage spaces and refs are fine, too - but it's still proprietary to windows and getting it to work in a winPE environment is a pain - also: creation of refs got striped from regular pro versions but requires either pro for workstation or server - for no particular reason other than microsofts greed to sell more expensive versions for features that should be standard since win10 became a thing 10 years ago) personal opinion: you CAN get away without a proper external backup - when using something like zfs and a raidz2 vdev and actively monitor your drives - I just recently recovered from multi-failure of 3(!) drives over one weekend without data loss and currently on saving for additional drives to replace those which still need to be replaced>> <<@ShadowDrakken says : #1 still reads like Windows 10 was meant to be the last Windows, your take on it jumps to conclusions that aren't explicitly stated, and the clarification even reinforced that original sentiment that Windows 10 was meant to be a continuously updated product with no EoL #5 read the Google Docs terms of service, it explicitly states that Google will use your docs for AI training. Thus Google is 100% reading your Google Docs #6 many Linux apps continue to lack UI access to many of their settings, and the terminal is also REQUIRED to install a lot of apps that aren't publicized on the various package managers. So yes, using Linux REQUIRES the use of terminal>> <<@27duuude1 says : Interface vs Formfactor vs Plugtype Sorta like explaining that the electrical plugs that use a ground aren't gonna draw more current>> <<@valdisxp1 says : I'm sorry, but what is the practical difference between "reading" and "scanning" your online docs? In both cases they have access to your unencrypted data and feed it to some of program. In one case it feeds your online profile for targeted ads, in the other it fills some file metadata virus:yes/no. They can be scanning for many other things. There was the case with someone sending a picture of his toddler to his doctor during the 2020 pandemic and Apple sending the police and CPS, because their scanner found a picture of a kid without clothes. I'm not saying that the cloud providers read your data, but they can and as an outsider you cannot ever know for sure. That is why the cloud providers often offer the ability to bring your own encryption keys - to remove the doubt.>> <<@valdisxp1 says : To be fair, Microsoft did not bother to correct the "Windows 10 being the last Windows" rumor and set the record straight. They can try to shrug their shoulders and try to wash their hands of it, but that doesn't make much difference to me.>> <<@garrettloughran2761 says : He literally says that in the video. Of course it got to read it to enable some advanced search features.>> <<@SebastianWeinberg says : While I don't think that Google "reads" documents stored in their service, aside from automated malware checks, your last argument against that myth doesn't really convince.  Potential consequences for getting caught doing something only motivate against _getting caught_ not against doing it.  Loads of companies have done loads of unethical or even outright criminal things, because they judged the chance of getting caught low enough and the reward for the violation high enough that they just went ahead and did it anyway.  Google is merely aware that far too many people _already_ suspect they're doing it and are watching for it, trying to catch them in the act, so that they'd never get away with it undetected. So, just like when the Mythbusters arrived at a correct conclusion from a flawed experiment, I'm left thinking: "You're right, but _that_ didn't _prove_ it, like you think it did.">> <<@VV0RK says : Google does censor samizdat. Legal content it deems objectionable is deleted.>> <<@martonlerant5672 says : ...whats in the cloud is still in it. Obviously cloud providers dont make.business of reading content. Doeant mean that whats in the cloud cannot be obtained legally.>> <<@DePhoegonIsle says : bruv, my boy.. When google is known to skim for advertising and read 'gmail', it's absolutely clear they'll read your stuff for other stuff as well. I will also say ' Does not use for advertising ' does not mean, 'will not read' it only means that your ads will not shift. While I get the 'it'd rip their business apart' .. honestly it wouldn't like you think it would. 1. Google is embeded so deep that android phones sending text messages is enough to flag an ad, along with just talking to someone in the range of the device. 2. MS uses the information from the files in storage, and the truth is it isn't private... just like it isn't private in google side either. 3. All it would take is for someone to report a hash as csem/csam* material, and fool the official site for a day to have anyone with that file has online drive siezed & shut down, along with the feds informed. -- Or spoofing it on virual dectors to the point it's considered radioactive. aka, someone having access to your storage means it's not private. I also say this as someone who makes use of the Onedrive (1TB) storage. 4. It's a fool to think that ultra large companies wouldn't seize an invention or brilliant idea from some nobody who hasn't patented it yet, and has no legal protections. I 100% google, MS, Facebook, etc would completely seize an idea like that if you stored it in a way it was readable.>> <<@hansisbrucker813 says : Linux without commandline was perfectly doable like almost 20 years ago when I was running Ubuntu 5.10. Having said that, I love using the commandline and even use it on my phone in the form of Termux.>> <<@dootbitch says : I do not agree with the last part - I have recently started using ZorinOS and I could not install virtual box without installing some stuff in the terminal (as one example). Sure, it is much better than before, but you are not completely free of the terminal on any distro.>> <<@michaelturner2806 says : There's a big difference between "Google can't access your private documents" and "Google has not *yet* exploited your personal documents for profit". Things stored in Google products are not user-encrypted, therefore Google can access them, regardless of if they see use in doing so or not.>> <<@amirhosseinmaghsoodi388 says : Thanks for the video. Quite informative.>> <<@boredincan says : When did the "I" in RAID change from "inexpensive">> <<@Jako1987 says : True. You can't trust most of the stuff so you have to trace to the source by yourself.>> <<@jamesslick4790 says : I was always suspicious about the IDEA that Windows 10 was the LAST version of Windows. It was (to me) a dubious idea. Windows IS Microsoft to most people. I could not see them "ending" the Windows line, and becoming a "service". What would NEW (after 2015) computers use? Sent from my Windows 11 lappy! LOL.>> <<@polocatfan says : 11:19 I mean i believe they don't, but companies shockingly can LIE>> <<@ronaldgarrison8478 says : Some words are just not good words, in practical terms, and should be avoided. "Last" is one of those.>> <<@oleleclos says : The 3-2-1 rule is the only way to keep data safe - stressing AT LEAST, because the more the merrier! The next question is "how often"? The answer is "as often as you can afford to lose data for". So if you think you can live with losing up to a month's worth of data (reasonable for many private users), you need to move a copy off site once a month. If you can only live with losing a week, do it every week, and so on. Many businesses can't afford to lose more than a day's worth of data to fire, flood, malware and other dangers that lurk. It's insurance, and we never think we need it - until we do!>> <<@TheRetroEngine says : I CHOOSE to use the Linux terminal. With a nice cup of Yorkshire Tea standing by.>> <<@MAGICOmagique says : Google 100% can read google docs and there is no way to prove it does not. Therefore it's ok to assume it does.>> <<@Bunny501 says : USB C might not be an interface, but a product using usb micro b is a piece of crap if you'd like to plug and unplug it more than 100 times. It self destructs, cable damages the socket, the plug is flimsy and bends easily. For a graphics tablet connection speed really doesn't matter, reliability on the other hand does>>
VideoPro
>>