Affinity is one of the things i lost in moving from windows to Linux, but I’ve been getting by.
I bought a license before canva acquired it and quite enjoyed the software.
Really sad to see canva doing what everyone knew they would do to it.
I do a little bit of everything. Programming, computer systems hardware, networking, writing, traditional art, digital art (not AI), music production, whittling, 3d modeling and printing, cooking and baking, camping and hiking, knitting and sewing, and target shooting. There is probably more.
Affinity is one of the things i lost in moving from windows to Linux, but I’ve been getting by.
I bought a license before canva acquired it and quite enjoyed the software.
Really sad to see canva doing what everyone knew they would do to it.


This is kind of how VeraCrypts hidden partition feature works.
You start the process of the volume’s encryption and set a “false” password for it. It creates a partition that is encrypted with that password. When it finishes, you mount it and store “fake” files, the files you would reveal under duress. Veracrypt then takes in a second password and creates a “hidden partition” in the remaining free space of the disk - to be clear, that memory space still reports as unused/free if investigated, but the partition is there.
You can then mount that with your second password and store your actual files. You can work with files and folders in the hidden partition as needed, however if anything is added or changed etc in that first fake partition, the data in the hidden partition will be corrupted by those actions.
This means that so long as you plan ahead, someone can literally put a gun to your head and demand the password to the encrypted disk, and you can give them one that works without revealing the data to them.
In theory, since the data in the hidden partition is encrypted and unreadable, it is impossible to detect that it exists in the “unused” space of the disk, even by a forensic analyst. To them it would just look like old, randomly flipped bits that came from previous usage followed by a quick format.
Now, what’s really cool about this is that if you use the veracrypt bootloader, you can store and boot from an undetectable OS you store in that hidden partition, while having a decoy operating system on the visible partition:
https://veracrypt.io/en/VeraCrypt Hidden Operating System.html


With this question asked, I’d like to build on it and ask what options exists outside the realm of google given their recent bullshit.
For those who know, tell me about the pine phone, fair phone, anything else like this.
When google fucks shit up in the near future, I would very much like to hold on to the ability to side-load apps using obtainium and f-droid indefinitely. Are the pine phone/ fair phone reasonable for this? What pros and cons am I looking at?
I’d love some example questions for this.
I can’t share it all here for reasons I can’t detail.
I may do a second write up at some point for public distribution and if so, I will share it with you here.
I am trying to get people I know personally to stop posting and reading and instead begin to focus on the very basics of actual organization, in the form of simply being able to communicate effectively and securely.
I have collected and written up information for them with the consideration that they are non-technical, pertaining to secure and private communications primarily, but also many more potentially useful emergency-scenario information and data which I will not speak about here.
The package I have started giving to my friends contains information such as:
I firmly believe that the majority of Americans will not do anything until someone is actually showing up at their door, coming after them in the street, or destroying the regularities of their personal day to day life, so my intention is to distribute materials which they can turn to when the fear sets into them well enough that they are scared to talk about such things openly.
It is clear to me that most of my American friends at least, at this point, still only feel superficial fear and outrage. The other day I asked them “If you had to vandalize a public space with a piece of art, what would you draw or paint? Let’s say it is the side of a bank”.
One said “tits”, one said “flowers”, one said “a fox”.
Even in a fantasy, they would not express fear or outrage in a public setting.


I have had pretty good luck with airvpn, but the ultimate is mullvad as I understand it, though relatively speaking it is much more expensive than airvpn.
I haven’t had a lot of time recently to look, but I know FL studio can mostly be set up to work through wine. The problems exist in the plugins/VST’s/ the VST management softwares/ the Audio interface drivers and latency.
If you do so, I would be interested in hearing about the experience and any troubleshooting you had to perform to fix problems.
My workflow is in FL studio, however the bigger problem is my VST libraries. I have the entire Arturia V collection as well as many, many more plugins and I am unsure if they would run on Linux, or if they do, how well. This is unfortunately a big problem as my collection of VST’s total into the thousands of dollars. I suppose I could run a windows VM to make everything function, but then I would probably have problems with latency/connectivity on my audio interface when I want to patch any of my hardware in, if drivers are even available for the interface in on Linux (It’s just a scarlett 2i2 I believe).
The moment I can verify a solution for my music production workflow on Linux, I know that I’m out as well.
I won’t buy a phone with any fewer than 16 folds.