

Pfft. That sounds like something a pocket calculator would say.
Just a regular Joe.
Pfft. That sounds like something a pocket calculator would say.
struts in his fancy pants
Be careful of dualstack and IPv4-only VPNs. The client can discover and advertise the real IPv6 address, even if adequately firewalled. I’m not sure if gluetun addresses this risk.
edit: this should be considered a risk even if you don’t have IPv6 support today, as this could be enabled by your ISP in the future, then automatically enabled on your network by your router.
Hah. I was just playing a YT video of modem sounds for my son, after showing him some “history” videos about early PCs, BBS’s, text adventure and early commodore* and PC gaming.
History? I lived it, son.
Grey-stubble Gen-X’er here… The 80s and (moreso for me) 90s were a great time to get into tech. Amiga, DOS, Win3.11, OS/2, Linux… BBS’s and the start of the Internet, accompanied by special interest groups and regular in-person social events.
Everyone was learning at the same time, and the complexity arrived in consumable chunks.
Nowadays, details are hidden behind touchscreens and custom UXs, and the complexity must seem insurmountable to many. I guess courses have more value now.
Only in the US, and for mapping companies that now have to treat the US as a “sensitive” country.
The rest of the world can continue to call it by its internationally recognised name.
Don’t know about “happily”. “Readily” might be more accurate.
Additional SPoFs: Your upstream internet connection, your modem/router, electricity supply, your home (not burning, flooded, collapsed, etc.). And you.
Not sure it’s essential, but it seems the norm.
Anything that helps breaks the twit’s influence is useful for now, though.
Nokia Jaws was the best.
Not A.I, just a terrible system that incentivises (and even demands for public companies) abusive behaviour.
Ha, mia samideano! Tre bon’!
Temporal is MIT licensed and comes with multi-tenant security features and its durable execution model is solid and scalability is phenomenal. They upsell to the cloud offering and the default OSS auth plugin is intentionally limited (you might want to develop your own if you self-host). You’d probably only look at the Temporal UI when debugging.
Windmill is very cool, but it is only suitable for trusted teams due to its security model. If you want to be able to develop scripts and workflows in the web browser and run them together with trusted colleagues, on a schedule etc., then windmill might just be for you!
25 or so years ago, I learnt Esperanto (my first second language) by chatting on the Internet. I’d have two windows open - one with the IRC client, and the other with a terminal and a shell script that would grep a txt file with consistent formatting. “esp esperantoVerbPrefix/” or “esp noun,” or “esp affix-” would typically return the correct result in a split second. Thanks to the simple grammar (that I had quickly memorized), I could hold conversations in near real time as a result.
I wish I could have learnt my other languages as easily.
</story time>
NFSv3 (udp, stateless) was always as reliable as the network infra under Linux, I found. NFSv4 made things a bit more complicated.
You don’t want any NAT / stateful connection tracking in the network path (anything that could hiccup and forget), and wired connections only for permanent storage mounts, of course.
Hah. I hadn’t seen that article / heard of the theory, but as far as crackpot theories/hypotheses go, it’s one of the more likely (edit: to come about). I doubt it’s anywhere near the majority yet, personally.
It was already obvious that propaganda news articles (on obscure websites) had orchestrated releases and promotion on social media, in a massive circle jerk, and I assumed machine generated/assisted content was involved. Then ChatGPT hit the headlines and we all had the power.
Whose deepfake influencers do you “trust” more? US, China, russia and a few lesser players are already working to control the information space / spread propaganda (note: not necessarily/always lies, but there is typically a focus or spin) far and wide.
We know people are highly influenced by propaganda (some more than others, but all of us are) and that quantity and repetition plays a role. Since this is now an established battlefield, I’d like our (western) defences to be strong.
It has potential for abuse, certainly. That’s par for the course. There is also the potential for it to be used to debunk fake news, shock people out of false beliefs, and help reconnect people to reality. Let’s see how this plays out. popcorn time
How will running a CA limit access? eg. Do you want to do client side cert validation? That sounds like an overcomplication. Also not ideal to run a CA (have signing keys) on the proxy server.
There have been a few cases, of course. There have also been investigations and prosecutions. But it is NOTHING LIKE russia’s forced conscription in LPR / DPR.
The anti-Ukraine propaganda effort is very real, and organized. You can see the propaganda-boys/bots in the comments here - just look at the frequency and content of their posts and comments.