![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/cd304a0c-e258-4a87-86cd-7ce21eb70191.png)
Yes. Because they’re either making a profit from your meta/data, or it’s a promotion that ends as myriads of “free” services did before it
Yes. Because they’re either making a profit from your meta/data, or it’s a promotion that ends as myriads of “free” services did before it
I would assume any app can read it. Just needs to request the permission http://androidpermissions.com/permission/com.google.android.providers.gsf.permission.READ_GSERVICES
I prefer having a convenient pull mechanism that I can trigger from a workstation in the lab network. I maintain the setup with Ansible
That sounds valid. I was thinking about the fact that most carbon credits are generated from deforestation reduction projects that renew yearly.
The great thing about blanket terms like “AI” is that you can slap it on everything.
Climate was only cool while you could buy fake carbon credits to make up lies about responsible computing at scale. Now we save the world with AI once again. Next year, compute on mars, true planetary scale! Cloud? We’re doing Starsystem now!
Knowing your gender is highly required? 😂
I loved seeing this. We had the exact same tin box in my childhood household. We used it to store tea. May all your future coffee brews be blessed with this mental connection
PathPrefix no longer being regex stood out
Sharing the network space with another container is the way to go IMHO. I use podman and just run the main application in one container, and then another VPN-enabling container in the same pod, which is essentially what you’re achieving with with the network_mode: container:foo
directive.
Ideally, exposing ports on the host node is not part of your design, so don’t have any --port
directives at all. Your host should allow routing to the hosted containers and, thus, their exposed ports. If you run your workloads in a dedicated network, like 10.0.1.0/24
, then those addresses assigned to your containers need to be addressable. Then you just reach all of their exposed ports directly. Ultimately, you then want to control port exposure through services like firewalld, but that can usually be delayed. Just remember that port forwarding is not a security mechanism, it’s a convenience mechanism.
If you want DLNA, forget about running that workload in a “proper” container. For DLNA, you need the ability to open random UDP ports for communication with consuming devices on the LAN. This will always require host networking.
Your DLNA-enabled workloads, like Plex, or Jellyfin, need a host networking container. Your services that require internet privacy, like qBittorrent, need their own, dedicated pod, on a dedicated network, with another container that controls their networking plane to redirect communication to the VPN. Ideally, all your manual configuration then ends up with a directive in the Wireguard config like:
PostUp = ip route add 192.168.1.0/24 via 192.168.19.1 dev eth0
Wireguard will likely, by default, route all traffic through the wg0
device. You just then tell it that the LAN CIDR is reachable through eth0
directly. This enables your communication path to the VPN-secured container after the VPN is up.
There is no peer review with these scam publications. You pay your flat fee and get published. That’s it. This is how climate change deniers and all other nut jobs get their studies too. This has been going on for years. This is a cute joke that cost roughly 3K https://www.frontiersin.org/journals/cell-and-developmental-biology/for-authors/publishing-fees
Does security.dialog_enable_delay work on that?
Seems like purely an advertising channel. I see no value in it. I hope it makes the product worse and more people leave it
I do not. As far as I’m aware, this is usually countered through a proper way to follow through on reports. If you host user-generated content, have an abuse contact who will instantly act on reports, delete reported content, and report whatever metadata came along with the upload to the authorities if necessary.
The bookkeeping code for keeping track of unused uploads has a cost attributed to it. I claim that most providers are not willing to pay that cost proactively, and prefer to act on reports.
I can only extrapolate from my own experience though. No idea how the industry at large really handles or reasons about this.
The mistake is using Ubuntu
This is not unique to Lemmy. You can do the same on Slack, Discord, Teams, GitHub, … Finding unused resources isn’t trivial, and you’re usually better off ignoring the noise.
If you upload illegal content somewhere, and then tell the FBI about it, being the only person knowing the URL, let me know how that turns out.
He was on flights to Epstein’s Island. Everyone should care