The difference, as I understand it, is Beeper hasn’t claimed to not be doing that. Sunbird/Nothing touted E2EE and that was a lie.
The difference, as I understand it, is Beeper hasn’t claimed to not be doing that. Sunbird/Nothing touted E2EE and that was a lie.
OP isn’t trying to install into the downloads folder; they’re trying to grant an app access to the downloads folder to read and write data.
That tends to be how things develop when you’re talking about systems. There’s not a cackling Bad Guy engineering these things, but a system of socioeconomic carrots and sticks that, right now, favor exploitation. Schools and education happen within that incentive structure so its natural that they would take on it’s characteristics.
Often, if an rss link isn’t on the page, there’s still a feed available. /rss and /feed are the most common places to find it.
I made that move and had no issues. You can copy/paste your way through DNS setup and the rest is just configuring your proton account how you want.
You’ll want to be familiar with proton and some of the tradeoffs in its privacy model, but it’s most likely more feature-full than a hosting provider. Dreamhost, for one, is quite basic.
Most self-hosters are probably using dns services through their registrar, but you don’t have to. A registrar with poor api support might still be a good choice, if that was the only negative.
Well, I’m back and can confirm the sneaky DNS resolver. I have two roku devices and they both were making requests to 8.8.8.8.
Thanks for this post! TIL.
Interesting. I set an adblocking dns via DHCP and, as far as I know, the Roku respects it. Ads are blocked and I can see it failing to delivery telemetry in my dns logs (most persistent thing on the network).
I set a rule to catch outside dns to see if anything, the roku included, has been misbehaving.
DNS blocking (Pihole, adaware, nextdns…) Can take care of those ads on dedicated streaming boxes.
Free and Open-Source Software
We did a “bring your dog to work day” at my workplace and this is pretty much how it went. By noon, all the dog-bringers had taken their pets home.
I Nerevar would have guessed.
They’ve certainly become a lot more…
Nope, not gonna do it.
I may already have that power. It’s hard to tell.
You don’t have to make a ton of accounts. An account on one instance can subscribe to and participate in communities on any other instances (provided it hasn’t been defederated by the instance admin).
Lemmy, itself, more or less has no rules, but individual instances do and links may violate some of them. More importantly though, publicly linking directories like that can be a good way for them to catch the attention of someone that would want to shut them down.
Edit: I accidentally a word
Little clusters of nucs has become a really common way to run small Kubernetes clusters at home. I recently rebuilt mine (still using a bulky, power hungry box like you’re tossing) and have been very happy with it. Everything is really stable, containers that misbehave are automatically destroyed and replaced, and updates are breeze because everything lives in code/git.
Ubuntu at work, Arch at home. Having a linux machine at work has been an incredible upgrade.
Well, got it done. I was going to write something up about this process, but it ended up being really straightforward. I’m running it in k3s and the worst part was waiting for the initial sync.
Now, something about the SMTP traffic my router sends (trying to send notifications from a Mikrotik) makes the smtp implementation mad, but all my other clients were fine.
There are many ways to setups full disk encryption on Linux, but the most common all involve LUKS. Providing a password at mount (during boot, for a root partition or perhaps later for a “data” volume) is a but more secure and more frequently done, but you can also use things like smart cards (like a Yubikey) or a keyfile (basically a file as the password rather than typed in) to decrypt.
So, to actually answer your question, if you dont want to type passwords and are okay with the security implementations of storing the key with/near the system, putting a keyfile on removable storage that normally stays plugged in but can be removed to secure your disks is a common compromise. Here’s an approachable article about it.
Search terms: “luks”, " keyfile", “evil maid”