You misunderstand, I only mean that it’s disconcerting that there may be some reason that cis-women do not find the hobby/group appealing
You misunderstand, I only mean that it’s disconcerting that there may be some reason that cis-women do not find the hobby/group appealing
I know ghost has a container deployment and uses activity pub
I do wonder how many within the man/woman responses are trans, too.
Idk if that survey was mainly advertised on lemmy, but i know that at least one instance that did a survey had maybe 2% woman respondents, but more than two thirds of those were transfem.
Either way, a little disconcerting. I’m not sure what to make of that or what (if anything) to do about it
But only the data that is explicitly intended to be public. There’s no single entity installing invasive apps or logging your traffic through partner network sites.
Facebook had half the internet using your Facebook login as authentication at one point
I use this for architecture and it’s saved me so much time
I wish people would stop comparing those uses of copyright to nonprofits like Internet Archive
While I understand AI training exemptions to copyright are controversial, and think most people here would side with IA on ebook lending.
It depends on the attack vector. Typically you’re right, but malicious .lnk files are often paired with other malicious methods to infect machines. Sometimes they’re configured as a worm that copies and spreads when a flash drive is connected, sometimes they’re configured to download a remote payload when another script or program is started. The problem is that it’s a type of file that’s often overlooked because it seems innocent.
It isn’t necessarily the case that the Trojan needs to be interacted with by the user in order to execute the malicious code. Just having the file on your machine opens the door for all kinds of attacks (especially if you’re using a headless setup: you wouldn’t necessarily know you have the .lnk file in the system unless you’re manually unpacking your downloads yourself). All it needs is for another piece of infected code to run and look for that file, and it can open the door for more traditional malicious code.
Edit: just as a for-instance - If I was a black hat and wanted to spread some malicious code, I could include this .lnk file in a torrent (innocuous enough to slip by unnoticed by most people/unscrupulous pirates), and then maybe place a line of code in a jellyfin plugin or script that looks for that file and executes it if it’s found. Because the attack isn’t buried in the plugin or script itself (most people wouldn’t think much of a line of code that’s simply pointing to temp file already on your system), it could theoretically go unnoticed for long enough to catch a few hundred or thousand machines.
I believe the torrent included both an .mkv and a malicious .lnk file.
.lnk files are dangerous because they can evade detection and automatically open other files or executable on a computer; AFAIK you would not have had to open the .lnk file yourself.
“I have a girlfriend but she lives in Canada and doesn’t have any socials”
Lots of good suggestions here
I’m a bit surprised by your budget. For something just running plex and next cloud, you shouldn’t need a 6 or even 3k system. I run my server on found parts, adding up to just $600-$700 dollars including (used) SAS drives. It runs probably a dozen docker containers, a dns server, and homeassistant. I don’t even remember what cpu I have because it was such a small consideration when I was finding parts.
I’d recommend keeping g your synology as a simple Nas (maybe next cloud too, depending on how you’re using it) and then get a second box with whatever you need for plex. Unless you’re transcoding multiple 4k videos at once, your cpu/GPU really don’t need much power. I don’t even have a dedicated GPU in mine, but I’m basically unable to do live 4k transcodes (this is fine for me)
If i’m understanding the last graph right, it’s showing the total number of active monthly users per instance’s top communities, filtered by the overall top 100 communities?
So if an instance has activity spread out over many niche communities, that activity isn’t represented on this graph?
I would think having a diversity of smaller communities is more in-line with the spirit of the fediverse, I’m not sure of the value in slicing the data in this way.
Oh is it time for another defed campaign already?
I used to think the same thing, but I did an effort post about this about a year ago (here’s the link)
The article you linked to says something similar to my own understanding: basically, DRM circumvention for personal use is officially not allowed under DMCA and could absolutely be used against you in court, though the likelihood is low. The exceptions the author mentions are pretty nebulous, and the Library of Congress actually addresses the most common cases in their discussions and publication and affirms that they are not allowed.
I don’t personally agree with their interpretation, but I think more people ought to know that it’s officially not legal to circumvent DRM for personal use.
I think everyone ought to strip their media of drm, but you should know that personal use does not qualify as fair use under US law
Yup, I ended up frankensteining a nas from various craigslist parts (i actually found a low-power business-class server motherboard that has worked out well for the purpose). Had to get a SAS HBA card and a couple SFF-8087 cables to do the job right, and I grabbed an old gaming case from the 2010’s to hold it all, but it was relatively seamless. I had one of the drives go out already, but luckily I had it in a raid configuration with parity so it was just a matter of swapping out the drives and rebuilding.
It’s been fun and rewarding, for sure! I’m glad I didn’t sell them like these other dweebs told me to lol
I’m biased but I think everyone should do this. You can basically find the hardware you’d need out of a dumpster, and then you can slowly build your library from there.
If you find torrenting to be distasteful, you can get a cheap USB DVD reader and rip dvds instead.
It’s still technically considered infringement, but at least it’s completely private.
I honestly don’t know why you wouldn’t just do jellyfin, unless you’re limited by your hardware and kodi somehow has less overhead?
They’re both free I guess. You can try them on and see how well they serve tour use case
Guess ill be trying my hand at building my own pfsense router
The critique of the trolly problem isn’t that you don’t still make the choice, it’s that the outcome was predetermined before you even got there.
Leftists who are making a point of abstaining are doing so to point out that voters have no control over the trolly to begin with - that the choice is artificial because the outcomes were pre-selected by someone/something else to ensure a particular outcome, and that participating in that choice only ends up legitimizing that process.