One could argue the vests are like seat belts in a car. You don’t need them 99.9% of the time.
Global namespace extremist. Defragment your communities!
One could argue the vests are like seat belts in a car. You don’t need them 99.9% of the time.
IKEA devices apparently work very well with Aqara
When it comes to zigbee devices, don’t combine the aqara wall switches with large (4 buttons) ikea remotes.
The wall switches tend to execute the commands from the remotes instead of just routing them to the coordinator.
My Zigbee network also improved a lot when I set up some IKEA plugs in the loft.
I have similar experience with the ikea bulbs. More of them I connect, more stable the whole network gets.
I host 2 ejabberd servers. One casual, federated, the other one standalone, for work.
For Mastodon, I’m using an Akkoma instance hosted by a frind of mine
Every once in a while I try Matrix, but each time I try to log in, Synapse is is fucked in a different way. I have to scrap it up and start from the ground up some day.
I’m a big fan of Nostr, because of one particular feature - You control your identity without having to selfhost a server. The network seems to be occupied by the christian-carnivore-bitcoin-conservatives so far, therefor it’s pretty bland when it comes to content.
For some special use cases I have Signal, but most of the time, Telegram is the best the average person can do to meet me in the middle.
We hate the AI and proof of work, yet DEMAND someone to moderate our inboxes. For free.
That’s not a slow laptop. I’ve been daily driving worse for years.
To protect the data from random thief just browsing through the files I still use ecryptfs. It only encrypts the home directory, and the keys are derived from my accounts password, so no extra hassle.
The encryption is weak by the current standards, and wouldn’t stop a determined attacker, but it’s 100% better than nothing, and I’ve never noticed any performance problems.
Pidgin was decent, but remember Miranda? The community around it was fantastic. The plugin system was an absolute blast. Not only there were plugins for any communication network you could think of, the UX was fully customizable.
At one point, somebody even bothered to implement the ICQ flash animations. There has not been anything like it ever since.
If a communication software has terms of service, run away!
Gmail offers imap amd smtp access. You have to enable 2FA, and then it will allow you to create account for so called “less secure apps”.
In your place, I’d either continue using gmail directly, or finish the configuration of the self hosted mail server and just use that with any smtp/imap client. I suggest getting a separate domain for testing first, before moving your primary inbox there.
if you don’t need to resize it once it’s created
xfs_growfs is a thing. I know nothing about xfs. Is this something I should avoid for some reason?
You, and 62 other people did not read the article.
stupidity is a once-off
🎶 …this iiiiis my one an only wiiiiiiish! 🎶
Sounds like fun, but I wish we had a real multiplatform GUI framework that does not look like ass and does not perform like ass, so we can put the whole shameful electron era behind us.
The only thing worse than public voting is public voting that’s falsely advertised as private.
uname -a
Updates depend on the specific distro. Some, like debian, keep the major version the same throughout the entire lifetime, just backporting the security fixes, others, like arch, follows the official major releases more closely.
TIL: Some people actually like their laptop to wake up after openning the lid!
I’ve used Elitebooks with elementary for years and found the wakup after pressing a button logical.
What pissed me off about probooks/elitebooks was that they woke up to inform me about the low battery, then went back to sleep due to low battery, then wake up, sleep, wake up, sleep, wake up… and the agony went on until the sweet death. I’ve never felt so sorry for a non living object before or after.
Oh, and also elementary can’t go to sleep from the lockscreen, on any hardware. One of those those bugs that I’m always sure will be taken care of in the next release, but it never is.
you still need good security configuration of the exposed service.
In a sense that security comes in layers, yes. But in practice, this setup will prevent 100% of bots scanning the internet for exposed services, and absolute majority of possible targeted attacks as well. It’s like using any other 3rd party VPN, except there’s not a central point for the traffic to flow through.
From the attackers point of view, nothing is listening there.
I’ve used a similar setup in the past to access a device behind a NAT (possibly multiple NATs) and a dynamic IPv4. Looking back, that ISP was a pure nightmare.
This is not a guide to hide from the government or ISP. Just a way to tunnel to your home server without publishing the sshd for random strangers. Personally, I’d just publish the ssh and be done with it.
I would rather live without the correlation attacks
The more people using Tor, the less useful targeted disconnects become.
Which is still just as open, but also a massive calling card for anyone trolling around the TOR network
Luckily, it is no longer possible to easily sniff the new v3 addresses by deploying a malicious relay. Any attack to even reveal the existence of a hidden service would require a very specialized setup. And we’re just talking discovery, not the ability to connect and attack the actual service running there.
just connecting to Tor is very much a huge exposure imho
Exposure of what, to whom?
Disappointment? Only if you mean the person that came up with FoomaticRIP.
For those who did not read the entire thing, it’s a so called “filter” that converts the document before it’s sent to certain nasty types of printers. Except it’s not executed on the print server. The unauthenticated print server can just ask a client to run it on their side. And it’s designed to be able to execute ANY command.