[-] [email protected] 1 points 15 hours ago

lol it just redirects to his campaign site

[-] [email protected] 1 points 15 hours ago

Those note takes don’t actually take into account anything said before the meeting begins.

[-] [email protected] 2 points 15 hours ago

Not so much a fight as an exercise in futility lol

[-] [email protected] 3 points 1 day ago

Worse. KaraKeep was partially inspired by Linkwarden.

[-] [email protected] 5 points 1 day ago* (last edited 1 day ago)

Have they fixed the titles of saved links being clipped for no reason?

I found Linkwarden entirely unusable because of this and switched to KaraKeep the moment I realized they’d mastered the ancient magic of “Make sure the link titles are actually fully visible”

EDIT: It would appear not since I can see they’re clipped in the thumbnail lol. All that wasted space sitting there doing nothing when it could be… containing the title of the link.

[-] [email protected] 17 points 1 day ago* (last edited 1 day ago)

https://youtu.be/GuTp4Am51i0

There’s a group with a petition to “Stop Killing Games” which seeks to legally remedy the issue of game developers making games that are later turned off and left unplayable even in the case of them being single player.

Thor of PirateSoftware owns a development outfit that makes indie games and he also does a lot of streams. He’s against Stop Killing Games, but doesn’t seem to even understand it, and has publicly spoke out against it, going so far as to spread misinformation about it.

[-] [email protected] 11 points 1 day ago* (last edited 1 day ago)

Anything you expose to the internet publicly will be attacked, just about constantly. Brute force attempts, exploit attempts, the whole nine. It is a ubiquitous and fundamental truth I’m afraid. If you think it’s not happening to you, you just don’t know enough about what you’re doing to realize.

You can mitigate it, but you can’t stop it. There’s a reason you’ll hear terms like “attack surface” used when discussing this stuff. There’s no “if” factor when it comes to being attacked. If you have an attack surface, it is being attacked.

[-] [email protected] 11 points 1 day ago

If you loosely follow the definition of social media to mean “Website where you can interact with people in any way” then yes.

But I think the average colloquial use of the term social media really refers to websites where you make a real life personal profile and share things on that profile. Facebook, Instagram, Twitter, etc. You as the individual are the focus of those types of sites.

The (original at least) point of sites like Lemmy and Reddit is sharing information where you as an individual are not the focus. Hence posting to communities rather than your own wall or profile, the use of usernames over real names etc.

[-] [email protected] 23 points 1 day ago* (last edited 1 day ago)

I’ve been served PirateSoftware’s shorts long before all this controversy and it always bugged me how confidently wrong he was about systems and network things. He seems to be under the impression that he understands these things on an advanced level due to his experience as a checks notes QA tester for Blizzard, and a… indie software developer lol.

All this backlash against him is so vindicating.

[-] [email protected] 18 points 1 day ago

I mean, big YouTubers like Charlie and others covering Thor’s bullshit is what drove this huge spike in signatures so maybe we should be thanking Thor lol

[-] [email protected] 13 points 1 day ago* (last edited 1 day ago)

If you’re a beginner and you’re looking for the most secure way with least amount of effort, just VPN into your home network using something like WireGuard, or use an off the shelf mesh vpn like Tailscale to connect directly to your JF server. You can give access to your VPN to other people to use. Tailscale would be the easiest to do this with, but if you want to go full self-hosted you can do it with WireGuard if you’re willing to put in a little extra leg work.

What I’ve done in the past is run a reverse proxy on a cloud VPS and tunnel that to the JF server. The cloud VPS acts as a reverse proxy and a web application firewall which blocks common exploits, failed connection attempts etc. you can take it one step beyond that if you want people to authenticate BEFORE they reach your server by using an oauth provider and whatever forward Auth your reverse proxy software supports.

[-] [email protected] 10 points 1 day ago

Nobody is gonna bother wasting time hacking into your home server

They absolutely will lol. It’s happening to you right now in fact. It’s not to consume your media, it’s just a matter of course when you expose something to the internet publicly.

206
submitted 1 year ago by [email protected] to c/[email protected]
154
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]

Homebox is the inventory and organization system built for the Home User! With a focus on simplicity and ease of use, Homebox is the perfect solution for your home inventory, organization, and management needs. While developing this project I've tried to keep the following principles in mind:

Simple - Homebox is designed to be simple and easy to use. No complicated setup or configuration required. Use either a single docker container, or deploy yourself by compiling the binary for your platform of choice. Blazingly

Fast - Homebox is written in Go which makes it extremely fast and requires minimal resources to deploy. In general idle memory usage is less than 50MB for the whole container.

Portable - Homebox is designed to be portable and run on anywhere. We use SQLite and an embedded Web UI to make it easy to deploy, use, and backup.

(I am not affiliated with this project)

94
submitted 2 years ago by [email protected] to c/[email protected]

This update is effectively the public version of Developer Update 4, which contains actual details about the changes: https://www.macrumors.com/2023/07/26/everything-new-in-ios-17-beta-4/

120
submitted 2 years ago by [email protected] to c/[email protected]

“ What’s important to note is that this list is identical to those of the Facebook and Instagram apps. So if you use these other Meta products, you’ve already surrendered this information to the company.”

view more: next ›

EncryptKeeper

0 post score
0 comment score
joined 2 years ago