How dare you so accurately clock me from one post.
How dare you so accurately clock me from one post.
If they never hire anyone, then they are absolutely shit at their job.
“Hi, buy a soda and get the fuck out, we’re not hiring you.”
60 interviews, at just 15 minutes each, is 15 hours a day. Someone is putting in an astounding amount of work for just $300.
I’ll just take whatever. I’m not picky.
That’s not passive income. That’s a lot of work.
Oh fuck off. Therapy won’t help with… *gestures at everything*
It’s their machine. It’s a front door.
That’s not a vulnerability. That’s intended and desired behavior. It was really useful in this case too.
I should mention that the WebDAV share is password protected, so only he has access to do that.
Something really fun I found out recently, when my friend lost all access to his system except for a single WebDAV share by accidentally turning off all his remote admin access:
If you write “b” to /proc/sysrq-trigger, it will immediately reboot the system (like holding down the reset button, so inherently a bit dangerous).
He was running Nephele with / mounted as the share, so luckily he just uploaded that file with a single “b” in it, and all his remote admin stuff came back up after the reboot.
This absolutely can happen to stable projects. This has happened with Mastodon many times, and Mastodon has been stable for years.
It also has happened with Nextcloud many times, and again, Nextcloud has been stable for years.
It’s not a stability thing, it’s an automation thing. We as devs can only automate so much. At a certain point, it becomes up to you, as the administrator, to manually change things. Things like infrastructure changes, and database migrations, where the potential downtime if we automate it is something we need to consider.
This is very cool, but also very dangerous. Many projects release versions that need some sort of manual intervention to be updated, and automatically updating to new versions on docker can lead to data loss in those situations.
Here’s a recent example from Immich:
https://github.com/immich-app/immich/releases/tag/v1.133.0
It is my humble opinion that teaching newbies to do automatic updates will cause them to lose data and break things, which will probably sour them from ever self hosting again.
Automatic OS updates are fine, and docker update notifications are fine, but automatic docker updates are just too dangerous.
I mean, gay people are also a part of society. As are asexual people. If you mean society would collapse if there weren’t straight people to have kids, then you’re neglecting IVF. At one point that was true, but modern reproductive medicine has removed society’s dependence on the straights.
I still think about this post.
You’re probably holding your controller wrong.
That does make sense considering every other developed country has free healthcare and literally 100% of their young men spend every waking hour playing video games.
Where are the smaller lips?
I have all Reolink cameras and they’re awesome. They have both indoor and outdoor cameras. They’re really expensive compared to other similar cameras, but the software is really good, and there’s no subscription. You don’t even need to log in. Everything is only stored locally, on either SD cards in the camera or a separate “home hub” (or both). They have motion and object detection built into the cameras.
The way I have them set up is every indoor camera is plugged into a smart outlet that disconnects their power through Home Assistant when either me or my wife are home.
The outdoor ones are connected to solar power, so I didn’t even have to run any wires.
I’d highly recommend them.
Safe, yeah. Private, no. If you want to verify whether a user is a real person, you need very personally identifiable information. That’s not ever going to be private.
The best you could do, in theory, is have a government service that takes that PII and gives the user a signed cryptographic certificate they can use to verify their identity. Most people would either lose their private key or have it stolen, so even that system would have problems.
The closest to reality you could do right now is use Apple’s FaceID, and that’s anything but private. Pretty safe though. It’s super illegal and quite hard to steal someone’s face.
Throw in a server rack and it’s perfect.