

not really. share it over a ducking vpn, done.
not really. share it over a ducking vpn, done.
kde plasma runs better than 11 as it’s user interface was not created with web tech.
but my concerns about 11 are rather the further erosion of user privacy, on more fronts than just recall. automatic bitlocker encryption is also not something I can stand behind, several people lost all their data needlessly because of it.
shows you actually don’t understand what is needed to run win 11.
TPM is not needed either, it’s an arbitrary restriction.
its often a bug, because the clients who have the keys don’t know they should retry sending.
but also it’s all been fixed a year ago as I know. I don’t usually use dm rooms and public ones are not encrypted, so I wouldn’t know if I didn’t read about it.
I don’t think so, or not always. humans need to find the EULA on the website by first loading the main page or another they found a link to. but if the path of that document was standardized, it could be enforced that way for robots
file backups? settings > chats > backups, and sync it to your computer with syncthing. just set up versioning in syncthing at the receiver side, so that you don’t loose it if there’s some weird issue. a week or so of versions is probably enough
matthew the ceo addressed aot of the criticisms recently, check it out: https://www.youtube.com/watch?v=OyuqM7RbX5E
transcript with links: https://gist.github.com/ara4n/190ad712965d0f06e17f508d1a45b554
other than that, push notifications work fine for me with Ntfy. but as I heard matrix.org hs users have problems, possibly because of serverside firewall issues, investigation is stuck somehow
definetly report the problem. there’s a function for it in the app, 3 points menu on the chat list menu, use it after making those errors show up. tick the contact me box. ceo recommends to also notify himself directly: https://gist.github.com/ara4n/190ad712965d0f06e17f508d1a45b554
afaik those errors can’t really be solved by users. I mean other than using an up to date client and server.
the salt does not need to be encrypted. the point of it is that it makes a generic rainbow table useless, because the crackers need to compute hashes themselves for all passwords.
as they said, the purpose of hashing is to slow down the crackers, because they need to find the string that produces that hash. a rainbow table cancels that, it makes password lookup for an account almost instantaneous. but a rainbow table is only really useful for unsalted hashes, because for salted hashes a different rainbow table is needed that takes the salt into account.
Even if you do cache everything, each site hosts their own copy of jQuery or whatever the kids use these days, and your proxy isn’t going to cache that any better than the client already does.
don’t they always have a short cache timeout? the proxy could just tell the client that the cache timeout is a long time, and when the browser checks if it’s really up to date, it would redownload the asset but just return the right status code if it actually didn’t change.
and all the jquery copies could be also eliminated with a filesystem that can do deduplication, even if just periodically. I think even ext4 can do that with reflink copy, and rmlint helps there.
I stopped using a computer and been only buying flagship phones for the past 8 years. you can’t beat my foresight.
oh yes it still is
B. E-Health Dataset
The E-Health dataset [20] contains CSI collected from 118 participants (88 men, 30 women) in a controlled indoor environment measuring 3 m×4 m (Fig 4). The setup consists of a router set in the 5 GHz band at 80 MHz bandwidth as a transmitter, a laptop as receiver and a single-antenna Raspberry Pi 4B with NEXMON firmware for CSI data collection (234 subcarriers). Participants wore a Samsung Galaxy Watch 4 for the ground truth.
does that mean a passive observer can do all that observations? and that a raspberry pi, with its single average antenna is capable of this?
the question is not whether it’s possible, but whether people subject the public near them to online surveillance systems. sorry, but other than being accessible from HA (which is something too) this is not better than how most people do it. at least to me it is more important than convenience to not leak strangers lives to whoever.
Which would mean modifying android which could mean failing some CTS tests for play services.
they are already massively modifying android, not just on the UI but the system services too, and CTS tests pass because google approved their software.
I guess understandable for initial discovery, but it’s on the lawyer if they didn’t hand out a contact card with email phone and whatnot to all clients
Oops, I meant self-hosting a wireguard server, not actually doing an alternative to wireguard or openvpn themselves…
oh, that’s fine then, recommended even.
With my previous paid VPN I had to use natpmpc to ask their server for forwarding/binding ports for me, and I also had to do that every 45 seconds. It’s nice to get a bash script running in a systemd demon that does that in a loop, and also parses output and saves remote ports server gave us this time to file in case we need them (like, for setting up a tor relay).
oh so this is a management automation that requests an outside system to open ports, and updates services to use the ports you got. that’s interesting! what VPN service was that?
All this by Copilot, without knowing bash at all.
be sure to run shellcheck for your scripts though, it can point out issues. aim for it to have no output, that means all seems ok.
Okay, so don’t set up cameras in your house?
don’t set up cameras that see public area. other than that you do what you want, but if a camera could see a neighbour’s yard then they have a say too.
I’ve found on other forums that reolink can be set up without connecting to the manufacturer, and likely others. It’s relatively trivial for experienced users to insulate any given device from the internet while using HA.
most IP cameras can be set up that way, yes. all you need is the camera to serve the video feed over RTSP, that’s a direct connection.
but that’s not everything. if you just connect it to your main network it’ll connect to reolink servers without issues, and reolink can do whatever they want with it, including stealing the video feed, or if they turn greedy they can remotely upgrade your camera and disable the RTSP feed.
to prevent that, you should either create a separate VLAN for cameras, and configure your router (routing-wise) so that other networks (incl the internet) are not accessible from it. you need managed switches for that, or routers that allow you to configure VLANs.
alternatively get a dedicated dumb switch for cheap, and build a physically separate network for the cameras, and only connect the cameras and the server into it, without connecting it to the main network.
finally, what I meant with my first sentence in the last comment is that a passerby cannot verify your setup, and they shouldn’t need to (or be able to) either. anybody can just claim “its self-hosted”, so it does not really matter with respect to your neighbors and all the people who may pass by
a very specific feature, so you should open a feature request at the repos of the jellyfin audio players that you mostly like, probably the devs didn’t even consider it yet