Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IR
Posts
0
Comments
304
Joined
2 yr. ago
  • That's interesting. If you're forking the Signal client to support archiving, you could also remove autoexpiration, the computer linking feature that is used when hijacking somebody's account, and the ability to invite random people without clearance into your group chats. That would make it a reasonably secure and appropriate tool for communication over public infrastructure. We know they didn't do at least one of these things.

  • Borg / k8s / Docker are not the same thing. Borg is the predecessor of k8s, a serious tool for running production software. Docker is the predecessor of Podman. They all use containers, but Borg / k8s manage complete software deployments (usually featuring processes running in containers) while Docker / Podman only run containers. Docker / Podman are better for development or small temporary deployments. Docker is a company that has moved features from their free software into paid software. Podman is run by RedHat.

    There are a lot of publicly available container images out there, and most of them are poorly constructed, obsolete, unreprodicible, unverifiable, vulnerable software, uploaded by some random stranger who at one point wanted to host something.

  • VLANs are lower than IP so you don't need a router to have a VLAN, but you will need a router to get packets between the networks. I don't think a WiFi repeater works. You likely need separate WiFi client and AP devices so you can put your WiFi on a different channel. Otherwise you're probably halving your WiFi performance when connecting to the other network over the same airwaves.

    Unless you can convince the other network to route your IP addresses, this setup will give you another layer of NAT and may cause problems with online games.

  • This isn't caving. This is the deal they originally wanted, before Trump intervened in his first term. Trump will refuse, and then the EU can say "I thought you wanted fair trade" before retaliating. Maybe it's embarrassing for the US.

  • Trying hundreds or thousands of hashes against the servers of random unconsenting people on the internet is beyond what I would be comfortable with. People have been prosecuted for less. It's not the same as a crawler where you try a few well known locations and follow links. You're trying to gain access to a system that somebody did not intend for you to have access to.

    These endpoints probably don't have protection because they were never designed to and it's hard to add it later. Theoretically, if the IDs are random that's probably good enough except that you wouldn't be able to revoke access once somebody had it. The IDs probably aren't random because at some point only the path is used. It's how software evolves. It's not on purpose that somebody may be able to guess the ID to gain access to it.

  • Some microprocessors in deep sleep mode can consume less than 100 microwatts, so I guess it could be possible with this version, but you'd need to charge for a long time. The power consumption of an active ESP32 can reach 700,000 microwatts.

  • This article is very confused. America definitely isn't banning TikTok because it's unpopular or unimportant. American billionaires are stealing TikTok because it is more profitable than their apps.

  • 3V at 100 microwatts significantly limits its usefulness.

    They say they're planning to make a 1W version, which I assume will be either be much larger or have a much shorter lifespan. How does it work? Does it have a way to stop the reaction or does the 1W battery generate 1W of heat when there's no load attached?

  • I think in this case whether it's distribution or not would have to go to court. It's not intentended to be distribution. Depending on the judge and the lawyers it could be distribution or not distribution or the prosecution may have committed a crime in finding it.