dgriffith

joined 1 year ago
[–] [email protected] 3 points 4 days ago (1 children)

Is there any sort of way to get the best of both worlds? to have the PC be able to go from power button to jellyfin server started and still have some measure of security?

Windows with auto login? Not really. That is, anyone with a mouse + keyboard locally can get in there.

You can set up jellyfin to run as a windows service and then it should auto start and run as a particular user without you having to log in. Have a look in the "advanced" section in the jellyfin docs.

[–] [email protected] 4 points 5 days ago (1 children)

you gotta indoctrinate them while they're young & impressionable so that they will more easily accept your biases as reality;

Lol and social media companies are just such complete white knights too and would never engage in such tactics.

[–] [email protected] 6 points 5 days ago

Train your LLM better.

You didn't go to the library in the '80s and watch a DVD of a documentary to get the information you wanted.

So this is the concern I have with letting LLMs do all the heavy lifting. You've put in a nice summary of how we should be using LLMs and then here's a glaring anachronism. So now that I've spotted that, should I take any credence in whatever else you've said?

[–] [email protected] 16 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

Not really, it's just phrased differently to the usual signup pitch, they're putting in a middle ground between full "premium" subscribers (whatever that is) and public access with tracking and ad metrics.

Companies need revenue to operate. They get that revenue from advertising data and selling ad slots, or subscriptions. Whether they actually cease all tracking and ad metrics when you subscribe is something I'd doubt though, and that could be a case for the legal system if they didn't do what they claim.

Personally, this behaviour is the point where I would not consider the site to be valuable enough to bother with.

[–] [email protected] 16 points 1 month ago (2 children)

Mainly the issues are about providing ~600 kilowatts for 8 minutes to charge your typical size EV battery.

A row of 5 chargers of that size soaks up 3MW if they're all in use, and that's not something that can be quickly or easily shoehorned into a suburban electricity grid.

It's about 500 houses worth of electricity usage, for comparison. For just 5 fast chargers.

Not to say it's impossible, but infrastructure doesn't come cheap, and so it'll cost quite a bit to cram that 80 percent charge into your car's battery.

[–] [email protected] 8 points 1 month ago* (last edited 1 month ago)

Well this seems to go against all sorts of disaster recovery practices, so I'm torn between believing they are truly incompetent or they are just lying.

[–] [email protected] 1 points 1 month ago

Something like a raspberry pi or equivalent, and use reverse SSH set up to connect to a server with a known address on your end.

This means that ports don't need to be opened on their end.

Also if you go with a gateway host, shift SSH to a randomised port like 37465, and install fail2ban.

[–] [email protected] 2 points 1 month ago* (last edited 1 month ago) (1 children)

What I'm asking is how tf did text messages and whatever in the walkie talkies ignite a spark strong enough to ignite the PETN?

Pager with firmware that activates an output on date/time X/Y and triggers an ignition signal. That signal is sent o an actual detonator in the device, which sets off the explosive.

Radio with DTMF receiver that activates an output when, for example, touchtone 4 is received over the air, or alternatively if the radio has GPS, another date/time activation via firmware.

Both of these things are relatively trivial for a nation-state to pull off.

So yes, in both cases it's possible that faulty devices are still around. However, if all the rest of your group has had exploding pagers and radios, most people in the same group would have dropped their still-working pager or radio into a bucket of water by now. There's probably a few, and they're probably being carefully taken apart right now to see how it was done.

Afaik such an idea was nonsense previously.

It's not nonsense, it just takes planning and resources. And now that people know it is possible, buying and using any sort of equipment for your group without having the nagging concern there might be a bomb in it is impossible. And that's a pretty powerful limiter.

[–] [email protected] 9 points 1 month ago (1 children)

That's easy. Just fly somewhere and bring it in your carry-on, airport security will let you know.

[–] [email protected] 3 points 1 month ago (1 children)

There's a lot to be said for "http://yourISP.com/~username" being available 24/7 at no particular effort to you.

[–] [email protected] 13 points 2 months ago* (last edited 2 months ago) (2 children)

90% of users when they are presented with the UAC popup when they do something:

"Yes yes whateverrr"

[–] [email protected] 1 points 2 months ago

I've got photos in Flickr dating from 1999 onwards. Ten thousand or so of them, and a couple of the early ones are now corrupted.

But they are my "other backup" for Google photos so I don't mind too much. I also have a USB Blu-ray drive at home that I use to periodically burn M-Discs that I hand out to a few relatives.

That's about as good as I can conveniently do for backup, and it's probably better than the single-point-of-failure box of negatives that my parents have in their cupboard.

view more: next ›