

I’m getting tired of these pressers and headlines making it sound like the shit got flushed when it’s obviously still smeared across the walls.


I’m getting tired of these pressers and headlines making it sound like the shit got flushed when it’s obviously still smeared across the walls.


If the Minneapolis Police Department didn’t kill anyone in a year of active policing, and my combat unit didn’t kill anyone in over a year of war, Minnesotans — and all Americans — are right to ask why ICE and the Border Patrol have killed two people in my state in two weeks.


I don’t consider an app deployable until I can run a single script and watch it run. For instance I do not run docker/podman containers raw, always with a compose and/or other orchestration. Not consciously but I probably kill and restart it several times just to be sure it’s reproducible.


Yeah I kind of feel the same. For convergence I still think Android app compatibility is necessary, but It sounds like Waydroid has made some great advances since I last tried it.


Is really weird to me that people would be considered for a cabinet position but not a specific one. Like, if you are really good at cooking then you be considered for cooking positions, and it would be really weird for someone to say “I want to hire you, what position would you like?” And you can just say “oh, architecture sounds nice.”


My entire music library must pass through beets first. If it’s not automatically tagged I will manually search, and finally (esp for locals’ or friends’ music) I will manually tag it using eyeD3 and import through beets as l-is.


I think most home lab/shelf hosters start off because they want to learn something. I think (generally, philosophically) many people never start something new even if it interests them because they are afraid. To this point, it sounds like you can either let the fear prevent you from doing what you want, or you can use the fear as a learning tool.
Start simple. Build something very easy and isolated, air gap it if you need to. Figure out how logs and monitoring work, maybe even try attacking it yourself, so you have confidence that even if it’s compromised you will see how and why. Then you can connect it to the internet, isolated from the rest of your network, and then you will learn how well- or un-founded those fears are. Learn even more about monitoring and defending, then start looking for a job as a cybersecurity professional because you are already well underway.


They don’t have to succeed once.
Use antivirus and other endpoint security measures. Rotate your passwords and keys. Use Everything as Code, and for goodness sake make backups.
If you find yourself compromised, rotate and burn the keys, wipe and redeploy.


The US apparently doesn’t even know what regime change is, looking at Venezuela.


I have a much older NAS with not a lot of compute power, but it’s only purpose is to share data. I have a a proxmox server that connects to the NAS through NFS and does the actual transcoding, etc.


… I had forgotten about that.
I have heard good things about LM Studio from several professional coders and tinkers alike. Not tried it myself yet though, but I might have to bite the bullet because I can’t seem to get ollama to perform how I want.
TabbyML is another thing to try.


Russia, if you’re listening


It is the leading cause of death for ages 1-19 though


Looks like on Reddit, the creator is blocking people from reporting things like sending data to foreign servers.


So-and-so of the nation Such-and-such said “That guy’s dumb as a bag of rocks.” But what they DIDN’T say…
Serious “debate me bro” energy here.


I tried using https://kerberos.io/ a while back, I did not have success but I think that’s because my setup was wonky. We’re looking into, at least.
Also, HandsOnKatie has done a couple videos on home surveillance, I know she likes ReoLink and Home Assistant But I don’t remember what her full software stack set up as like.


And get the fuck out of Memphis
I’m imagining compilers evolving from digital primordial goo.
Responsibility flows up the chain of command. Literally whoever is next up on that list is just as responsible for pulling the trigger so long as they are protecting the ones who did.