Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)O
Posts
4
Comments
107
Joined
3 yr. ago

  • Oh, judicial duels have always been bad, tending to favor the wealthy who can afford training. The pistol duel was once considered egalitarian because you were just as likely to miss your opponent regardless of how much you trained. For most of the 20th century (until the 90s) Uruguay had legalized dueling. It was mostly used by politicians and the powerful to muder journalists and lawyers who "defamed" them.

    But if we are already living in a period where the rich act with impunity anyway, I want a world where there's a nonzero chance that we get to watch Elon Musk take an estoc to the face because of a twitter argument.

  • Grand journeys to far off lands. The kind of journey where someone who is "exotic" and personable can make a life for themselves by being the court foreigner.

    Also: Judicial duels. They are unjust, unethical, and unproductive, but damn if I don't want to see white collar criminals have to fight the selected champion of all the folks they ripped off. Of course, being a billionaire would probably buy you a pretty good champion yourself, so we'd also have to bring back old concepts of honor to compel them to represent themselves.

  • If you're always using a VPN, that's not necessarily a privacy threat on your VPN'd device, but any other device on the network that doesn't have a VPN could be exposing itself to the ISP.

    Also, you're at the mercy of whatever firmware updates your ISP issues for the router. Hopefully they remember to support your box when the next CVE is discovered...

    We are forced to keep an ISP router/gateway combo in our home because it has certificates necessary to authenticate our subscription. However, behind that router we have the "real" router with settings and firmware updates that we control. The ISP router is just a hop between our router and the outside world. Everything on our network only connects to the router we control.

  • BTRFS should be stable in the case of power loss. That is to say, it ought to recover to a valid state. I believe the only unstable modes are RAID 5/6.

    I'd recommend BTRFS in RAID1 mode over mdadm RAID1 + ext4. You get checksumming and scrubs to detect drive failures and data corruptions. You also have snapshotting, in case you're prone to the occasional fat-fingered rm -rf.

  • For backup, maybe a blu-ray drive? I think you would want something that can withstand the salty environment, and maybe resist water. Thing is, even with BDXL discs, you only get a capacity of 100GiB each, so that's a lot of disks.

    What about an offsite backup? Your media library could live ashore (in a server at a friend's house). You issue commands from your boat to download media, and then sync those files to your boat when it's done. If you really need to recover from the backup, have your friend clone a disk and mail it to you.

    Do you even need a backup? Would data redundancy be enough? Sure if your boat catches fire and sinks, your movies are gone, but that's probably the least of your problems. If you just want to make sure that the salt and water doesn't destroy your data, how about:

    1. A multi-disk filesystem which can tolerate at least 1 failure
    2. Regular utilities scanning for failure. BTRFS scrubs, for example.
    3. Backup fresh disks kept in a salt and water resistant container (original sealed packaging), to swap any failing disk, and replicate data from any good drives remaining.
    4. Documentation/practice to perform the aforementioned disk replacement, so you're not googling manpages at sea.

    This would probably be cheapest and have the least complexity.

  • And the best tutorials are a blurry notepad window while this song plays

  • A better ending than last time, when Fuzzy-Select Girl tried to stop a gang of superdrug-dealers with an improperly calibrated threshold.... Ended up deleting half the neighborhood.

  • I wouldn't trust anything like that to the open internet. It would be better to access the system over a VPN when you're outside the network.

  • Barony is fun as hell. Engine is FOSS, but the default game assets require purchase.

  • You've laid out one potential development cycle: FOSS from the get-go, and open collaboration welcome.

    However, that's not the only way that a FOSS game might be developed. The code could be freely licensed, but the upstream developers refuse to accept outside patches. In that case, there's one "original" and then if you don't like it, build your fork.

    Alternatively, a game could be developed entirely in-house under proprietary licenses, and then only made FOSS upon commercial release. Contributor patches could improve the project, but conception of the game would be entirely the domain of its original developers.

  • The man is a monster. I don't know how many of my build jobs have been murdered by this fiend.

  • How about writing a script to automate the deletion, thus minimizing the chance of human error being a factor? It could include checks like "Is this a folder with .git contents? Am I being invoked from /home/username/my_dev_workspace?"

    In a real aviation design scenario, they want to minimize the bullshit tasks that take up cognitive load on a pilot so they can focus on actually flying. Your ejector seat example would probably be replaced with an automatic ejection system that's managed by the flight computer.

  • Yeah, I believe there's some kind of bridge mode you must enable on the host's interface.

  • As others have said, a reverse proxy is what you need.

    However I will also mention that another tool called macvlan exists, if you're using containers like podman or docker. Setting up a macvlan network for your containers will trick your server into thinking that the ports exposed by your services belong to a different machine, thus letting them use the same ports at the same time. As far as your LAN is concerned, a container on a macvlan network has its own IP, independent of the host's IP.

    Macvlan is worth setting up if you plan to expose some of your services outside your local network, or if you want to run a service on a port that your host is already using (eg: you want a container to act as DNS on port 53, but systemd-resolved is already using it on the host).

    You can set up port forwarding at your router to the containers that you want to publicly expose, and any other containers will be inaccessible. Meanwhile with just a reverse proxy, someone could try to send requests to any domain behind it, even if you don't want to expose it.

    My network is set up such that:

    • Physical host has one IP address that's only accessible over lan.
    • Containerized web services that I don't want to expose publicly are behind a reverse proxy container that has its own IP on the macvlan.
    • Containerized web services that I do want to expose publicly have a separate reverse proxy container, which gets a different IP on the macvlan.
    • Router has ports 80 and 443 forwarding only to the IP address for my public proxy
  • For anyone wondering, this was done on the virtual console version, so the floating point glitch that lets you skip the climbing pole from Bowser in the fire Sea is available.

    The A Button Challenge still stands for the console versions.

  • I know this is a joke, but I couldn't be a programmer without some pedantry. LUnix is actually a real OS! I booted it on my Commodore 64 once.

    https://en.wikipedia.org/wiki/LUnix

  • It would have to iterate over all saved keys, which sounds rather inefficient to me and potentially unsafe (timing attacks etc.)

    sshd only checks for matches in the user's authorized_keys file, not system wide.

  • I'm ok if this requires better EM shielding of electric vehicles. RF bands are a natural resource, and we should prevent short term profit-seeking from shitting them up.