Skip Navigation

  • It's not VPN endpoints we block, it's some ASN's that we've seen excessive amounts of abusive traffic from. Primarily that's isps in China, but I also added Zenlayer a while ago (which is the hosting provider your vpn endpoint was on).

    I've removed them from the ban list, you should be good now. They might get readded if we see a flood of abuse from them though.

    I just happened to see your comment, anyone can feel free to dm me if they have issues.

  • Deleted

    Permanently Deleted

    Jump
  • I don't think signal data is included in system backups unless your device is rooted. You'd have to go into signal and back it up explicitly.

    I just turned this feature on. I don't backup my device all, I just expect everything to be in my cloud.

  • My dog found pizza in a bush once and now he always checks the pizza bush.

  • A box running homeassistant with the appropriate zigbee / zwave dongle.

  • Exports fell 27% on an annualized basis as US tariffs on Canadian goods shattered the country’s shipments abroad

    27% is pretty significant.

  • I've worn glasses my entire life and only once has trouble, when an optometrist was making my lenses incorrectly.

    This sounds excessive, you should go get things checked.

  • Slackware on a whole lot of lettered floppy disks.

  • Yes, you're correct. Those sites just need to move away.

    Otherwise though they do run public DNS resolvers that could block domains for users of those DNS servers.

  • antibacterial soap

  • Using cursor doesn't mean you're vibe coding.

    I use ai all day at work for development, none of it is vibe coding.

  • I tend to agree. I think the US might lean on ASML after that, but they could also tell the US to fuck off.

  • Most don't create new keys per server machine but that's not the issue. I don't bother, I create a key per client machine on my side.

    Server gets compromised once, admin logs in and fixes it, admin logs in next time and the backdoor compromises it again.

    That's all this is. If you can get in once, it's a spot you can leave a backdoor that many admins will miss. That's it.

    Admins don't generally copy that whole file around, they usually copy and paste the lines they want. Also I generally copy and paste it from my workstation, not another server.

  • If you're in Canada, Interac is a Canadian grown company. Just use your debit card and skip the credit if you can.

  • Just give them commands, that aren't their name. Both my cat and dog do an assortment of tricks and are very food motivated.

  • If your hosting is a bad actor, you're screwed no matter what. Why bother with this when they have direct access to your disk and ram

    You could turn off authorized key files, or lock them down. This isn't really a big security risk though, there's countless ways to backdoor a system once you have access to do this.

    This just targets a remote account, not your local pc.

  • Fractal design, node case. One of them is a cube that takes 8x 3.5 and microatx. I used one for years and it was great.

  • That planet will be fine, humans maybe not so much.