

Removed by mod
Removed by mod
Removed by mod
devil’s avocado: this move has saved many people’s cherished photos from disappearing by having them auto save. before Google photos I’d run into cases (I used to do home IT support) where people had years of family photos disappear because they didn’t back them up properly. Having to communicate what happened was never fun.
is Google photos perfect? No, but it’s a great solution for people who don’t want to manage their data.
fully aware! just don’t care much since its so cheap ($270 for 20 TB!) and my last externals (two 10 TBs) served without issue for ~5 years. Just gotta make sure you have backups and upgrade every few years.
I’ve been running my server on an old laptop and a 20TB external hard drive connected via USB. it’s not fast, there’s a multi-second delay when the drive goes to “sleep” if nobody has used jellyfin in a while, which makes it appear to not work, but once it spins up it works like normal. this has let me keep things simple and cheap. I back up to another 20TB hard drive, which I recently bought as I could finally afford it. beefy hardware is great but not necessary, if you’re okay with some limits.
Americans have the right to bear arms just as much as they have the right to shout fire in a crowded theatre — it’s a right that can be regulated and both already are, one needs more regulation, but people don’t seem to understand.
is this not domestic terrorism?
I’d be interested to hear what you think a made up job is
So I upgraded and tested not adding a trusted proxy (using Traefik in front of Jellyfin) and nothing broke. Was it supposed to break or is it just that its insecure? Am I less secure by not adding it as a trusted proxy?
everyone does their own thing, but semantic versioning is specifically:
it’s only gotten better. now you can run it in your browser and play local files
to add even more to what’s already been said, even if Signal’s infrastructure was compromised and they could see messages traveling through their servers, each one is encrypted, the keys are rotated with every message (cracking one, which is nearly impossible, doesn’t give you access to previous or future messages), and thanks to Sealed Sender, only the recipient knows who a message came from. There are many other layers that they’ve engineered to ensure they can’t know anything about you, like private contact discovery, using secure enclaves, remote attestation, etc.
Removed by mod
Signal is a publicly available app that provides encrypted communications, but it can be hacked.
This is misleading statement that will only confuse people who want to use a secure messenger.
To clear things up with anyone who’s not technically inclined: Anything can be theoretically hacked. Signal has not been hacked and has no history of being compromised.
The Signal “hacks” that linked people’s Signal client to devices that aren’t theirs were sophisticated phishing/spoofing attacks. The equivalent of getting someone to click a malicious link via email because it looked like the real thing.
A reminder that you still need to do your due diligence even when using a secure service. Technology alone cannot completely protect you.
asked this somewhere else, but does anyone know how it compares to Cryptpad which is also developed in France, open source, self hostable, collaborative, and end-to-end encrypted?
anyone know how this compares to Cryptpad? I think it’s developed out of France, also open source, self-host-able, collaborative and end-to-end encrypted!
H.265 is patent encumbered. Blame the 2 or 3(?) patent pool holders (for-profit corporations, unlike non-profit -and-slowly-losing-market-share Mozilla) for not making it free to use for everyone.
This is why AV1 is preferred, it saves bandwidth and there’s no threat of being sued into oblivion.
But then you’re indirectly giving the enemy (Google) power by increasing their browser market share, which in turn lets them dictate the future of the web.
user@domain.com/resource
. Theuser@domain.com
part identifies the user and their home server, and the/resource
identifies the specific client device they are using (e.g.,alice@example.com/mobile
oralice@example.com/laptop
)./resource
part of the JID can reveal the type of client or device being used.Signal uses Sealed Sender (wired.com). Imagine if letters you sent didn’t require a “from” field - or it was inside the envelope and impossible for anyone to see it. The post office would only know who its going to and only the recipient can decrypt it (open the letter) to see who sent it. Now, you could say, well they have your IP and can correlate it to the account, but the easy way around this is to either use a VPN or Signal proxy (support.signal.org) if you’re that paranoid.
Read more about it here: Technology preview: Sealed sender for Signal (signal.org)
Most email providers suffer similar metadata leaks as XMPP because:
You could host your own email, XMPP, or Matrix server - that’s definitely a win for privacy. But as soon as you interact with someone outside your ecosystem (server), metadata leakage is an issue again. It’s why making end-to-end encrypted email is a hard problem to solve. It’s not that it can’t be secure, its that it has to work with those that aren’t because that’s the expectation.
Until you interact with others who aren’t using encryption or have it misconfigured.