Darkassassin07

joined 2 years ago
[–] Darkassassin07 2 points 4 minutes ago

Can't release a dead body.

[–] Darkassassin07 12 points 12 hours ago (7 children)

Why would he expect any different; that 'prison' has never permitted any visitors, gifts, mail, nor has it ever released a live prisoner.

[–] Darkassassin07 2 points 21 hours ago

Bahahaha

🤡

[–] Darkassassin07 3 points 22 hours ago* (last edited 22 hours ago) (2 children)

Actually it looks like Caddy is supposed to set those automatically (I'm used to Nginx which doesn't).

You'll have to look at why the upstream isn't accepting them then. I'm not familiar with azuracast.

[–] Darkassassin07 8 points 22 hours ago* (last edited 22 hours ago) (4 children)

X-Forwarded-For

And

X-Real-IP

The application you're proxying also has to listen to these headers. Some don't, some need to be told they're ok to use. (if you enable them, but don't have a proxy in front, users can spoof their ip using them)

[–] Darkassassin07 5 points 1 day ago

Rebooting just seems like a very roundabout, slow and inefficient way to get back to that initial state you describe.

It's exactly what the reboot process is designed to do; return you to that fully encrypted pre-boot state. There would be no purpose to implementing a second method that does the exact same thing.

[–] Darkassassin07 24 points 1 day ago (4 children)

Much of the data on your phone, including critical information that's required to run the operating system and make the device function, is fully encrypted when the device is off/rebooted.

While in this locked down state, nothing can run. You don't receive notifications, applications can't run in the background, even just accessing the device yourself is slow as you have to wait for the whole system to decrypt and start up.

When you unlock the device for the first time; much of that data is decrypted so that it can be used, and the keys required to unlock the rest of the data get stored in memory where they can be quickly accessed and used. This also makes the device more vulnerable to attacks.

There's always a trade off between convenience and security. The more secure a system, the less convenient it is to use.

[–] Darkassassin07 1 points 1 day ago (1 children)

Single party consent means one of the people being recorded must give permission to record ... full stop.

This is true.

What you don't understand is that a person does not have to be actively speaking or being directly spoken to in order to be a part of a conversation. Simply being present, with the other participants fully aware of your presence while continuing to converse makes you part of their conversation and thus a party able to consent to it's recording.

The key there is that the other participants are aware of your presence. You're not hiding around a corner, listening in unbeknownst to them; the people conversing are entirely aware that you are present and likely listening.

[–] Darkassassin07 6 points 2 days ago* (last edited 2 days ago) (5 children)

By your rational a police agent without a warrant could walk by and say "hello", plant a listening device, then record your conversation because he said hello at the start.

No. In that situation a third party inserted themselves into your conversation entirely of their own volition.

This is like you walking up to someone that's streaming/vlogging in public, beginning an unrelated conversation in front of them; then you getting upset that they are recording the conversation that you began in their presence. Even if you weren't aware they were streaming; you were the one that inserted yourself into that situation. They didn't walk up to/join you; you made them a party by bringing the conversation to them.


A really big part of these types of legal situations is 'reasonable expectation of privacy'. The people inside a vehicle are all pretty close together and obviously going to be able to hear the conversions that are happening. It's unreasonable to expect the driver who's head is ~3 feet from you isn't privy to your conversation.

[–] Darkassassin07 26 points 2 days ago (2 children)

I'm guessing the black parts slide like wax? For 'grinding' without a board?

[–] Darkassassin07 9 points 2 days ago (7 children)

In a situation like this; you've entered the drivers vehicle and began a conversation in their immediate presence fully aware that they are able to hear and listen to you. That makes the driver a party to your conversation, even without actively participating in it.

 

Is there a good way to extend how long the login cookie lasts?

I really hate using a password with pihole because it won't keep itself logged in in a browser session for more than ~30min. Pretty much every time I visit it, I've gotta login again. (unlike every single other service I host which remembers you've logged in for at least a week -> indefinitely)

I usually set no password, but Nebula-Sync doesn't support no password yet, so I'm stuck with having them at least for now.

A password isn't a terrible idea, I just don't want to have to enter it constantly.(regardless of using a password manager, that takes forever to popup sometimes)

 
 

It's 2028; Trump has lost his bid for re-re-election. America has somehow held together as a single nation and succeeded in electing a new leader.

You've been tasked with designing and creating a sculpture/statue/art piece to commemorate the ordeal America has just survived.

What do you do/create?

Text/drawn art prefered, but you can post AI art if you really want. LMK if I'm posting this in the wrong place; happy to move it if I've picked wrong.

 

I've been downloading files from usenet for a couple years now; but I've never really known how to upload content.

Ultimately I'd like to find a Linux tool I can use from the command line that accepts a file (or folder), performs the necessary steps to break it into parts and upload each to a configured usenet provider, then spit out an nzb file for retrieval to be uploaded to an indexer.

Can anyone point me in the right direction?

 
364
Babrules (lemmy.ca)
 
 

If lemmy instance 'A' defederates from instance 'B', but 'B' doesn't explicitly defederate from 'A'; can the users on instance 'B' still see the content from 'A', but not interact? Or are both sets of users prevented from seeing each others content altogether?

Eithers users could visit the domain directly ofc, I'm just curious if 'B' still retrieves the content from 'A' to show in user feeds.

 
 

A few weeks ago, I explicitly disabled it everywhere I could find within account.google.com and I've not used anything gemini since. Now I get this email and find it enabled on my devices.

By default Gemini has permissions to access everything on screen, view your contacts/messages, and can be used from the lockscreen....

I'm not all that surprised; but I'm still annoyed. Especially with the opt-out of data collection/access after it's been given access to everything.

 
 

Pad smoke. Don't breath this!

view more: next ›