

Reality doesn’t actually consist of an unending torrent of bullshit drowning people in misery, that’s just what sells in the media and outrage algorithms.
Sometimes people like to see a win in their life rather than be told it’s all going to hell.
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
Reality doesn’t actually consist of an unending torrent of bullshit drowning people in misery, that’s just what sells in the media and outrage algorithms.
Sometimes people like to see a win in their life rather than be told it’s all going to hell.
That’s pretty well what I started with 20 years or so ago, had them in some little box with some funny Nvidia CPU. That go upped to a pair of 3 TB that have somewhere around 10 years uptime on them if I recall by now, and kind of spiraled from there. Rsync on a schedule is nice for that.
Just part of a lab built over the years. Primary storage is a Dell R730XD filled mostly with 12 TB drives all set up in a ZFS array comprised of mirror vdevs, so redundant by default plus the built in ZFS snapshots for the rare need for a rollback on a dataset.
It only recently got that big because I had a mixed set of drives going back years and finally decided to work on getting them all to the same size and picked 12 as a good cost/volume balance, can find them at used server parts shops for a bit over $100 each.
Major risk is I don’t have a good auto alert for smart monitor issues, so just make sure to occasionally manually copy the vital stuff like photos to an external drive.
How do you stream it if nobody downloads it to seed things? The whole premise of seed ratios isn’t just a bragging score, it’s aiding the communal health.
Besides, I have around 60 TB of space here, that’ll hold several versions of damn near every Linux distro out there for a while, it’d be a shame to waste it.
It depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that’s only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.
Which means encrypted messaging without a backdoor would be illegal if this passes! That’s a slippery slope!
Metadata is not content, so no E2E would not be illegal. Metadata is things like who sent messages to who at what time, duration, volume of data, other externally parsable metrics like that.
It’s interesting that this is kicking up some controversy. Personally I’ve held similar thoughts since the time of AOL, that once it leaves your system it’s no longer in your control. You can ask people to delete it, and maybe they did, or maybe they deleted the one copy but not the cache version, or maybe just didn’t and lied about it. I’ve actually accidentally found stuff I thought was long lost when I decided to just mess around with some data recovery tools and pulled a bunch of pictures back from a drive I didn’t remember them ever being on.
One of my kids I saw take a picture of a snapchat with another phone. Asked what they where doing and it was explained that if you do a regular screenshot it notified the other person, so this was how they kept a copy secretly. So with that in mind, you never know who has copies of what that was posted.
Oh fuck off on both sides of that headline. Sure, we’ll let you create more monopolistic ISP lock in, just so long as you’re not making any effort at not being a biggot while you do it.
Similar to the case where he was convicted of multiple felonies and given (checks notes) not even a slap on the wrist?
Yeah, it could be meterage I guess, not sure if the non murica-verse uses a similar expression.
https://www.pcmag.com/reviews/acer-spin-1-sp111-32n-c2x3
Specifically it’s one of these, or at least in the nearby product line. A mere 32GB of storage and 4 GB RAM so you can get away with some pretty lean specs. Used the XFCE version if I recall. Basically just give it a try and there’s a good chance it works
I have Mint on an old Acer 2 in 1 that is barely capable or installing Windows just for the size, so it’s possible but of course YMMV.
Trump appeals claiming it’s fake info and costs too much electricity to host in 3, 2, 1…
Updated: 4/28/2025, 10:30 AM EDT: This article has been updated to reflect that 4chan appears to have come back online, according to a blog posted on the site on April 25.
Short lived but even if 4chan died the various spinoffs, some far worse, still exist. There will always be a place where the wild things are and they’ll continue screwing with society just for the lulz.
Routers don’t even need to be old to be targets. A sizable chunk of people will plug in a router, set up the WiFi and never touch it again other than to reboot so the firmware is never updated again.
Sweet, I’ll get some shell cruncher tongs
I have no clue, just that golf course the orange muppet spends a lot of time at.
I hereby rename ‘Mar A Lago’ to the ‘Moore of Legos’. Visitors are also here by prohibited from wearing shoes while in the facility to demonstrate their toughness and fealty to the lord of plastic bricks…
It makes about as much sense as anything these days.
At what point has this admin given a damn about rules?
One of the interesting conundrums of Linux at large is there are so many flavors of it. If you generically search for ‘how to … In Linux’ you’ll probably get things for Ubuntu, maybe Mint or RedHat, but good luck with the 2000 other distros that you see on a list.
Conversely if you do the same for Windows or Mac it’s just a matter of a few recent versions, and half the time fixes would be applicable to any given one of them.
Donnie soon; ‘computers are for nerds, I don’t use em, we where a lot better off without all this cyber nonsense, and their Intel is wrong, Tulsi is wrong here, should have gone with AMD, sound a lot like and, and this and that, brings things together…’