• 3 Posts
  • 466 Comments
Joined 7 months ago
cake
Cake day: June 9th, 2024

help-circle
  • One thing you probably need to figure out first: how are the dgpu and igpu connected to each other, and then which ports are connected to which gpu.

    Everyone does funky shit with this, and you’ll sometimes have dgpus that require the igpu to do anything, or cases where the internal panel is only hooked up to the igpu (or only the dgpu), and the hdmi and display port and so on can be any damn thing.

    So uh, before you get too deep in planning what gets which gpu, you probably need to see if the outputs you need support what you want to do.









  • Those both have a Ring 0 component, which is essentially presented as required for the crap to even work.

    The argument being that you have to have that level of access for the anti-cheat software to be able to actually be able to do it’s thing, since if you just ran it with a normal user’s permission, it’d be subject to numerous ways you could have a cheat tool simply bypass it.

    They’re probably not wrong about that, but doesn’t mean that we should have to essentially install a rootkit on our hardware to play online games.




  • The best way I’ve heard that described is that for the Bambu stuff, you spend your time fiddling with the thing you want to print, not your printer.

    I love my p1p (and it’s several thousand hours and 100kg of filament into ownership and all I’ve had to do is clean the bedplate and replace a nozzle), and really wish there was anyone who was making an open-source printer that’s as reliable and fiddle-free as this thing has been.




  • Something that’s made shockingly unclear, for anyone who might be interested: you only need to have subscribed for a single month to have all the subscriber gated stuff unlocked.

    I don’t really know how that’s a viable business model, but pay $14 or whatever, get all the expansions and inventory and whatnot unlocked, and then don’t worry about it until there’s another expansion you want.


  • They really do.

    The sound great, and the ANC is great, but the “official” battery life for a brand new one (which these are not) is “up to 4.5 hours” with ANC on, and 5 without it.

    It ends up being 2-3 charge cycles basically every day, plus a full recharge of the charging case.

    They do, however, work amazingly well if you’re in the Apple ecosystem; for example they’ll swap between my iPad and Mac Mini if audio starts on one or the other.

    But for actually sitting down with something and listening to a thing, I’d rather just plug in some headphones (via the lovely USB-C dongle) and not have to think about if the stupid things are going to die before I’m ready to stop listening.

    (Disclaimer: I’m also a weirdo who doesn’t carry a smartphone, and still uses an iPod for listening to stuff outside of the house, so feel free to roll your eyes and disregard my obviously bad opinions :P )


  • My complaint has always been that the stupid things need to endlessly be recharged.

    I’ve got some AirPod Pros and they’re great… for about 4 hours.

    Then you’re stopping what you’re doing, recharging for half an hour, and then you’re good for uh, another 3 hours because that wasn’t a full charge.

    And after the 2nd or 3rd time you’ve done that, your case is dead and you get to throw everything on a charger for a couple of hours.

    Ooooooooor I can put in my wired headphones, and not give a shit about any of that, because that’s not how those work at all.

    I suppose most people don’t spend most of their day listening to podcasts and audiobooks and thus 4 hours is fine, but good lord is it annoying as crap.



  • Then the correct answer is ‘the one you won’t screw up’, honestly.

    I’m a KISS proponent with security for most things, and uh, the more complicated it gets the more likely you are to either screw up unintentionally, or get annoyed at it, and do something dumb on purpose, even though you totally were going to fix it later.

    Pick the one that makes sense, is easy for you to deploy and maintain, and won’t end up being so much of a hinderance you start making edge-case exceptions because those are the things that will 100% bite you in the ass later.

    Seen so many people turn off a firewall or enable port forwarding or set a weak password or change permissions to something too permissive and just end up getting owned that have otherwise sane, if maybe over-complicated, security designs and do actually know what they’re doing, but just getting burned by wandering off from standards because what they implemented originally ends up being a pain to deal with in day-to-day use.

    So yeah, figure out your concerns, figure out what you’re willing to tolerate in terms of inconvenience and maintenance, and then make sure you don’t ever deviate from there without stopping and taking a good look at what you’re doing, what could happen if you do it, and coming up with a worst-case scenario first.


  • What’s your concern here?

    Like who are you envisioning trying to hack you, and why?

    Because frankly, properly configured and permissioned (that is, stop using root for everything you run) container isolation is probably good enough for anything that’s not a nation state (barring some sort of issue with your container platform and it having an escape), and if it is a nation state you’re fucked anyways.

    But more to your direct question: I actually use dns scopes and nginx acls to seperate public from private. I have a *.public and a *.private cname which points to either my external or internal IP, and ACLs in the nginx site configuration to scope where access is allowed.

    You can’t access a *.private host outside the network, but can access either from inside it, and so (again, barring nginx having an oopsie somewhere) it’s reasonably secure and not accessible, and leaves a very clear set of logs (and I’m pulling those logs in and parsing them for anything suspicious and doing automated alerting if I find anything I would not otherwise expect) so I’m happy enough with the level of security that this is, when paired with the services built-in authentication options.