navigatron

@navigatron@beehaw.org

This profile is from a federated server and may be incomplete. Browse more on the original instance.

navigatron,

How do you feel about cybersecurity? It’s a much larger field than it appears on the surface, and to my recollection the unemployment rate has never been positive - we have always had more jobs than people.

navigatron,

Vscode already supports linting yaml against a schema file. Once you start configuring your code with configuration-as-code, you’re just writing more code.

If I need to “generate” some insane config with miles of boilerplate, I would use js to build my json, which can be ported to just about anything. This would replace js in that process.

I’m not sold on the need for this.

Even with something like k8s, I’d reach for pulumi before I put another layer on top of yaml.

navigatron,

I have a nectar. It’s extremely meh. I don’t think it’s real memory foam.

Random requests to my private Jellyfin instance

I have a Jellyfin instance on my local server which I forward to the public web via a cloudflare tunnel. I’m not sure how secure it is, and I keep getting random requests from all over the world. It’s my first experience maintaining something on a public domain so I may be worrying about something obvious, but some advice...

navigatron,

You can reduce doorknob turning dramatically by running on a non-standard port.

Scanners love 80 and 443, and they really love 20, but not so much 4263.

I used to run a landing page on my domain with buttons to either the request system / jellyfin viva la reverse proxy. If you’re paranoid about it, tie nginx to a waf. If you’re extra paranoid, you’ll need some kind of vpn / ip allow-listing

navigatron,

This is hilarious and I would donate to help make it happen

navigatron,

Can confirm.

Vitamin D supplements are a necessity here.

navigatron,

Hello yes my email is dot at dotat dot at

navigatron,

I’m predicting we’ll see even crazier numbers once the work week is over

navigatron,

The other six are (copied from the article):

  1. PUBG (3.2 mil)
  2. Counter-Strike: Global Offensive (1.8 mil)
  3. Counter-Strike 2 (1.4 mil)
  4. Lost Ark (1.3 mil)
  5. DOTA 2 (1.2 mil)
  6. Cyberpunk 2077 (1 mil)
navigatron,

My friend, you have no idea how much time I have spent searching for something like this on google. This is incredibly useful. I have saved this to my camera roll.

Naturally searching anything with “chicken” and “cook” present returns hundreds of recipe websites or food safety “articles” that all copy and paste “the fda says 165” with no further thought.

I knew a chart like this must exist, but had given up the search. Sincerely, thank you.

navigatron,

This sounds incredible and I absolutely will find these people. Cooking my porkchops to a lower temperature and letting them rest before eating has changed my life.

navigatron,

Excellent! Thank you :)

navigatron,

Phone picture album roll? Photo reel? Downloads folder! But on a phone. Apple hates calling things folders idk lol

navigatron,

This reeks of pro-establishment, putting forth nothing but pre-defeated arguments based on fear.

Both parties shout from the rooftops that any vote not for them is for the other one. It’s a sick codependency; both parties want to win, but to ensure their mutual long term survival they have to work together. I would assert that they care about keeping third parties out more than they care about winning any individual election. Better to lose a battle and continue the war than cease to exist.

When framed that way, this article becomes a threat. “Vote for who we tell you to, or we’ll punish you by letting the other side have a turn”.

With the state of the “debates”, anyone wishing to end the tyranny of the party (though they present as two, they are one organism) is left with underhanded methods; trying to sneak in ranked choice voting before the machine notices. Should that effort fail, I’m not sure what we do next.

navigatron,

No worries at all, this is actually fantastic.

Local elections are a huge focus for third parties here, as most positions run completely unopposed, and yet local governments do have the most power to change things at a small scale.

navigatron,

That accept-ranges: bytes header smells like a rabbithole that might have clues. It could also just be a bug, I’m not sure

navigatron,

That looks promising. Just keep in mind that this will take a very long time to run. I believe there is a *arr out there that can manage this / show progress, but the name escapes me

navigatron,

Other comments here do a great job pointing to DH key exchange; I’d like to try explaining it with the paint analogy.

You and Youtube need to agree on a “color of paint” (encryption key) without ever sending it over the network.

You and Youtube agree on a common “yellow” in the clear, and you each pick a secret color. Youtube mixes yellow and their secret and sends it to you. This is okay, because un-mixing paint (factoring large prime numbers) is really hard. You add your secret to the mixture, and now you have yellow+Youtube’s secret+your secret.

You mix yellow and your secret and send it to youtube. Youtube adds their secret; now they’ve got yellow+Youtube’s secret+your secret. You both have the final color!

An eavesdropper can’t reconstruct this - everything sent over the network had yellow mixed in, and un-mixing paint can be really hard. Maybe you can guess that green minus yellow is probably blue, but you can’t get close enough to decrypt anything. And what if it’s brown? Is that blue + orange, or is it red + green?

Cryptographers have worked very hard to make the communications secure. I would be more worried about the other end ratting you out - using a relay / proxy / vpn that you trust is a good idea :)

navigatron,

Are you telling me that pop tarts are not in fact ravioli?

navigatron,

Rumor has it Firefly was a game of Traveler that was made into a show. Having played traveler, I highly recommend it.

navigatron,

I use a very simple “hashing” algorithm that I can do mentally. If I want to log into a service, I “hash” its name, and that’s my password.

Every service I use has a different password, and I don’t have to remember any of them. I have no keyvault that can be stolen.

MFA is still an issue. You’ll need your recovery codes to be accessible, but encrypted.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • thenastyranch
  • magazineikmin
  • ethstaker
  • InstantRegret
  • tacticalgear
  • rosin
  • love
  • Youngstown
  • slotface
  • ngwrru68w68
  • kavyap
  • cubers
  • DreamBathrooms
  • megavids
  • mdbf
  • modclub
  • GTA5RPClips
  • normalnudes
  • khanakhh
  • everett
  • cisconetworking
  • osvaldo12
  • anitta
  • Leos
  • Durango
  • tester
  • JUstTest
  • All magazines