Yeah, that only works for people who are brainwashed to follow whatever the current regime is pushing regardless of how much it hurts them personally, but especially if it doesn’t hurt them directly in the very short term.
Yeah, that only works for people who are brainwashed to follow whatever the current regime is pushing regardless of how much it hurts them personally, but especially if it doesn’t hurt them directly in the very short term.
My Meta account got locked without explanation and support couldnt tell me why, but suspiciously right after they implemented their new policies allowing hate speech but also I had deleted all of my posts going back to 2006 not long before that and had only been using it fir groups, so it wasn’t as big of an impact so wasn’t worth suing them to find out why I was locked out exactly or to start a new account.
GrapheneOS is great, but this move by Google may make it difficult for Graphene to continue to offer major updates. Only time will tell. But for the short term it’s a great option.
I’ve decided not to invest in any more Pixels, personally. Even if they reverse the decision this time, it just means it will happen later, so then future versions of the OS will be out of reach or at least not as good as they could have been. I probably will keep my Pixel 7 Pro with Graphene until the battery is too bad for daily use.
The issue with any crypto mining is that you can’t uaually do it casually. You are generally competing with others to return the result first in order to get paid for a block. If you mine too slowly, you’ll never actually complete any blocks. If you mine too fast, you use a lot of energy. The only way I found it economical for an average person over the long term is if it’s not a popular coin, but popular enough to have some value or you generate a lot of excess power from solar and your power company either doesn’t buy it or the rate is miserably low. There are short term scenarios where it can work, but much like the stock market, you need to be paying very close attention to profit margins, power rates, crypto price, current local temperature, etc.
Yeah, and it was a one off restore, so others who are mentioning self hosting will still be taken down as long as that policy remains.
Right, but taxing a CPU, PC Bus, and PC memory takes more electricity than doing the same amount of “work” on a GPU with longer, more specialized pathways, allowing more work on a single cycle, but less flexibility on the type of work. So if it takes 1hr fully taxing a CPU, PC bus, etc, vs 1 hour fully taxing a GPU and its integrated memory and bus, the one using the GPU is going to take more electricity. Also, you can chain GPUs which can’t be done the same with CPUs since GPUs all have their own discrete bus and memory on a single card. Problem became that GPU production couldn’t keep up with demand so they became more expensive for the hardware, but overall, the cost of electricity vs value of the blocks combined with producing fewer blocks on a CPU once the chains reach a similar complexity as a competing cryptocurrency, means that overall you’re more likely to make more profit from GPU based mining than CPU based mining.
It’s a complex calculation to figure out and many people mine without realizing the money they’re spending on electricity, home cooling, and parts wear is more than they’re making on the crypyo.
Yeah one thing I find these kinds of tools good for is warranty tracking I’d something breaks and insurance claims if there’s a fire or robbery or something.
Even if the algorithm will perform better on CPUs than other crypto algorithms, there’s still the fact that the processor in a GPU is much less complex and so: many more tasks can run in parallel because they’re all very similar, the bus is much shorter, bandwidth to memory is much higher, and memory is generally much higher performing. So overall, mining on a GPU will generally be more energy efficient than on a CPU. And of course crypto becomes harder and harder to mine as they grow, by design.
Personally, I find Traefik much simpler than Nginx, especially with Kubernetes, but even with pure docker, but it’s definitely not as performant. That’s balanced by the fact that it does a lot of automatic detection and has dynamic config loading so I don’t have to break other services when changing configurations.
Not sure that’s true. And mining on a CPU is even less efficient. Your hash rate will be way lower unless you’ve got a really high-end system with a really low latency bus and RAM. And if your hashrate is too low, it would take months for you to find a single block unless you’re pooling with a bunch of others and splitting the profit. It’s quite variable, but very, very few people can make profit on any popular coins. Too many people to compete with to find a block.
Oh and don’t forget cooling cost. The fans in the computer, the fans in your house, and your air conditioner in your house need to disipate the heat and there’s a lot more generated per clock cycle from a CPU than a GPU using comperably old technologies. If you live somewhere that you’re producing more electricity with solar than you consume, then it’s probably not a cold climate.
They’ve been consumed for training already, but that data is harder to hand over as evidence in a court filing. It’s not really human readable and isn’t necessarily going to contain exact queries done by users and the output of those queries which is what the news orgs want.
That makes them think you aren’t available, but if you have any kind of voicemail it means they know it’s a real number so autodialers will probably still try later. I think this request is how can we fool the spammers (automated or otherwise) to think the number is totally invalid so they stop calling it.
That is difficult since there’s probably some indication from the phone company other than just a voice message that indicates a number is invalid/unallocated.
That said, muting is the way I do it, but now most autodialer systems are configured to call twice in a row to get around the Do No Disturb settings on most cell phones, so it is more annoying now.
You still have an upstream DNS server that you rely on to provide updates to your unbound server. Problem is that corporate or extremist government controlled DNS servers can track all of your requests as well as censor any domains they don’t approve of. And if DNS servers or their users don’t use secure protocols, then those requests additionally are tracked by ISPs or any other systems the requests travel through as well as them having the ability to block individual requests they don’t want fulfilled like the Great Firewall does or most corporate internal systems sometimes do to prevent employees from accessing social media or other sites they deem not work related.
Yeah, video streaming is not a good thing to put on a limited bandwidth server either directly or as a VPN or proxy passing data.
Best bet would be if you can set up a reverse proxy on your router and have that accept all inbound requests and direct to the correct internal server and port.
Yes, these are not “private” services, they are “secure messaging” services. Commonly confused issue. Privacy requires controlling the communication infrastructure. Security only requires controlling the items being shared.
If you want to be as secure and private as possible, your best option is to set up your own build servers and automate builds, and validate the components used by each product conform to your needs and standards for security and privacy, and deployment to your own repository that your devices use for updates.
Beyond that, there are tradeoffs based on your needs with each app store out there. If you need total privacy on what you install and your devices are already not connected to the internet, then a VPN or Tor to obfuscate your identity might be all you need. If you’re more concerned about components of applications that contain spyware, then some stores like fdroid has a lot of data available to hep you decide if the app is OK for your needs, otherwise you’d need to build your own packages or verify them manually before installation. And there are various other tradeoffs between more accessibility vs. more security and/or privacy.
Can’t do that with email. Email doesn’t have the necessary protocols to keep a file from being copied, scrub file systems, or maintain external links to trusted time keeping sources or control over the hardware to prevent screenshots or other methods to save the data as it’s being displayed to the user.
There are some possible partial implementations like encrypting a file and only allowing decryption and display on a remote server. But then what’s the point of making it an email in the first place? And if the method for viewing the data is something like a website, that doesn’t prevent screenshots or other ways of storing the data.
The only way to truly have self-destructing content of any kind is to use a device that’s fully controlled, a sever that makes sure the device is not compromised, and a neutral third party you trust to keep all recipients from tampering with the server and devices. Otherwise, if one of the users gets control of any component, they will be able to compromise the system. Unfortunately, there are no trustworthy companies who aren’t under pressure to profit fr your data or from governments to allow access to your data. So there can never be a commercial product like that. And email doesn’t have any of this as it’s designed to be portable, not controllable.
They’ll never understand, or never admit yo understanding, that if you put a door in a wall, everyone will exploit it. Just think of how city defense worked before flight. Every invader would go after the gate and it was much, much easier to penetrate than the rest of the wall. But in this case that gate will be totally unguarded, so anyone who figures out how to open it, will open it for everyone. And will make tools for others to use to unlock and open it easily and it will be very difficult to change it if it’s the same gate with the same key used by everyone. Imagine if door locks were all the same. No one would bother locking their doors if it was that easy to unlock instantly. And that’s what the real goal is. To make people stop using security.