Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)HA
Posts
0
Comments
328
Joined
1 yr. ago

  • I use the name Johnny Incognito on everything I register, has not been a problem with namecheap. If you want to follow the rules then you should use your real name but its not like they are gonna ask to see ID or care at all unless you have something else going on to draw attention to it.

  • if the government was to do their own crypto it could do a lot to disrupt the current unregulated "stablecoins" that currently exist, i could see it happing if for no other reason than to fight money laundering. If the fed is doing it, it becomes "real" money and most people would probably prefer a fed coin to something like usdt.

  • What you describe doesnt really make sense so ill suggest what i think you really want;

    You want your vps to be the wireguard server, the local PC connects as a client this "proxies" your connection so torrent swarms see the IP of your vps.

    If you want port forwarding it gets a bit complicated because you need to forward the vps port over wireguard, but this is optional so you dont have to worry if you can't figure it out.

    Caddy doesn't really seem relevant unless you want to have a domain name that forwards to your home network.

  • Pixel is the best option, you dont need root these days for anything good, you can still root if you really want to but it defeats a lot of security that you'd otherwise have and for what gain?

    I don't think any other phones would have a larger modding scene then Pixels either.

  • The kremlins not gonna be happy about this, hopefully Stien is enough of a spoiler on her own but i think they aimed to take votes from different demographics and with west trailing stien has been trying to win over more uninformed black voters and getting clowned in the attempt.

  • If they found out it goes to a specific server, why not just block the server and maybe isolate the network from the internet? I guess its easier to replace them but what's to say the replacements can't have the same flaw if other precautions aren't in place, like how do you even get to installing cameras on military bases without thoroughly vetting the firmware on them fist?