Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)WO
Posts
2
Comments
148
Joined
1 yr. ago

  • Using ProtonVPN probably isn’t doing what you want it to do, since the port they will give you is random, but for your website you will want ports 80 and 443 exposed.

    CloudFlare will hide your IP will properly forwarding traffic (and other benefits, like caching images on their CDN, if you want them). Also their free tier is more than enough for something like this.

  • iOS natively supports JIT (by which we mean writable and executable memory) but Apple locks it down to only two use cases:

    1. The JavaScript engine in Safari
    2. Support for running a debugger

    AltStore launches a debugger and connects it to your phone. Even though it’s not actually doing anything with a debugger, that’s enough to convince iOS to let your app use memory that’s both writable and executable (the key feature needed for JIT).

    Without JIT you need to either resort to a slower form of emulation or do something creative.

  • The NTFS one is a Samsung EVO 860 1TB. The ext4 is a cheapo generic brand 256GB.

    I’ve got an AMD 5950X CPU. The motherboard is Aorus X570 Elite. Not sure about the SATA controller except it’s whatever comes with that motherboard.

    In my searching I found something about Ubuntu changing ntfs and ext4 drivers, but I’m not sure if that’s a change between 20.04 and 22.04 or an earlier one. Also the fact that it’s both drives makes me think it’s probably something else going on.

    What I do know is something weird is going on, and my googling so far hasn’t gotten me any good results (just things about not being able to mount drives in the first place, or mounting drives as read only, neither of which are this situation).

  • The port is used by the destination computer to decide what program should process the request.

    Any program on your computer that needs to be open to being contacted by another computer over the network needs to be assigned to a port. When the remote computer wants to contact that program, the IP address is used by intermediate networking computers to forward the message, and the port is used by your computer to pass the message to the right program. Blocking a port will prevent the program assigned to it from being contacted by other computers.

    Some ports are traditionally assigned to some common programs. When you go to a website via http in a browser, it uses port 80 if you don’t specify. If you use https, it uses port 443. SSH uses port 22 by default. You can host an ssh server or http website on a different port, those are just the common conventions. If an http website is hosted on a port other than 80, the user will need to specify the port number in the browser as part of the url.

    VPNs are usually not so much about ports, more about IP addresses. When your computer wants to contact another computer, it normally sends the request to the router, and that router forwards that request either to another computer on LAN or to the ISP, and that ISP forwards the request and so on… based on the IP address. If you are using a VPN, that VPN will override certain IP addresses. When a message would be sent to one of those IP addresses, instead it gets packaged and sent to the IP address specified in the VPN config, and the computer on the other side of the VPN decides where to send the message from there. The router sends the packages message to the VPN computer, but doesn’t get to know what the IP of the packaged message is (by packaged I mean encrypted, and with some metadata).

    Where VPNs and Ports end up being relevant is probably in relation to port forwarding. Normally your computer can make requests to the internet, but can’t be contacted by the internet. This is because your entire LAN shares a public (WAN) IP address, and the router is the device that receives all messages to that IP address. Normally the router discards such incoming messages, but if you set up port forwarding, the router will forward messages for a certain port to a certain computer on the LAN.

    A VPN can allow your computer to receive incoming requests without opening a port on the router. When a request meeting requirements specified in the VPN config is received by the computer on one side of the VPN, it will be forwarded to the computer on the other side of the VPN. For a public VPN (the kind you would pay for that are typically advertised as a privacy tool or a way to get around Netflix geofencing), you can sometimes configure port forwarding, meaning any request sent to that port on the VPN’s server will get forwarded to your computer connecting to the VPN (typically to the same port, so what happens to that request is up to you to configure a program to be assigned to that port).

    The other way a VPN can be used for that kind of contact is when it maps all requests to any port on a set of IP addresses. This is typically how office VPNs are configured, as it lets a remote user access things on the office network as if that user was in the office.

    Note that a VPN is itself a pair of programs communicating with each other like any other program, so typically setting up a VPN requires one of the computers to be exposed to the internet (or at least have ports set up for that). For a public paid VPN the VPN’s servers will be exposed to the internet, and for a corporate VPN the corporate servers will be closed, such that the client doesn’t have to.

    Some common VPN software (e.g. WireGuard) is free and open source and can be configured in a lot of different ways! These two common use cases are just the most common ways to configure VPNs, but if you have some creative use case, there’s a lot you could do with it.

  • The rules end up there because people complain about things and then the mods implement a rule to ban the things people complain about. Sometimes they let the community vote on it. It does end up being the vocal minority who the rules cater to sometimes.

  • Traditional 2FA (assuming you mean apps with codes) can be done from the same device (if you have the app with the codes installed on that device).

    It doesn’t defeat the purpose of 2FA. The 2 factors are 1. The password and 2. You are in possession of a device with the 2FA codes. The website doesn’t know about the device until you enter the code.

  • Dramatized clickbait headline.

    What the article actually says is more like “we might be able to revive you if not too many if your cells have died, even if your heart and brain seem to have stopped.”

    AKA they are working on a next tier of CPR.

  • While everything else everyone said is true, to some extent there has been code leaked or decompiled of internal iOS libraries. That code is sometimes used in things like jailbreaking iPhones or making jailbroken-only apps.

    If by “adversary” you mean a hacker, secure software should remain secure even if your adversary has your full source code.

  • No but Apple Music will identify tracks that you have added from your own collection, and on other devices will download their version instead of the file you supposedly uploaded, even if your original version was higher quality.

  • Permanently Deleted

    Jump
  • The question you are asked to answer when you vote is not “do you want Biden to be president?”.

    The question is “Would you rather have Trump or Biden as president?”

    Your answer is allowed to be:

    • Biden
    • Trump
    • I don’t mind either way.

    That’s the nature of the first-past-the-post voting system.

  • Permanently Deleted

    Jump
  • This argument starts with the assumption that Biden is bad but Trump is worse. The goal is to minimize Trump’s relative score compared to Biden.

    So there are 3 options:

    • vote for Trump, +1 to Trump’s relative score
    • vote for Biden, -1 to Trump’s relative score
    • vote for neither or don’t vote at all, +0 to Trump’s relative score

    Voting for neither or not voting is 1 point worse than voting for Biden.