Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)BR
Posts
0
Comments
202
Joined
2 yr. ago

  • I can use insomnium for almost everything, but it's not as complete as postman. randomly I'll run into some problem that makes me go back.

    for instance, there's no way to just enter binary data on a readable format to send over websocket. with postman there's an obvious dropdown to send hex encoded data as a binary message.

  • on one hand I agree. on the other, google has historically been afraid of the verb to google becoming generic, so of course I'd like to see that happen.

    I think the middle ground is say google it, but make it clear you mean google it on an alternative search engine

  • you realize they're more than just your picture on a screen, right? there's a whole public key private key verification process that happens, which covers your photo and personal info, at least from what I understand of ISO 18013-5.

    if anything it should be almost impossible to make a fake mobile id, barring exploits in reader software or the govt leaking their private key.

  • but stability isn't something that would drive a gentoo user away either.

    a lot of the draw of gentoo from what I saw was being able to configure everything down to how it gets compiled. it's simple to apply a patch to a package before it gets built or maintain a custom kernel config in nixos, as well as all the advantages of declarative os

  • even with cpu passthrough some things are still emulated. you can run a vm detector and see for yourself what tests fail.

    it may not affect your games but others should still be careful since it is a real issue, and people do get banned for it.

  • machine id isn't necessarily the important part. anticheat and vm detection check a lot of different heuristics incl hard to defend against things like timing attacks on particular cpu instructions. there's a handful of open source versions if you're curious

  • Permanently Deleted

    Jump
  • you have to be more specific lol

    just tesselate the world with hexagons and say you're in a specific one? that doesn't give precise proximity but does expose your general area.

    this does the opposite, doesn't expose your general area but let's you determine if it is close to some other location via an expensive comparison. the precision of proximity isn't tied to how precise a location/small a hexagon you're exposing

  • sorry no, the servarr site. look at this section for docker info. I think the links from there should have most of the background info

    the docker builds it uses are unofficial technically, but the source is here, you can see that the only thing it does is download the official build

  • Permanently Deleted

    Jump
  • as per the first paragraph of the intro of the linked paper, it's safer to store this than it is an actual location. if data gets leaked it's like leaking a hashed password instead of a plaintext one. their example is device trackers.