Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)PU
Posts
37
Comments
239
Joined
2 yr. ago

  • That's because you arrived when reddit already had its image hosting.
    Before you could only upload a link, so you had to find a hosting site.
    It'd be the same if lemmy didn't have one.
    And in fact it's like that for me, I didn't configured pict-rs, so I can't upload images to my lemmy instance, I need to configure it or use a hosting site.

  • Yep, caddy was as easy as to use xcaddy with the module of my DNS, configure the key and run caddy, that's it xD.

    For what lolinder mentioned in the news link you need to have port 80 open.
    If you don't want that you could configure local authority, but that'll give the warning of a selfsigned certificate.

  • I quickly tested it with an FTP server set up to a read only folder with a single dummy file. You could put a big file so you can check the speed, at home it will use the full speed, while away it'll use the cap of your ISP tier.

    If you want a more complicated set up I recommend you setting up PiHole and configure magicDNS, this way you can check the difference of getting ads in some sites vs PiHole blocking them.

    As @pacology@lemmy.world mentioned, tailscale automatically routes traffic through the shortest route, so at home it'll connect devices directly, this way you only point to your tailscale ip and forget about the 192.x addresses.

  • Yes, it has a start up service in windows and linux. I can tell you the android app doesn't start automatically, you need to access it each time you restart your device. I don't know for iOS.

  • Everyone has already mentioned the biometrics, but I think even without that you still should have to suck it up if you want to improve your security.

    Also, I think it's worth the hassle of changing to Aegis since you can make backups of your vault pretty easily, something which Google authenticator doesn't provide.
    The only option in that app is cloud sync which IIRC isn't encrypted in any way, so your keys are being sent to you-don't-no-where via you-don't-know-how in plain text.
    Aegis gives you the option to sync your vault with an encrypted file which you can then import into other Aegis install (I don't know if it has the option to sync an unencrypted version).

  • You're thinking of reimplementing something like git which some wiki open source project might as well already have solved.
    So, the answer will be the same: it'll be better to have a dedicated project/service.

  • I don't know the games you linked, but all the games from nimblebit and from kairosoft are sim games where you put people to work and you have to wait for them to finish.
    I've played Tiny Tower, Pocket Planes, disco zoo, and Dungeon Village 2. None of them require an internet connection, some have ads which give you a boost, and some have paid tiers to remove the ads.

  • I used this one when I installed pihole and wanted to find out which app was hammering a tracking site (It was a red icon app who complained some apps are not optimized)
    https://github.com/TrackerControl/tracker-control-android

    Although I don't know who much info you can get about the requests from it, I only used it to find the culprit and since it was an easy decision I uninstalled it, I didn't had to check what data was being collected.

  • Sure, probably they won't use it for bad purposes.
    But there's nothing saying they won't use them in any way they see fit.
    Maybe they could find a way to find monetize without disclosing them and anonymized, like statistics or with the update in their policy about training their models with whatever information they can get.
    Maybe you have an ad blocker and AdSense can't build a profile from you, but the google already know what sites you were interested enough to make an account and could try to advertise in other ways.

    And then the biggest issue: there's no mention of encryption, so who knows how they store them and where. Could an attacker read them? How are google employees prevented from reading them?

  • It's a really nice anecdote where I see myself reflected haha, I'm just in the middle of something similar with RSA and Ed25519, and also the post-quantum cryptography scene.
    But usually once I'm done investigating and I think I understood something well enough I simply bookmark the links, write some bullet points in my notes and that's it.

    Do you also have this issue? Do you finish the investigation and start writing for a blog post right away? Or do you just come back to it after some time?