redcalcium

joined 1 year ago
[–] redcalcium@lemmy.institute 19 points 7 months ago (6 children)

Benefits of Tor over I2P: C, not Java (ewww)

Benefits of I2P over Tor: Java, not C (ewww)

[–] redcalcium@lemmy.institute 20 points 7 months ago (2 children)

It's kinda make sense that the military would want to use homegrown product (in this case, samsung) so they can fully control what's running. They seem to want a fully locked down device, with wifi, usb, tethering, mic and camera disabled while in premise.

The reason is purportedly because iPhones do not fully comply with the restrictions outlined by the National Defence Mobile Security, a mobile device management application operated by the military authorities.

For instance, when activating the security app, it begins to restrict several smartphone functions, including the camera, Wi-Fi, tethering, USB functions and the microphone.

However, Apple does not allow third-party apps to control iPhones’ inherent features, except for the camera.

[–] redcalcium@lemmy.institute 8 points 7 months ago (1 children)

The automaker released the Fisker Ocean SUV in June 2023. During the company's earnings call last week, it warned that Fisker might not have enough funds to survive 2024.

Seems like the company is going down even without the bad review.

[–] redcalcium@lemmy.institute 7 points 7 months ago

Wow, I never thought of using usbip to work around wayland issue with kvm apps. Sounds useful as a last resort to get kvm working.

[–] redcalcium@lemmy.institute 7 points 7 months ago

Unfortunately, with the current popularity of digital downloads, consoles aren't great for patient gaming because they rarely give a good discount for older titles on their online stores (especially nintendo).

[–] redcalcium@lemmy.institute 3 points 7 months ago (2 children)

Yes, but autossh will automatically try to reestablish connection when its down, which is perfect for servers behind cgnat that you can't physically access. Basically setup and forget kind of app.

[–] redcalcium@lemmy.institute 11 points 7 months ago (1 children)

I wonder what kind of "education" he received in the camp? Did they serve him booze and tobacco everyday?

[–] redcalcium@lemmy.institute 7 points 7 months ago (4 children)

If this server is running Linux, you can use autossh to forward some ports in another server. In this example, they only use it to forward ssh port, but it can be used to forward any port you want: https://www.jeffgeerling.com/blog/2022/ssh-and-http-raspberry-pi-behind-cg-nat

[–] redcalcium@lemmy.institute 12 points 7 months ago

It's strangely looks like the styling on phising/scammy sites. Or maybe it's the other way around, phising sites actually aim to look like cia site.

[–] redcalcium@lemmy.institute 22 points 7 months ago (1 children)

By "remotely accessible", do you mean remotely accessible to everyone or just you? If it's just you, then you don't need to setup a reverse proxy. You can use your router as a vpn gateway (assuming you have a static ip address) or you can use tailscale or zerotier.

If you want to make your services remotely accessible to everyone without using a vpn, then you'll need to expose them to the world somehow. How to do that depends on whether you have a static ip address, or behind a CGNAT. If you have a static ip, you can route port 80 and 443 to your load balancer (e.g. nginx proxy manager), which works best if you have your own domain name so you can map each service to their own subdomain in the load balancer. If you're behind a GCNAT, you're going to need an external server/vps to route traffics to its port 80 and 443 into your home network, essentially granting you a static ip address.

[–] redcalcium@lemmy.institute 2 points 7 months ago (8 children)

haha why does debian bother adding this rule if the system will be left in broken state anyway

view more: ‹ prev next ›