• 0 Posts
  • 42 Comments
Joined 1Y ago
cake
Cake day: Jun 20, 2023

help-circle
rss

Interesting, that’s not something I ever thought about. I just looked up the nameservers for .bb:

;; ANSWER SECTION:
bb.			86400	IN	NS	ns5.nic.bb.
bb.			86400	IN	NS	ns3.nic.bb.
bb.			86400	IN	NS	ns2.nic.bb.
bb.			86400	IN	NS	ns1.nic.bb.
bb.			86400	IN	NS	ns4.nic.bb.
bb.			86400	IN	NS	ns6.nic.bb.

It seems like ns1.nic.bb doesn’t resolve, and for 2-6, they’re all in either 64.68.192.0/20 or 64.119.192.0/20, so it does look like a small concentration in root nameservers which could be unavailable in a storm.


the warning for future tech founders is clear: Be careful when picking your top-level domain. Physical history is never as separate from our digital future as we like to think.

Kinda ironic this is published to a website with a .to ccTLD for the Kingdom of Tonga.


FWIW if you have a seed box which you can ssh into, you can setup a SOCKS5 proxy to route all traffic through the seed box. It’ll act like a VPN for you and is the best of both worlds in my opinion. This way your ISP and government can’t block your traffic or see that you’re accessing trackers at all (even to get the magnet links).



What do you mean building our own systems?


I think it’s healthy to have these conversations, although not this late in the game. At the very least, the Trump campaign would need to completely shift if someone else is nominated which would set them back a bit.

I doubt anyone who was going to vote for Biden before the debate changed their mind and decided to vote for Trump afterwards. The biggest concern is people who have not been paying attention to the news and getting them to mobilize on election day. If the Democrats can’t get people excited to vote, then we’ll have another 4 more years of Trump.


Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?

Have you tried turning it off and back on again?


Exactly, like how an ocean liner is a step up above a sailboat. That doesn’t mean you’re unsinkable and don’t need to worry about icebergs.


Windows is banned in my household, so l’m not worried about malware.

This is a false sense of security and just because you’re not running Windows doesn’t mean you’re immune to everything and can let your defenses down. For example, KDE recently had to announce that downloading themes will execute arbitrary code and cited someone who had personal information deleted because of downloading a theme.


If your services are not stateless, work to make them such so you can learn about scaling in the cloud, which can even be done w/ VM-based services. how much more agility using cloud vs a DC gives you

This can’t be understated. Embracing elastic idology to remove single points of failure and decoupling stateful aspects of applications has been the biggest takeaway of being part of several migrations of services to AWS. Implementing these into your practices as you grow is a huge benefit that may is worth the cost.

Over time, if the scale you’re operating at grows, using experience/knowledge from AWS and applying it to running services in a datacenter could be beneficial. In my experience, if you have a large, consistent, asynchronous workload which you’ve maxed out on reserved instances or savings plans, it is likely cheaper to operate on your own hardware than in the cloud (or get credits from GCP or Azure to migrate services to reduce costs). This is where avoiding vendor lock-in is key.

have y’all factored in all the time/money spent on maintaining the server hardware, power, DC cooling, etc. too?

For sure, this isn’t 2007 where you need to purchase servers and network equipment to start a website. For most startups and small businesses, operating in the cloud will be less expensive upfront and likely over the first 3 years. This isn’t a one size fits all approach though, and it’d be prudent to evaluate the cloud spend periodically and compare with what’d it’d cost to manage it entirely. Obviously you’d need a team competent enough to manage this, without it going to shit.



Right, for junior devs or trivial changes, that’s fine. My take is if I’m going to make someone take the time to review my work, I take the time to make sure that it’s cleaned up and would be something I would merge if I were reviewing it. Most of this comes from working on some larger Open Source projects which still require patches be submitted via email which I know is a real “back in my day” moment, but it did instil good practices which I try to carry on.


If you’re using the CLI and cleaning up a branch for a PR, the interactive rebase is a godsend. Just run git rebase -i origin/main (or whatever your target branch is) and you can reorder/squash/reword commits.


In my experience, I prefer to review or contribute commits which are logical changes that are compartmentalized enough that if needed, they could be reverted without impacting something completely differently. This doesn’t mean 1 commit is always the right number of commits in a PR.

For example, if you have a feature addition which requires you to update the version of a dependency in the project, and this dependency update breaks existing code, I would have two commits, being:

  • Update dependency and fix issues because of the upgrade
  • Add new feature using new dependency

When stepping through the commits in the PR or looking at a git blame, it’s clear which changes were needed because of the new dependency, and which were feature additions.

Obviously this isn’t a one size fits all, but if someone submitted a PR with 12 commits of trial and error, and the overall changes are like +2 lines -3 lines, I’d ask them to clean that up before it gets merged.


Good point, I’m not against the transparent salary, my company lists a salary range, and knowing I’m at the top of my range for my position is rewarding.


If it’s working for them, that’s great. I wonder how they deal with resentment if someone is not contributing as much as everyone else. Knowing compensation is equal for differing level of work could result in higher performers reducing their effort, leading to an overall decline in the work the team is doing.


I was in your camp for a while and just kept it on my watchlist for forever. Eventually I figured I would probably sink 100+ hours into the game, so the cost per hour of entertainment was quite low. After getting it and playing for more than 100 hours, I can say I’m happy with the purchase and it’s worth it.


Don’t NFTs have more protections? If I sell you an NFT, I can’t unilaterally revoke it.


What is the name of the show? I’m interested but unable to find articles about the show or who’s in it.


The EU is currently evaluating if iMessage is considered a “gatekeeper”. Killing these services now solidifies they are gatekeepers and introduces EU regulation.



it’s just after 10pm, which means you can drink if you want, and we can say whatever the hell we want


Maybe the first time it set the cookie which is why on subsequent tries it isn’t happening


There are some things you can’t hide for the internet to work, such as IP addresses, so an IP address on it’s own is not privileged information. Announcing to the world that “this is my IP address” adds information and context which from a privacy perspective is privileged. If someone has an issue with you, they might target their focus to seeing if there’s a service running which is vulnerable at your IP, or they could initiate a DDoS against you.


It’s a public IPv4 address in the picture.

There are 3 ranges of IPv4 addresses which are reserved for private use:

24-bit block 10.0.0.0 – 10.255.255.255 20-bit block 172.16.0.0 – 172.31.255.255 16-bit block 192.168.0.0 – 192.168.255.255


We have found the location of a Rebel base! It’s in Seattle, Washington.


I’d have to assume they mean the features of Github like pull requests, issue tracking, wikis, etc that aren’t part of the git


He’ll rename branches tubes and merge conflicts X, and with that he’ll come up with the new name: xtube


Was this with the same email address? I have multiple accounts for personal and work. I sometimes log out of one account and into another in the same browser, and have never had a problem. Honestly never thought it’d be a big deal.


My memory from the time was that the FBI probably wanted a court to grant presidence, even though they had the tools to do it anyway. Having a court order to break iPhone encryption would make state surveillance easier nationwide. Once public opinion turned and 1st amendment rights were brought into it, the FBI backed down and eventually were able to crack into the phone in the slower way (that they probably knew they’d be able to all along). And of course, 7 years later, there is no report of any information being found on that phone which lead to taking down terrorists or preventing other mass shootings.


I’m not sure why this is being posted as if it’s news, this is from July 2018.


The judges wrote that the FBI’s activities were “not limited to purely foreign threats," citing instances where the law enforcement agency “targeted” posts that originated inside the United States, including some that stated incorrect poll hours or mail-in voting procedures.

What does foreign threats have to do with this. The FBI deals with domestic terrorists. Does this not fall within the FBI’s jurisdiction as well?


“Use code DEPOSITION for 20% off a lumpy pillow”


I had ExpressPay before OMNY and that also had a list of every transaction in the website where you had to refill your card. Ever since they came out with the MetroCard, I assume there was a shadow profile per card and that was linked to the credit card number on file if that was the method the card was purchased by.

Personally, I value the transactions list, since it makes it easier to verify I was billed properly and got the free transfer or the 13th ride free. I’ve not had to dispute anything yet but I imagine it’ll be easier to bring up any issues with customer service over the phone after the fact, than the station agent.

There’s always the dedicated OMNY cards you can buy from stores, although I’m not sure if it’s possible to refill with cash directly somehow. For the most privacy focused, it’s good this option exists, and at least maintains most of the privacy as the MetroCards used to.


You list great points of information that should be shared to admins of other instances. Thanks for clarifying.


I assumed as much after reading it several times, but just wanted let you know and point out that statement could be misconstrued. Thanks for clarifying!


I hope people share the positive hits of CSAM and see how widespread the problem is…

It sounds like you’re encouraging people to share CSAM images found, which is obviously not the intent of this tool. There’s probably a better way to phrase what you were trying to say.


To shreds you say? How are the investors holding up?



The FAQ covers this:

  1. If I want to build a product that is competitive with HashiCorp, does that mean I’m now prevented from using any HashiCorp tools under the BSL license?

No. The BSL license does not prevent developers from using our tools to build competing products. For example, if someone built a product competitive with Vault, it would be permissible to deploy that product with Terraform. Similarly, if someone built a competitive product to Terraform, they could use Vault to secure it. What the BSL license would not allow is hosting or embedding Terraform in order to compete with Terraform, or hosting or embedding Vault to compete with Vault.

So if you are selling a product and HashiCorp releases a product which competes with yours, you can still use Valut, Terraform, etc the way you had been. I can’t see a way for your senario to play out based on their FAQ.