

You have never had some family member experience a broken website that they needed to work but you were not around to fix it on the server side?


You have never had some family member experience a broken website that they needed to work but you were not around to fix it on the server side?
But companies like to make money default though.
Imagine a beach of infinite length with one lemonade stand on it.
Where do you open a second lemonade stand to maximize sales if people will buy from the closet stand?
The answer: next to the first stand. Everyone to the left of your stand will find you are the best option and everyone to the right will choose the other.
This model explains why two political parties along a spectrum can end up not too different from each other in an attempt to capture the most votes.


To categorically prevent that, every computer would need to centrally controlled and managed, which might have been the case here, and the system configuration has to prevent all software that’s not pre-approved from running.
That’s possible too, but could be a pain to tightly manage. It was a privileged user that was spear phished though… the kind of trusted user who might be able to install software on their machine without additional approval.
Because less than 1% of users would use it and your trusting the security of not one bit partner but thousands of ever-changing small partners.
Also, email is already federated.


I haven’t heard of that happening much outside of law enforcement raid.
Laptops, yeah. But stories of homes being broken into to steal servers?


When was the last time you saw a headline: “Thieves steal home lab”?


The encoding format of URLs is URL encoding, also known as percent-encoding. Content in the URL may be first encoding in some other format, like JSON or base64, and then encoded additionally using percent-encoding.
While there is a standard way to decode percent-encoding, websites are free to use base64 or JSON in URLs however they wish, so there’s not a one-size-fits-all way to decode them all. For example, the “/” character is valid in both percent-encoding and base64-encoding, so to know if it’s part of a base64-encoded blob or not, you might end up trying decoding several parts of the URL as base64 and checking if the result looks like URL-- essentially brute force.
A smarter way to do this might be to maintain a mapping between your favorite sites that you want to decode and what methods they use to encode links. Then a tool could efficiently directly decode the URLs embedded in these click trackers.


Lol. After professionally hosting email for 15 years I’m happy to let someone else handle it now.
About 90% of incoming mail will be spam and it will be your job to make sure you are doing good job of classifying it so you don’t get junk in your inbox and don’t lose real mail in the spam folder.
Then for outgoing mail you need to make sure SPF, DKIM and DMARC are all in order.
Then there is all the usual stuff of security updates, backups, monitoring, alerting, logging and having a plan for internet outages.
Yes, it’s all doable but I won’t expect it be “set and forget”. I expect there will be quite a bit of tuning with some possible spam and delivery problems while you get kinks worked out.


I also use Ansible. Using Podman’s “quadlet” adapter, the containers run as systemd services.
I set up a second dedicated cat cam for some meetings, pointed at the calming presence of a cat sleeping on my desk.


Congrats on the cat box cleaning!
There’s also Zitadel: https://zitadel.com/


The Big Beautiful Bill also bundled a bunch of unrelated things, and that still got GOP votes.


The mode only seems to trigger if the midplate is pressing a switch on the MB. If you are running the MB without the midplate it doesn’t seem to trigger, so the server car should be supported.
Also, all spam messages.


I’m sure Tesla shareholders are happy to hear he’s picked up another side project.


One obstacle all third parties face in the US is party-line voting, which favors the dominant parties.
On possible outcome is that he puts a lot of money into making third party candidates more viable, like efforts to ban party-line voting or supporting ranked choice voting. So, you could vote for the America Party candidate and then if they don’t have a majority ñ, you vote could roll over to the Dem or GOP candidate of your choice, reducing your risk of voting third party.
These changes would help Libertarian, Green and other parties as well. More choice for voters!
Part of the app resides on the GitHub infrastructure, where GitHub stores, processes and displays results. So their costs are not zero.
But GitHub could take a “tax the rich” approach to pricing by charging enterprise customers more for self-hostingand leave it free for others.
A lot of open source is funded like that— most funding for a project comes from a very few companies and everything else uses it free or for very low donations or costs.