Indeed they are, but every single site wants my email and birthday before I can view content now. I don’t knock them for trying to make money from ads but I don’t need them selling my email address on the side too.
From a Star Trek perspective, when they have to eject the (warp) core they are also in for a pretty bad time.
Mine is usually sheer horror at the prospect of getting that far and screwing up on an international stage. Secondhand anxiety is in the red zone.
Can, yes.
Should, maybe.
Enjoy doing, unlikely.
And for sure your home isp has all the email ports blocked upstream.
With all that being said, to call SMTP dead is wildly insane. I do figure it will die someday though. Probably around the same time of universal IPV6 adoption during the year of the linux desktop.
Octoprint is what I use. Slicing is probably the thing it woukd be least good at but all the rest is good. And theres an api to write plugins for if youre into that sort of thing.
This is more like triple bolting the door but leaving a window open. There’s nothing inherently wrong with the door, its still secure but you can bypass the secure option with a less secure method.
You also get additional protection because rather than each website holding onto a hashed (hopefully) copy of the user passwords that can be stolen in bulk, stealing the public keys for a passkey from a site wouldn’t compromise the account. Someone would have to get access to your physical device or hack your password manager individually to get access to your passkey.
And and, the magic for most people is no more passwords and 2 factor stuff to deal with. The standard is still new, and in the cases where you want to use physical keys, its always best to keep 2 in case one gets smushed or goes through the washer. Some sites that have passkeys enabled only let you have 1 passkey. So in that case its kind of risky to make a passkey the only way to sign in.
This is the real takeaway, if you have a forgot password button that bypasses everything then none of it is anything more than a login accelerator.
This is just someone siting in the middle and modifying a page not to show the passkey login option anymore and then stealing a password/session token.
As far as I can tell, this has almost nothing to do with passkeys specifically and would only apply in a situation where a website has a username and password fallback in case a passkey isn’t created or isnt working.
I agree with you.
And youre right that the article doesnt focus on the algorithmic hate factory which to me is the main difference between social media and traditional media. For instance, and this is just anecdotal, my grandma who had nothing besides an analog telephone and broadcast tv became just as polarized and angry as someone with social media just by reading and watching Fox news (and eventually OAN and Newsmax) all day. I cant imagine that Facebook would have made it any worse.
The algorithm is probably accelerating the polarization pipeline, but i guess my point was that social media isnt necessarily doing anything new or distinct. Its doing the same thing Rush Limbaugh was doing on the radio 25 years ago, its just on a new frontier.
The 24 hour news cycle was already throwing sensational controversial stories up and speculating wildly if not outright lying about to hold on to eyeballs. The longer you watch, the more commercials you see. Etc etc.
I would love to see a study of social media vs traditional media to see whether the mean time to full polarization changes and if so, how significantly.
Good Ted talk!
Nope not really. People were already mad but its a lot easier to get mad publicly on the internet than in person. But Im sure the same people could get just as angry watching biased news channels but they cant start arguments with anyone in that context.
And also, don’t forget Betteridges Law of Headlines.
You are correct that this is technically in code and would protect against shock hazards in a neutral error situation but you also get the opportunity for the outlet to pop during the day when nobody is home and the battery to die.
We had a situation in our old house where someone who was technically correct but didn’t think it through had a gfci outlet upstream of the refrigerator outlet. Thankfully it popped while someone was home and we got everything corrected before we lost everything in the fridge.
Checks to see what serverless services are running on?
Kubernetes Server Cluster.
Server
Mfw.
The order doesnt matter as long as they are the same drives, you dont have a usb dock or raid card in front of them (ie sata/sas/nvme only)and you have enough of them to rebuild the array. Ideally all of them but in a dire situation you can rebuild based on 2 out of 3 of a Raid Z1
You can do that, you shouldn’t but you can. I’ve done something similar before in a nasty recovery situation and it worked but don’t do it unless you have no other option. I highly recommend just downloading the config file from your current truenas box and importing it into a fresh install on a proper drive on your new machine.
Sort of already mentioned it but you can take your drives, plug them into your new machine. Install a fresh Truenas scale and then just import the config file from your current setup and you should be off to the races. Your main gotcha is if the pool is encrypted. If you lose access to the key you are donezo forever. If not, the import has always been pretty straightforward and ive never had any issues with it.
Lots of people virtualize truenas and lots of people virtualize firewalls too. To me, the ungodly amount of stupid edge cases, especially with consumer hardware that break hardware passthrough on disks (which truenas/zfs needs to work properly) is never worth it.
I actually run mine in a 12 year old castoff Thinkpad. 4 GB ram total. More than enough to run it because I run a DNS server, a dashboard and a speedtest server on the same machine.
I had a client as of a couple of years ago with a custom fronted software build on top of an access mdb database running on windows 98 continuously since 2000. They had been backing it up onto a 18 year old 1GB flash drive every night for years. Their interest was exactly zero in upgrading to anything newer.
That was my main take-away. You’re the CEO of the company. If someone writes a mean blog post about your business so what? Fix the issues with the product if they are legitimate things that need fixing. Otherwise leave people alone. If something constitutes libel then sue. Otherwise it’s just someones opinion which they are entitled to.
No I have a bad opinion about him as well (please don’t reach out to me either).
Researchers: Hey you’re breached
ATT: MMMM I don’t think so. Pretty sure other people got breached and it looks like our data.
Researchers: Pretty sure it was you. Here’s pretty compelling evidence.
ATT: No actually. I’m pretty sure we would know if we were breached.
…
…
… ATT: We were breached
Id say quite a few Twilight Zone episodes had endings that were better than the mystery. But of course, there were just as many episodes where the opposite was true.