This is good to know, but adds an additional step to simply requiring a passcode to unlock on screen lock.
I like to code, garden and tinker
This is good to know, but adds an additional step to simply requiring a passcode to unlock on screen lock.
Just the act of refusing makes the act of seizing your phone legal or not. If you legally give them your phone by your own will, they are able to use all evidence they find in the courts. If you deny to give them your phone, and they seize it anyways and access it you have a valid path to throw the evidence they discover out as an illegal search and seizure of your property. I’m not a lawyer but that is the general thought process on denying them access to your property.
Edit: Just want to say this mostly pretains to United States law and similar legal structures. This advice is not applicable everywhere and you should research your countries rights and legal protections.
I personally rather trust that my device isn’t able to be unlocked without my permission, rather than hope I am able to do some action to disable it in certain situations. The availability of such features is nice, but I would assume I would be incapable of performing such actions in the moment.
My other thought is, how guilty is one perceived if they immediately attempt to lock their phones in such a matter, by a jury of their peers? I rather go the deniability route of I didn’t want to share my passcode vs I locked my phone down cause the cops were grabbing me.
To add to this, don’t use bio-metrics to lock your devices. Cops will “accidentally” use these to unlock devices when they are forcibly seized.
Sadly it wasn’t a bid to open source the AI, rather than a bid for payment.
This might help, sorry if it doesn’t, but here is a link to CloudFlares 5xx error code page on error 521. If you’ve done everything in the resolution list your ISP might be actively blocking you from hosting websites, as it is generally against the ISPs ToS to do such on residential service lines. This is why I personally rent a VPS and have a wireguard VPN setup to host from the VPN, which is basically just a roll your own version of Tailscale using any VPS provider. This way you don’t need to expose anything via your ISPs router/WAN and they can’t see what you are sending or which ports you are sending on (other than the encrypted VPN traffic to your VPS of course).
I use my own router with DD-WRT in-between the ISPs router/modem and my LAN, and use a different subnet. I haven’t had any issues with this myself, and my router just sees the ISP router/modem as the WAN.
I've never ran this program, but skimmed the documentation. You should be able to use the SHIORI_DIR
(or a custom database table following those instructions) along with the -p
argument for launching the web interface. A simple bash script that should work:
export SHIORI_DIR=/path/to/shiori-data-dir
shiori serve -p 8081
To run multiple versions, I'd suggest setting up each instance as a service on your machine in case of reboots and/or crashes.
Now for serving them, you have two options. The first is just let the users connect to the port directly, but this is generally not done for outward facing services (not that you can't). The second is to setup a reverse proxy and route the traffic through subdomains or subpaths. Nginx is my go-to solution for this. I've also heard good things about Caddy. You'll most likely have to use subdomains for this, as lots of apps assume they are the root path without some tinkering.
Edit: Corrected incorrect cli arguments and a typo.
“From March 1, 2024, an order will come into force to block VPN services providing access to sites banned in Russia,” Sheikin was quoted as saying by state news agency RIA.
I assume this means it’s regarding outgoing communications, for censorship purposes most likely. I’d be surprised if they were blocking incoming VPN traffic, and I don’t think the Russian government has an issue with Yandex operating.
TL;DR: The bot is configured to condense certain instances and communities. At the moment, only beehaw.org is marked to be condensed.
Quickly looking at the source code, it seems ReplyToPostsCommand
uses a SummaryTextWrapper
, which contains an iterable for both CondensedSummaryTextWrapperProvider
and DefaultSummaryTextWrapperProvider
. The DefaultSummaryTextWrapperProvider
has a priority of -1_000
(so it’s always checked last) and is set to always return true
on the supports(Community $community): bool
. CondensedSummaryTextWrapperProvider
references the config/services.yaml for it’s supports(Community $community): bool
call which lists 0 condensed communities and 1 condensed instance, being beehaw.org.
You can add streamlink-ttvlol with one of the known compatible proxies to remove the ads. Works great for me.
Also if there are issues with VLC crashing, I recommend MPV as it handles malformed stream data a little better. VLC will work great 99% of the time on twitch though.
Also, any plugin that Twitch doesn’t like (for example TTV LOL) is detected and will prevent a log in. You’ll need to disable the plugin to login, but can use it after logging in.
Season 8 on more torrents is probably considered to be the new hulu reboot. This is due to the disparity in the home release seasons and the television TV seasons. So most likely if you have seasons 1-7, you have all the home release versions of the show, and therefore have the entire library.
Looking over the github issues I couldn’t find a feature request for this, so it seems like it’s not being considered at the moment. You could make a suggestion over there, I do think this feature would be useful but it’s up to the devs to implement it.
That being said, I wouldn’t count on this feature being implemented. This will only work on instances that obey the rules so some instances could remove this feature. When you look up your account on my instance (link here), it is up to my server to respect your option to hide your profile comments. This means the options have to be federated per-user, and adds a great deal of complexity to the system that can be easily thwarted by someone running an instance that chooses to not follow these rules.
If your goal is to stop people looking up historical activities, it might be best to use multiple accounts and switch to new accounts every so often to break up your history. You could also delete your content but this is again up to each instance to respect the deletion request. It’s not an optimal solutions but depending on your goals it is the available solution.
Edit: Also if your curious about the downvotes, it’s not the subject matter but your post violates Rule 3: Not regarding using or support for Lemmy.
Best I could find is here, which is an article by Randall Munroe (the xkcd artist), and states:
davean (the xkcd sysadmin) wrote the patch
This blog post links to another wayback machine page (thank you archive.org!) here, which explains the sorting algorithm and states it’s original author:
Fortunately, the math for this was worked out in 1927 by Edwin B. Wilson.
Sounds like some QoS software is also limiting LAN traffic, seeing as it still works if the internet is disconnected. I would look if your router has “Adaptive QoS” or something similar enabled.
In most setups I have seen, the nginx instance provided by Lemmy is used due to the routing needed between lemmy/lemmy-ui being handled in nginx. Your reverse proxy can then point to the nginx instance to expose lemmy.
Using Nvidia with closed source drivers by chance? I had a similar issue and had to disable the services related to nvidia suspend/hibernate/resume:
systemctl disable nvidia-suspend nvidia-hibernate nvidia-resume
This is all I can think of, some hardware specs might help others with assisting you.
Haven’t talked to many billionaires then, they love how the government helps them.
To add to this spending some time in custody is inconvenient, but losing your rights being convicted of something you didn’t even do is more inconvenient. You think you know what to say until you say the wrong thing and start digging a hole.