![](/static/e3814064/assets/icons/icon-96x96.png)
![](https://lemmy.one/pictrs/image/0f5e05b5-d351-4add-9667-1df4c43091b4.png)
They’re more like PO boxes in this case.
They’re more like PO boxes in this case.
Trump’s appointments tipped the balance. They didn’t “decide” as much as been taken over. It’s a part of the judicial system gone rogue and Congress is supposed to reign it back in.
I would uninstall the screensaver so fast if I saw a nag screen. Wtf it’s a screensaver, what does it matter? I’ll use a version that’s 50 years old if I want to.
Alright, have fun with that. 🙂
If you mean to do that in the public DNS records please note that public records that point at private IPs are often filtered by ISP’s DNS servers because they can be used in web attacks.
If you don’t use your ISP’s DNS as upstream, and the servers you use don’t do this filtering, and you don’t care about the attacks, carry on. But if you use multiple devices or have multiple users (with multiple devices each) eventually that domain will be blocked for some of them.
Generally speaking, a subdomain like jellyfin.myhome.com
will work out much better than a subpath like myhome.com/jellyfin
.
Very few web apps can deal well (or at all) with being used under a subpath.
It will go through Google servers if you want to talk to an Android user… If Apple implemented RCS only for its own users there wouldn’t be much point to it. 🙂
You just need an app that does this transparently.
Oh wait, that’s why Google isn’t letting anybody else use RCS. 😄
I’d be more interested to know what they think iMessage is, if not a messaging app…
I’m fairly sure the only reason for which Apple is using RCS is to circumvent the EU DSA, which requires them to make iMessage interoperable with other chat systems. So instead of opening access to iMessage they’re using a completely different system as a distraction.
I mean, they could’ve said that iMessage is already interoperable via SMS but the feature disparity is too large. RCS will serve nicely to confuse the issue.
There’s otherwise nothing to gain for Apple by adopting RCS. iMessage already does everything RCS does and more.
They could also kill RCS tomorrow if they wanted to, by simply releasing iMessage for Android. But then they wouldn’t have a red herring to show the EU — if anything they’d be in an even worse position as per DSA. It would also antagonize Google although I’m not sure how much they care about that.
I can’t give specifics because it will depend on the version you play and also it’s been a while and I don’t remember all mods by heart. So it’s just gonna be suggestions; in no particular order:
On an even more personal note, I like to play like a classic RPG. I get mods that allow multiple companions and interesting NPCs and when I met somebody interesting I take them into my party. There are also mods that let you order them better, you can adjust their flags to set what armor and weapons they prefer, how they level up, and whether they have “plot armor” so they can die for reals. I usually end the game with a party of 4-6 people and it’s a blast. But you may want to adjust the difficulty accordingly as you go out you will start rolling everything.
Another very interesting approach I’ve tried a couple of times is mods that remove all identification clues (no town names, no directions, maximum map fog of war) and start you in some random point of the map. Add some difficulty mods so you have to be really careful who you meet, perhaps some survival mods, and it’s a real blast. You can also use rogue rules and restart when you die (and not save scum).
Hence the controversy! 🙂
Also, Graphene tend to act superior about it and it pisses people off.
They claim their security measures are better then other custom ROMs.
But nobody uses /dev/sdX anymore (not after they wipe the wrong disk once anyway). They either use logical UUIDs or hardware WWN/serial.
If you were 100% specific you would be effectively writing the code yourself. But you don’t want that, so you’re not 100% specific, so it makes up the difference. The result will include an unspecified percentage of code that does not fit what you wanted.
It’s like code Yahtzee, you keep re-rolling this dice and that dice but never quite manage to get the exact combination you need.
There’s an old saying about computers, they don’t do what you want them to do, they do what you tell them to do. They can’t do what you don’t tell them to do.
Oh, God, he’s trying to use pointers again. He can never get them right. And they say I’m supposed to chase my tail…
SO gives you very specific, small examples. GenAI will happily generate entire projects, test suites etc. It’s much easier to get caught into the fantasy that the latter creates.
I wonder if it works with a joystick…
Many people have a warped understanding of what “two factor” means.
They conflate it with devices and they think it means that one of the factors (why one? which one? who knows) needs to be restricted to exactly one device.
What “two factor” really means is that you should have more than one required factor of authentication so that if one is compromised the attackers still can’t get in.
Ideally the factors should be spread across the “something you know” / “something you own” / “something you are” categories to complicate the manner in which they can be compromised.
We can only reliably rememeber a limited amount of passwords, so like it or not we have to use some devices at least some of the time.
The trouble with “something you own” is that it can be lost or damaged or stolen, and if you only have one of it then you’re fucked. So adding some redundancy is not a bad idea.
The larger issue is that everybody is stuck into extremely rigid and outdated mindsets that date back decades. “Two factors” don’t have to be exactly two, and they don’t have to include exactly one password, and so on. It should be fine if you wanted to secure your account with 3 passwords, and should be up to you if one of those password is a barcode tattooed on your taint so you need a mirror and to bend upside down to scan it.
Bottom line, use whatever you want and use your best judgment as to how secure is each factor. If you want to use something that syncs to multiple devices, go ahead. What you should consider is who has access to those devices and how it would affect you if they’re lost or stolen.