

As an atheist, it’s no more odd than any other religion to me. And since it’s more connected to nature, which I can see and touch, rather than fully supernatural like Christianity, it’s more interesting to me.
As an atheist, it’s no more odd than any other religion to me. And since it’s more connected to nature, which I can see and touch, rather than fully supernatural like Christianity, it’s more interesting to me.
For domain registration? I don’t see much of an issue. I also use their DNS services, but not caching or proxying or anything that would allow them access to any data in flight or info on connections to my servers or anything like that. I’m not trying to be anonymous, though, just private.
Wicca, witchcraft, and similar are generally are types of legitimate religions. I personally belong to a coven despite the fact that I’m atheist. These types of groups are generally focused more on community and connecting with the natural world than the supernatural or gods like modern monotheistic religions. Though many practice spells and other supernaturally rooted ceremonies similar to how many Christians prey, use rosaries, or take communion which are all types of supernatural ceremonies. And most have a huge amount of traditions from “pagan” religions to choose from to practice and have very little strict dogma forcing them to be prejudiced or exclusionary, so they tend to attract a wide variety of interesting people and thus have to be very welcoming of those who are less conformant like neurodivergent people, LGBTQ+ people, ethically non-monogamous people, etc. Many of whom are excluded from most modern monotheistic religious communities.
Reading on Summit right now. I tried all the free apps and this is by far the best.
Most companies stopped making both the discs and the drives/players. Not a long term strategy.
Sounds like they’re basically abandoning it but at least giving the code out so the community can still use and keep it up until it becomes incompatible with Windows. It is one of the few ways I’m able to get my Windiws 11 work computer to do what I need with all the security and tracking junk my company installs on our laptops, even for developers, so I hope it sticks around for a while.
Really? I have had my legal name in my account and my common name on my shipping address on Amazon for ages. And I’ve shipped gifts from Amazon for over a decade with the name of the recipient.
If the meter is plugged into the UPS, then the UPS has nothing to do with the power flowing into the meter. Power is “pulled” not “pushed” to devices in that a device supplying power can limit the amount of power provided, but can’t increase it beyond what the devices request.
Just like with plumbing. The water company can’t force your faucets to open and use more water. Now they could increase pressure and break pipes, similarly the UPS could provide the wrong voltage and short or burn out wires or devices causing them to draw more, but that is unlikely to be the issue here. As long as voltage is constant, amperage (the other component in wattage) is pulled, not pushed.
What you’re seeing in the input load, if it matches what is flowing out of the meter, is some device requesting more power and thus more power flowing into the UPS to be passed to those devices, not the UPS forcing something to use power which isn’t possible as explained above, or the UPS itself using power because the meter has no connection to what power is being used by the UPS, only things plugged into the meter.
So, there must be something else using the power. Likely the devices, even if they aren’t really doing anything you consider significant, are doing something. Probably maintenance, checking for updates, the monitoring proceses requesting information from the devices since the TrueNAS server is on that end, etc. You’d need to put a meter on each device to determine what is drawing the power specifically.
Also, does the power meter only display power used by devices plugged into it, or does it also display it’s own power usage? Could be that the plug itself is using WiFi or something to communicate with external services to log that data. But that would be quick bursts.
Also, without putting a meter on each device, this is probably cumulative. For example, if the NAS is requesing info for monitoring the network, that would spin up the processors on the RPi an cause the switch to draw more power as it transmits that information across the network. Again, this should only be small bursts, but it’s also possible the devices are not sleeping properly after whatever process wakes them so they continue to run their processors at higher amperage for some time. Tweaking power profiles can help with something like tuned on Linux or similar to make things sleep more agressively. With the drawback that they take some amount of time to spin back up when needed.
Reduce spam bot accounts and other malware, as well as to allow for user discovery so you can find your contacts more easily. It’s not designed to be an anonymous service, just a private one.
Signal isn’t that kind of app. It protects your data in flight, but only has minimal protections after the recipient gets the message. It’s a whole other game to protect data at the endpoint. If you can’t trust your recipients to protect data, then you shouldn’t send them data needing protection. In order to do that you need control over all levels of the device receiving the data, hardware, operating system, file system, and software. Anything else will always leave openings for data at rest at tge destination to be compromised by untrustworthy recipients.
It you’re talking about TOTP exclusively, that only needs the secret and the correct time on the device. The secret is cached along with the passwords on the device.
LLMs are perfectly fine, and cool tech. Problem is they’re billed as being actual intelligence or things that can replace humans. Sure they mimic humans well enough, but it would take a lot more than just absorbing content to be good enough at it to replace a human, rather than just aiding them. Either the content needs to be manually processed to add social context, or new tech needs to be made that includes models for how to interpret content in every culture represented by every piece of content, including dead cultures who’s work is available to the model. Otherwise, “hallucinations” (e.g. misinterpretation and thus miscategorization of data) will make them totally unreliable without human filtering.
That being said, there many more targeted uses of the tech that are quite good, but always with the need for a human to verify.
There’s not a need to have vaultwarden up all of the time unless you use new devices often or create and modify entries really often. The data is cached on the device and kept encrypted by the app locally. So a little downtime shouldn’t be a big issue in the large majority of cases.
Not a new thing, and I can definitely see good uses for this information. What they should have done is made it so that the one being tracked gets a log and real time notification any time someone is tracking them. This would alleviate some of the toxic spying behavior simply by making it transparent rather than covert.
A desktop environment is a waste of resources on a system where you’ll only use it to install and occasionally upgrade a few server applications. The RAM, CPU power, and electricity used to run the desktop environment could be instead powering another couple of small applications.
Selfhosting is already inefficient with computing resources just like everyone building their own separate infrastructure in a city is less efficient. Problem is infrastructure is shared ownership whereas most online services are not owned by the users so selfhosting makes sense, but requires extra efficiencies.
Not really. I can’t think of a major social media software company that isn’t exploitative. If that’s where their specialty lies, then they either learn new skills which takes time, requires partially resetting your career, and money only to have that company then absorbed by an exploitative big company in a decade and do it all again, or just keep your job that started as a decent company and got corrupted already.
See the context mentioned by OP. It was a reply to a post about Recall on Windows.
Unfortunately, not everyone has a choice in who they work for in end-stage-capitalism. Work is about survival, not ideology. The majority of Americans are not far-right capitalists, but the vast majority of CEOs are, and it’s not really possible to survive long enough to start a small business in most of the US without investment from a far-right capitalist or inheritance (usually also from a far-right capitalist family member).
Everyone having to prove they’re an adult just means the end of privacy on social media. Tracking everything you do online becomes extremely easy when your real ID is attached to your advertising IDs. And breaches become leaks of more significant data used in age verification.
Depends on the carrier and the specific deal. I have a Pixel 7 Pro from T-Mobile. And it was able to be unlocked after one year of service in good standing. T-Mobile has traditionally been pretty good about that, though that kind of thing often shifts once companies have major mergers. And the Sprint merger screwed them up in a lot of ways that are still working their way down to customers losing services and features.