How does this work? I thought WebRTC is UDP and Tor is over TCP. I don’t really know what I’m talking about here, but I’d like to know some details.
How does this work? I thought WebRTC is UDP and Tor is over TCP. I don’t really know what I’m talking about here, but I’d like to know some details.
Wait, this is just a post here on lemmy, not a reply in the issue thread? Or am I just not finding it? You should probably have this discussion in the github issue too.
At least for sweden they appear to have shipping options with taxes/duty included. I don’t have in front of me right now, but it was something like 200€ all inclusive shipping on a 500€ order. Something like that.
Oh, wow. Just ordered a new computer. I guess it have to include some more disks!
Do you dd the device directly, and while it is running for this?
Which parts are OpenTelemetry for? Is Prometheus Agent, Prometheus Server and Grafana not enough?
Good thing you solved it, then it feels better to try and make this joke:
The reason it’s not working is because you are on the wrong network, that is nacho’ wifi.
Lavabit did, back in the day.
Radicale? https://radicale.org/v3.html I have not used it much myself yet. Its very minimal and focused on calendar stuff.
Is either a replacement for the other?
How does pi-hole help with Tor Browser? Does DNS not go through the Tor network?
Where do one make gdpr requests to reddit?
You should do one private key per host. If you want access to something with a key from you phone and computer you should have one key on each. To use ssh from somewhere, from that place to your computer, gitlab, whatever, it needs the private key in the correct place. If it is a shell (like termux) it should be e.g. yoir home folder then .ssh/id_rsa. If its an app, I guess ot tells you(, but I would not give my private key to a random app). To be able to get to somewhere, like from your phone to your computer, your computer needs the public key. The cannonical place to put it is as a single line in a file ‘authorized_keys’ in the .ssh folder in your home folder.
This. And, yt-dlp and/or youtube-dl used to have an issue where if the url started with the video ID instead of the playlist ID, it just downloaded the video not the whole playlist. Not sure if that is still around, then just be aware.
The key needs to be available to continue to be able to decrypt the data on the device. All encrypted data is not decrypted as you mount or unlock your encrypted device, that is done one the fly as you use it.
The attack you are thinking of should also not be relevant. What you worry about appears to imply that you are more concerned about the key being protected, rather than the data the key protects. You seem to wish to have your decrypted data available, but not the key.
Ah, postfix looks like what I’m looking for, thanks. Have to see if I can figure out how to configure it.
Sorry, I must not have explained myself very well. I guess it is the part on receiving on localhost. What I meant to say was that I would like the smtp, or whatever, to only be available on localhost, so that no one else on the network can use the service to send e-mails.
Cannot find it in my spam-folder either, and with the mailutils mail
I set also set the -r $emailFrom
to something that is whitelisted in my spamfilter. But maybe my mail-service provider has some other block. Could that be? Or that it looks very fishy with an e-mail with only from, to, and subject headers non-empty?
I tried a:
echo "something" | mailx -s "subject" [my_personal_email]
but I’m not receiving anything… hmm
Oh, it is part of the Tor project even. Cool. Thanks. I will read the links.