Oh, it is part of the Tor project even. Cool. Thanks. I will read the links.
Oh, it is part of the Tor project even. Cool. Thanks. I will read the links.
How does this work? I thought WebRTC is UDP and Tor is over TCP. I don’t really know what I’m talking about here, but I’d like to know some details.
Wait, this is just a post here on lemmy, not a reply in the issue thread? Or am I just not finding it? You should probably have this discussion in the github issue too.
At least for sweden they appear to have shipping options with taxes/duty included. I don’t have in front of me right now, but it was something like 200€ all inclusive shipping on a 500€ order. Something like that.
Oh, wow. Just ordered a new computer. I guess it have to include some more disks!
Do you dd the device directly, and while it is running for this?
Which parts are OpenTelemetry for? Is Prometheus Agent, Prometheus Server and Grafana not enough?
Good thing you solved it, then it feels better to try and make this joke:
The reason it’s not working is because you are on the wrong network, that is nacho’ wifi.
Not sure, but I think emacs at least used to have a reputation as a resourse hog and bloated. So maybe that?
For everyone who has not already, this is so worth a read: https://www.gnu.org/fun/jokes/ed-msg.html
Come on! You need those red crosses to know it fails as it should. Thats what I would say they are there for :-)
Radicale? https://radicale.org/v3.html I have not used it much myself yet. Its very minimal and focused on calendar stuff.
Is either a replacement for the other?
You should do one private key per host. If you want access to something with a key from you phone and computer you should have one key on each. To use ssh from somewhere, from that place to your computer, gitlab, whatever, it needs the private key in the correct place. If it is a shell (like termux) it should be e.g. yoir home folder then .ssh/id_rsa. If its an app, I guess ot tells you(, but I would not give my private key to a random app). To be able to get to somewhere, like from your phone to your computer, your computer needs the public key. The cannonical place to put it is as a single line in a file ‘authorized_keys’ in the .ssh folder in your home folder.
This. And, yt-dlp and/or youtube-dl used to have an issue where if the url started with the video ID instead of the playlist ID, it just downloaded the video not the whole playlist. Not sure if that is still around, then just be aware.
So the attack would just be a }
then?
The key needs to be available to continue to be able to decrypt the data on the device. All encrypted data is not decrypted as you mount or unlock your encrypted device, that is done one the fly as you use it.
The attack you are thinking of should also not be relevant. What you worry about appears to imply that you are more concerned about the key being protected, rather than the data the key protects. You seem to wish to have your decrypted data available, but not the key.
I recently got some Toshibas and they were loud. They also presented with a seek error pre-fail after a few days (all three of them). That propably adds to the volume, but the seagate and wds I switched to just have some clicking noises. Not too bad.