Your own servers probably also dont have HSTS enabled, or clicking continue will be disabled (if not overwritten in your browser-config)
Your own servers probably also dont have HSTS enabled, or clicking continue will be disabled (if not overwritten in your browser-config)
Thats why we now have certificate transparency reports and CA-records.
Sure not perfect, but at least with a compliant CA it wont just happen in the dark.
At some point you have to trust someone.
Thats why we have HSTS and HSTS preloading, so the browser refuses to allow this (and disabling it is usually alot deeper to find than a simple button to “continue anyways”)
afaik sustainable, but expensive… Italy and Greece arent really known to have fat stacks of cash for such projects
And that hole would of course not deform at all or release the products into the environment over some amount of time?
We already have that problem… They tried more or less simply burying it in Asse, which spectacularly failed and now has to be brought back up… paid by the government (so us) of course
But the horse still has a broken leg (End-Storage) and noone really knows how to fix that at the moment. Maybe give the horse some drugs to make the leg stronger (Transmutate the materials from long to moderately-long half-lifes), but we still need to support it in the end.
The move to coal was absolutely stupid, the CDU (which is currently gaining some traction… again), dialed back on renewables which should have replaced some of the capacities lost to nucelar… and then decided a new coal plant was a great idea too.
Probably some corruption… sorry “Lobbying”-work behind that… its not like the Experts (which were paid pretty well) told them that was a bad idea…
Maybe some more modern nucelar plants might work… but its unprofitable (probably always was, considering the hidden costs on the tax payers already), so needs to be heavily state-funded, same with storage (plus getting all the stuff out of the butchered storage Asse, putting it somewhere else)
I am open to it, but dont see it happening. And storage… no hopeful thoughts about that either, i dont think the current politic structures are well suited to oversee something like that from what we have seen from other storage-locations that are or were in use.
I’d also love some more plans for big energy storage aswell as new subsidies for the energy grid and renewables. The famous german bureaucracy is obviously also not helping any of this.
afaik its using the backup of Rarbg and adding new content too
its the one with .to
Yeah and discord is allowing it. Thats all i am saying.
Of course Restorecord is doing it on purpose. There are some valid reasons, but maybe Discord shouldt allow untrusted bot-developers like them to do so.
afaik thats rather about the parallel service someone had selling the data for a subscription and getting that data from restorecord’s database.
In the video it is already suspected restorecord is in on it, and the update comment proves it.
The problem with restorecord getting that data in the first place persists. I am not aware if Discord is tackling that issue at all e.g. making it against EULA and banning those bots.
Discord bots were able to get a users IP via the verification system afaik.
And there are of course other ways to force users to do so. Its more interesting Discord themselves didnt care about these methods to ban such bots… well its Discord, not that surprising when i think about it.
Media is better indexed on Rarbg (which doesnt exist anymore, but the biggest copy is TheRarbg which works similarly)
But they are leaving it open…
big reason why i switched to kopia, borg just doesnt cut it anymore…
I would be careful with some of these providers depending on your usage.
You are potentially sending a ton of info to them…
I have access to Bing Chat Enterprise through my company, and only because its the Enterprise version i am half confident in using it with more restrictive data.
Though the frontend of copilot is so heavy and sucks, so i have a proxy for GPT-API to Bing Chat.
Had hoped GPT4All Bing provider would support login, but sadly not, so essentially had to reimplement it all myself.
Yeah the DnD mevhanics are weird for me coming from DOS2…
I really miss elements mixing and having to focus on elements in general. And those weird ‘Long Rest’ things… kinda annoying for me.
umm… isnt the government or rather the judikative already deciding what extremist is?
How would specifically this be different?
I can understand the problems thos causes for the platforms, but the government injecting decisions is something you focus on?
Not to forget the many other places they inject themselves… one could say your daily lifes because… careful now… you live in the country with a government, whaaat?
I mean EndeavorOS can install the same gui package manager as Manjaro has, pamac.
Game support usually comes from using packages you need and those packages being up to date to support latest changes like fixes.
Am a long time EndeavourOs user, quite happy, it allows everything i need and pacman never broke on me… cant say the same about apt, when using non-standard repositories (for some up to date packages)
And the AUR is awesome. Has many packages not found in the normal repositories, just some have to be compiled which can take a bit of time, but i dont have to fiddle with it.
Yeah, it needs those rules for e.g. port-forwarding into the containers.
But it doesnt really ‘nuke’ existing ones.
I have simply placed my rules at higher priority than normal. Very simple in nftables and good to not have rules mixed between nftables and iptables in unexpected ways.
You should filter as early as possible anyways to reduce ressource usage on e.g. connection tracking.
Have a friend with a Gen1, super easy to hack and not used in some time…
The others need a modchip, can be a bit pricy and is more fliddly.
Indeed, not classically, but there are HSTS preload lists you can put your domain into which will be downloaded by supported browsers.
And via HSTS you can include all your subdomains, which would then force proper TLS connections for those you havent visited before too.
With the new TLS1.3 version we are getting the HTTPS / “SVCB” Record which not only allows ECH but also indicates to the client similar protection policies like HSTS. (RFC 9460)
ECH will then make such attacks impossible on TLS-level, assuming DNSSEC is used and client can make an integrity-checked lookup e.g. via DoH/DoT or validating DnsSec themselves.
The strength of this depends on the security-chain you want to follow of course. You dont need DNSSEC, but then the only integrity-check is between DNS-Service and Client if they use DoH/DoT (which is usually enough to defeat local attackers)