Why does his drivers license specifically have to match up with his ID to be able to vote? That seems really weird. (Also, could he pretend to just not have one?)
Why does his drivers license specifically have to match up with his ID to be able to vote? That seems really weird. (Also, could he pretend to just not have one?)
Irresponsible and malicious journalism like this is why I have an immediate distrust against any sort of reporter that tries to talk to me. Probably irrational but still.
I hope your balls explode.
I wish him the very same.
Yup!
Never seen this before, but you can enable NFS debugging with ‘rpcdebug -m nfs -s all’ (or nfsd on the server, or rpc for the underlying protocol). It prints to dmesg.
IIRC Keepass2Android does have that feature.
Does that make an SBC a fancy tablet?
I’m not convinced this is a good idea. Resident keys as the primary mechanism were already a big mistake, syncing keys between devices was questionable at best (the original concept, which hardware keys still have, is the key can never be extracted), and now you’ve got this. One of the great parts about security keys (the original ones!) is that you authenticate devices instead of having a single secret shared between every device. This just seems like going further away from that in trying to engineer themselves out of the corner they got themselves into with bullshit decisions.
Let me link this post again (written by the Kanidm developer). Passkeys: A Shattered Dream. I think it still holds up.
deleted by creator
I made chili con carne. Only meal today, actually (strange eating habits I guess).
Meh. WebKit is Blink as much as it is KHTML. It’s also not controlled by Google.
iCloud Photos for some reason still only allows you to upload JPEG files from the web. Can’t even upload HEIC which makes absolutely no sense considering it’s now their main photo format.
But yeah, other than that it’s pretty good.
Wow, I didn’t know there was so much piracy on Android. At least much more so than on desktop computers (or Windows specifically I guess). Enough to make a dev stop even, not just the usual “oh no a few people are pirating our software that would otherwise not have bought it anyway”. I assumed it would be a relatively small percentage of more experienced users.
By mid-September, the iA team claimed to have spent five months making 55 updates to its app and privacy policy and was ready to scan its passports and verify its payment accounts.
Google then requested a CASA Tier 2 assessment. This needed to be done annually, either through an intensive self-directed process or through a corporate partner, like TAC Security or KPMG. By iA’s estimation, the labor and fees to do this would cost “one to two months of revenue” for "a pretty much meaningless scan,” iA suggested in its post.
This is just absolutely crazy. I feel like Google absolutely had it out for them because why would they make them go through this arduous bullshit process for what seems to be described as a text editor app here.
But giving up Factorio is a bridge too far.
Factorio has an ARM port, it runs great on my M2 MacBook. But even if it didn’t, Rosetta works well enough so that x86-only games are playable.
What they suggest sounds like setting up a bridge interface between your LAN and the VPN interface to connect the VPS with your LAN. That’s actually a good idea since it would not need you to have a separate /64 for your local network. In this case I’m pretty sure that your VPN needs to be a layer 2 VPN, i.e. transports whole ethernet frames instead of TCP/UDP only, for this to work correctly. Wireguard doesn’t do this, OpenVPN can for example.
To make the VPS a gateway, you need to configure it to forward packets between networks and then set it as your default route on the clients (with IPv6, default route is usually published using router advertisements, set up radvd service on your VPS for that). That’s pretty much it IIRC except for the firewall rules. Here’s an article that’s some cloud stuff but is also applicable to your situation: https://www.linode.com/docs/guides/linux-router-and-ip-forwarding/#enable-ip-forwarding
I had the network before moving here (created it when I did have a public IPv4). Can’t test creating one new since it will only allow me to make one per IP.
Hm, it doesn’t? I’m not behind CGNAT but I’m in a network I don’t control (university dorm) so my gateway is just another device in the local network and I don’t have a public IP which I control, which I feel like should effectively be the same thing as CGNAT, and it works for me. Maybe it isn’t the same.
The easy way is to just use tunnelbroker.net, that is what I currently have (this would use one of their assigned net blocks, not the one from the VPS). Set it up on the Pi, set up IP forwarding with appropriate firewall rules, make the Pi serve RA so clients can assign themselves an IP, done (IIRC).
If you want to set up the v6/v4 gateway yourself, I would do this with a /64 you can fully route to your home network like you would get with tunnelbroker.net because then you don’t have to deal with the network split and essentially two gateways for the same network (your Pi and the VPS), because otherwise your clients would assume the VPS is directly reachable since it’s in the same network when in reality it would have to go through the gateway (you would have to set up an extra route in that case on every client, I think). You’d need a second network from Oracle for this.
But it’s pretty much the same thing I would assume plus the setup on the VPS side, make the VPN route your /64 block (or use 6in4 which is what tunnelbroker.net uses), configure IP forwarding on the Pi and the VPS between the VPN interface and local/WAN respectively.
Oh, so he has a new ID but I assume registered to vote before the name change and the registration is tied to the name? Ah yeah that sounds like a pain in the ass.