I am a Meat-Popsicle

  • 0 Posts
  • 25 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle






  • I ran gnome for about a decade. I really didn’t like how a lot of bits and pieces of it worked so I went and found all of the plugins and religiously installed and updated them. Updates what happened, crab would break, I’d just have to deal.

    At some point I tried KDE. And it literally did everything that I was doing to gnome through plugins out of the box.

    I’m all about configurability but I’m also a pretty big fan of not having to fuck with it because it already does what I want out of the box.


  • Food, but not primarily for cost savings as most regular used things things don’t last longer than a year, which cost wise won’t bridge the gap.

    55 lbs of 00 flour in the chest freezer, still have about 25lbs of AP flour in there. 1 30lb bag of Jasmine Rice, 1 25 lb basmati. I still have a ton of beans and and dry pasts in mylar/oxy absorb sitting in barens cans for long term storage. When covid started, I had 1 million calories in storage. I don’t plan to go back to that, but I intend to be able to hunker down for a long time.

    For work, I’m pushing to purchase more laptops before tariffs.

    I’ve considered stowing fuel with a stabilizer but even if prices double on fuel, I don’t use enough of it to make a difference.

    It would be a good time to buy any lithium ion batteries and finish off those ali-express/temu orders.




  • So, no, obviously he’s not an adult. That said he’s been armed, trained (Even if inadvertently) to be effective at killing adults.

    So what do you do? do you slap him on the wrist because his pubescent mind isn’t fully ready for the responsibilities of adulthood? Obviously his family is incapable of keeping him out of trouble, One might even consider them to be a bad influence. The kid isn’t evil but he’s been programmed that way. How do we even address that in a safe way? Obviously the parents and the close family need to be held accountable. But what does that leave this scatterbrain brain scrambled little kid who’s already showing a propensity to take lives?




  • So many f****** ads I gave my cell phone cancer.

    TMA:DR

    When taking the geometric mean of 73 benchmarks run for this comparison, upgrading from the Ryzen 9 7950X to 9950X on Ubuntu 24.04 LTS yielded a 14% generational improvement with this set of cross-platform applications/benchmarks while under Windows 11 was a 10% generational improvement. The raw performance of Ubuntu Linux on the AMD Ryzen processors also was greater overall to the extent of the Ryzen 9 7950X to Ubuntu 24.04 LTS nearly matching the Ryzen 9 9950X on Microsoft Windows 11.


  • You could make automatic breaking without a full blown computer, but it’s so much cheaper to put a full-blown computer than it is to do it all in hardware. Everything uses turing complete equipment now, it’s actually less expensive at this point.

    There’s absolutely no reason not to put multiple computers in the car I think the real win is not surfacing it to the end user.


  • Colin is my hero but I think his ranking depends on what day you classify him.

    Screwdrive tank driving Colin furze is different from high speed rotating chef knife belt colin furze who is wholly distinct from Colin Furze mining company who doesn’t seek out any permits.

    I can’t quit figure out whether he would be the best or worst neighbor and existence. Still absolutely love the guy though



  • The first worry are vectors around the Synology, It’s firmware, and network stack. Those devices are very closely scrutinized. Historically there have been many different vulnerabilities found and patched. Something like the log4j vulnerabilities back in the day where something just has to hit the logging system too hit you might open a hole in any of the other standard software packages there. And because the platform is so well known, once one vulnerability is found they already know what else exists by default and have plans for ways to attack it.

    Vulnerabilities that COULD affect you in this case for few and far between but few and far between are how things happen.

    The next concern you’re going to have are going to be someone slipping you a mickey in a container image. By and large it’s a bunch of good people maintaining the container images. They’re including packages from other good people. But this also means that there is a hell of a lot of cooks in the kitchen, and distribution, and upstream.

    To be perfectly honest, with everything on auto update, cloud flares built-in protections for DDOS and attacks, and the nature of what you’re trying to host, you’re probably safe enough. There’s no three letter government agency or elite hacker group specifically after you. You’re far more likely to accidentally trip upon a zero day email image filter /pdf vulnerability and get bot netted as you are someone successfully attacking your Argo tunnel.

    That said, it’s always better to host in someone else’s backyard than your own. If I were really, really stuck on hosting in my house on my network, I probably stand up a dedicated box, maybe something as small as a pi 0. I’d make sure that I had a really decent router / firewall and slip that hosting device into an isolated network that’s not allowed to reach out to anything else on my network.

    Assume at all times that the box is toxic waste and that is an entry point into your network. Leave it isolated. No port forwards, you already have tunnels for that, don’t use it for DNS don’t use it for DHCP, Don’t allow You’re network users or devices to see ARP traffic from it.

    Firewall drops everything between your home network and that box except SSH in, or maybe VNC in depending on your level of comfort.