

How long until one is hijacked?
How long until one is hijacked?
Don’t expect Gitea to make progress on federation. Forgejo is a fork of Gitea and anybody that cares about federation is probably on the Forgejo side of the fork.
He must have meant “piece of Ukraine.” The aggressors just want piece.
Even if 1 ChatGPT query is only using 3 watt-hours, that is still substantial. People don’t make just 1 normalized ChatGPT query, whatever that means. The overall usage including training is not insignificant.
If you’re running Kubernetes, what is the point of LXC or Proxmox in this setup? Kubernetes will give better scaling and utilization.
It would be illegal to explain how this is relevant, but it would be impossible to prevent Bitcoin double spending without access to the shared ledger.
So if the site is compromised and the attacker already has access to your authenticated session and data, they can try to also obtain your password and a single TOTP code via click jacking? It doesn’t seem all that useful.
Nix isn’t just for reproduction. It has immutability so if you break your system configuration you can revert to a previous profile, and the way installations are managed allows you to install software that uses incompatible versions of the same dependencies at the same time.
If you can keep it disconnected from the internet you can keep the company from pushing out a downgrade to introduce new subscriptions. I’m already doing it with my TV. If it doesn’t have subscriptions and it can be disconnected from the internet so it can’t sell my data or introduce new subscriptions, I might buy one.
Is it really 29,990 or is it 29,990 and monthly subscriptions and your data?
I think it would be harmful to my children to know that people like this exist and are hurting everyone, including children, supposedly on the behalf of those children. I would like to require age verification to interact with these politicians. They can only use services that support age verification and cannot interact with anyone who hasn’t verified.
Is it trolling if Trump believes it’s because of the great job he did?
What if I want myself or my children to have access to this content? Where is my control?
Giving a container access to the docker socket allows container escapes, but if you’re doing it on purpose with a service designed for that purpose there is no problem. Either you trust Watchtower to manage the other containers on your system or you don’t. Whether it’s managing the containers through a mounted docker socket or with direct socket access doesn’t make a difference in security.
I don’t know if anybody seriously uses Watchtower, but I wouldn’t be surprised. I know that companies use tools like Argo CD, which has a larger attack surface and a similar level of system access via its Kubernetes service user.
Mounting the docker socket into Watchtower is fine from a security perspective, but automatic updates can definitely cause problems. I used to use Rennovate and it would open a pull request to update the version.
Serious crimes like supporting “terrorism”?
Will they? It’s possible to do on Android but I’ve never heard of anyone doing it. Cordova on Android uses the Android web view component rather than ship its own copy of Chromium. Of course Android web view is now Chrome so it’s less likely that you would have difficult compatibility problems that would make you want to ship your own browser engine.
React Native and React are different. React Native does not use a web browser.
Git does have a server component. When git connects to an ssh remote it executes an ssh command that needs to be present.
£19 a bottle for water so dirty that it leaves behind measurable solids when it evaporates.