DroidFS has been working well for me. It’s available on F-Droid.
DroidFS has been working well for me. It’s available on F-Droid.
Where is the analytics data supposed to go if you aren’t hosting a service to store it? Are you expecting the author of this free and open source analytics platform to also provide free hosting and storage?
Can confirm. This recipe is very good.
all public bodies must disclose the source code of software developed by or for them, unless precluded by third-party rights or security concerns
So this effectively changes nothing.
Thank you so much for the continued updates!
Something about the fixes for usernames not showing up appears to have undone the fix for #122. I can see my username in plaintext for the current account even though I have hidden the display names.
Installing by piping from curl is pretty common and not a red flag in and of itself. Even Rust is installed this way. If you don’t trust the URL, you also shouldn’t trust any binary installers downloaded from that website.
Black body radiation was my thought as well. It may not be the average including the inner layers, but it’s the average at the crust. About -1°F according to Wikipedia.
To add to this, is probably hard because the composition of the interior of the earth is a lot of guesswork. We can only directly observe how much heat is coming out of it.
Android and iOS don’t let mobile apps run continuously in the background. If an app is closed or in the background, it generally can’t talk to its own servers.
Instead, Google and Apple provide a service that allows the apps’ servers to push a message even if the app is closed.
If you take out the employer-side taxes and cost of benefits, maybe. A fair number of their employees must be software engineers, and that much compensation isn’t unreasonable for expert software engineers.
Where does the initial cryptographic verification come from? I’m not arguing that you can’t pin certificates.
There is no way a user can know the website is real the first time it’s visited, without it presenting a verifiable certificate. It would be disastrous to trust the site after the first time you connected. Users shouldn’t need to care about security to get the benefits of it. It should just be seamless.
There are proposals out there to do away with the CAs (Decentralized PKI), but they require adoption by Web clients. Meanwhile, the Web clients (chrome) are often owned by the same companies that own the Certificate Authorities, so there’s no real incentive for them to build and adopt technology that would kill their $100+ million CA industry.
I have GPay and I frequently get notifications telling me to claim their reward points. Those notifications aren’t configurable separately from the payment notifications at the OS level. Super annoying.
I can’t explain the differences in comment tone, but the differences in votes are understandable. People don’t like to see duplicate posts in their feed.
Personally, if I want to upvote a particular that has a duplicate I’ll always upvote the one with more upvotes. And I’ll usually downvote the other, too. I don’t want to have to open both posts to read the comments, so I’d like the community to align behind one of the two posts as the “real” one.
If you expose port 80 on the PiHole service, can you login? Are you certain it’s a problem with Traefik? The PiHole could just be having problems.
You might also look into the 302 redirect that PiHole does upon login. It might not play nicely with Traefik.
I don’t know how easy it would be to migrate to your own local machine, but what you’re describing sounds like Desktop-as-a-Service. All of the major cloud providers offer this in some form.