• 0 Posts
  • 30 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle
rss

  • I’ll coincide with you in that first-aid-quick-repairs is something people should in the best of cases know how to do, but setting a envirental variable or installing a package is not a “simple thing”. I’ve worked with engineers that programmed math models for a living that had no idea what a enviromental varible even was. Yes is easy to do, but the concept behind it, what it is, what it does and why are not simple, without the right background or the will to learn about the topic.

    And, about user and owner. Sure, I get your point and personally I share it. But again, that is an opinion, tell a non-interested-user that they don’t really own their rig until they know how to use the terminal and I assure you that most of them will disagree.

    Edit cause I wrongly posted before finishing: Comparing uncloging -manually pushing and pull a bar- or chaning a light -turn left, change, then right- or a breaker -literally just pulling a tab up- are WAY simpler actions. Yes, running apt upgrade is easy, but how you know is all well? That it work? + if I run apt update everyday I see almost no diference in my system, why should I even do something like that



  • Do you know how everything in your house works? How to repair everything? No right?

    Would you be brave enough to mess with the grounding of your house, or the AC or the heaters, the washing machine, the doors? Not eveyone wants mess with every (subsystem) thing in their house/live"

    Most of the people I know want their PC to work and if somwthing goes wrong they just send it to repair or ask somebody else to fix it, they don’t wanna do it themselves, which I find normal, they have little to no interesting in PCs, and that is compleatly fine.

    And before someone says "Yeah, but the computer won’t kill you if you fuck up the fixing or messing, let me tell you, a “sudo rm -r” or “sudo chown -R” can fuck you system BAR, making you loose important data and info.

    -…But refugee -I hear you about to type-, they SHOULD have 10921 back-ups in atleast 2542 independent locations. Yo, they don’t wanna even see the terminal, and you want them to interest themselves for data integrity and redundacy? Come on.




  • Not very important, even if generated by a single actor N has not such a big importance. If I were implementing something like this I’d just probably make it -hardcoded-.

    If you reaaaallyyyy want to decide on a N on the fly, I’d put a restricction (a<Nx<b) make each participant generate a Nx and then sum then all, -multiply’em If you wanna be hardcore- But I’d be tricky to get it right, for example a party might be able to consistently make N whatever the max value of N is by making their Nx very big -Which, well, I don’t really know how it would benefit that party and how would they exploit it-. Maybe using a operation like a XOR on the Nx would be robust enough, and would mitigate the kind of attack that I described above

    Tl;dr: you can just have a random party generate it.


    1. Decide on a random N and what tails (even) and heads (uneven) mean.

    2. Each party generates a random number

    3. Combine the numbers with a conmutative operation of some sort, the harder the operation the better.

    4. Take the hash N times. (Can be done independently by each participant)

    (4.5) optional: for extra robustness, do some hard-to-calculate transformations to the result of 4. (Can be done independently by each party)

    1. The final result is either uneven or even === coin toss. (0 will be treathed as even*.*)

    This is not infalibe, one party could get all the numbers a precalculate a answer to get a specific result but they will need to randomly try numbers. adding some timing constrains, using big numbers and hard operations would make that sort of attack not really practicable.

    Nice question, had fun thinking about it!


  • Either you run the RP in the VPS and point to the ips on your server or you run it on the server and access it like you are accessing Jellyfin.

    Easiest option is a container with Nginx proxy manager (imo) with NPM you can get free let’s encrypt certs, but be aware, in case you want automated certificates, NPM will need to run on the machine pointed to by the DNS (in your case, your VPS I guess)










  • I’d to ask what should then we do in case of a dictatorship, for example? Just lay down and fear the F-35s?

    Yes, even if everyone has a wallmat glock we’d outgunned by a mile by let’s say the military, but also you can’t just bomb and kill the shit out of your labor and infrastructure — I mean, you can, also you can bomb and kill enough to get them to submit, but that is just not something you can just keep doing indefinetly. It is also very hard to maintain a economy going with a big insurrection going and there is were guns bring a point, they give you at least a figthing chance, way better than nothing.

    I’d also like to point out the ad hominem of calling the hypotetical gun owner a “McFucksHisSister” it brings nothing of value to the conversation.

    I also do not belive carrying a gun around is something needed -by almost anyone- but ownership is important.


  • I dont know. 😆 im really just trying to get it in case -for example- of needing to advice someone in such a case :) my confusion probably comes from the fact that I have never host anything outside containers.

    I still see it a bit diferent. A well structured container structure with configs as files instead of bare commands, back up volumes would be the same effort… But who knows. Regarding the rest like proxies, well you do not really need one.

    Thanks taking the time to explain you point tho!