• 0 Posts
  • 837 Comments
Joined 3 months ago
cake
Cake day: February 5th, 2025

help-circle
  • I guess it depends on how you got caddy to begin with. If you used xcaddy, you have to update caddy the same way (recompile via xcaddy) otherwise you’ll get the default binary which has no misc modules by default, which kinda sounds like what’s happened but who knows for sure.

    If you’re feeling daring, you can try to compile caddy yourself with xcaddy, it’s super easy.

    Save your Caddyfile’s (ultra important), and uninstall caddy. Install xcaddy (apt install xcaddy [or go install github.com/caddyserver/xcaddy/cmd/xcaddy@latest]). Then use xcaddy to compile caddy with the modules you need;

    $ cd /tmp
    $ xcaddy build --with github.com/caddy-dns/porkbun --with github.com/caddy-dns/cloudflare --with github.com/some-user/whatever-module
    

    Caddy will build and be spit out in /tmp/caddy. Move it to /home/username/.local/bin or something, and make sure that directory is in your path. Don’t forget to chmod +x caddy.

    Run caddy like normal and see if this fixes your issue. If not, you’ll likely have to try and older version of caddy (uninstall and specifically install the previous version or if you can’t, use xcaddy with CADDY_VERSION to build a specific version with your modules), or wait until they push a fix for whatever they broke.


  • Is there any privacy advantage or security concern over them ?

    This is more of a philosophical question than anything. If you trust that they’re not using your data for anything nefarious, I really advocate for RethinkDNS. It’s a really great service and truly fills a need between the clear-net and running your own DNS.

    If you don’t trust RethinkDNS, etc, etc, to not do anything nefarious, then it’s time to setup your own.

    I always use rethinkdns and block bypassed dns, so i think now every dns is routed through rethinkdns and its impossible to cause a leak. Is that a myth as no dns app can provide that much privacy or security ?

    I wouldn’t say it’s a myth or anything, but to say you’re 100% secure from leak? Probably don’t trust that feeling. Keep it at 99% secure with 1% suspicion.

    How effective is an application firewall than a network level firewall like nextdns ?

    Like most security software, it depends on how you use them. If you use firewalls effectively, even software based firewalls can work exceptionally well.

    may i use a application firewall or network level firewall ?

    You can do both. Software based requires you to setup something on each device you want to firewall. Network is a blanket and will affect all of your devices with only one setup. But either works just fine–just depends on how much effort you want to put into it, I guess.



  • Xanza@lemm.eetoLinux@lemmy.mlWhat was Linux like in the 90s
    link
    fedilink
    English
    arrow-up
    18
    ·
    edit-2
    2 days ago

    A real pain in the ass. It was still worth it to use for the experience, especially if you had an actual reason to use it. Other than that it was just an exercise in futility most of the time…and I think that’s why we loved it. It was still kinda new. Interesting. And it didn’t spoon feed you. Was quite exhilarating.



  • Lots of things are improved with a GUI. IMO this is one of them.

    Having a no-nonsense and predictable folder structure to store documents makes sense for those who are organized. For those who aren’t, you can still use projects like this to sort data so they’re retrievable by everyone, not just those who know and understand your folder structure.

    The intake emails are particularly interesting. Receive email with attachment and save it automatically. Excellent for repetitively collecting data without setting anything extra up. Just create an email alias for your intake, and distribute it. Wait for people to email shit to you.

    Great idea, IMO.


  • There’s no particularly smart way to accomplish this in the exact way that you want. I don’t like the solution which searches your $PATH because now you’re adding latency to search your entire $PATH for every command to add this functionality. It’s a singularly better solution to tell the CLI what you want versus the CLI attempting (using logic) to figure it out.

    The easiest solution here is to create your own command which calls the target application with --help;

    #!/bin/bash
    $1 --help | bat --language=help
    

    Then run it;

    $ script_name docker
    

    and it will run docker --help | bat --language=help. If you use this solution a lot you can try to use bash function which you call at the end of commands if they error;

    helpfunc() {
      $1 --help | bat --language=help
    }
    
    trap 'helpfunc' ERR
    

    But now you have to run logic to truncate previous commands to only return the first word of a command from history and it becomes a real PITA…

    Long story short, if you want to hack your console experience like this, you’re looking for a functional shell scripting language, like Elvish shell and not bash.



  • Xanza@lemm.eetoPrivacy@lemmy.mlwrappers for famous apps
    link
    fedilink
    English
    arrow-up
    25
    ·
    6 days ago
    1. Not open source doesn’t mean “non-safe”–that’s a pretty dangerous and completely incorrect characterization
    2. The apps you list are literally the most non-safe services you could have possibly listed
    3. That’s not what a wrapper is, I think you mean front-end
    4. Using the services at all means your data isn’t protected, no matter which front-end you use the service collects your data, not the application you use

    If you want to take your privacy seriously, then stop using these services. It’s the service themselves that aren’t privacy respecting, not the application in which you use to interface with them…






  • Xanza@lemm.eetoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    29
    ·
    8 days ago

    I will be very surprised if China can’t make their own competitive AI chips soon.

    That’s exactly the only thing this is going to do. They have the manufacturing to do it, it’ll just take a bit of time. So we cut them off, they slump for a little bit, but then they become non-dependent on us because they’ve developed their own chip.

    And now we can’t compete at all.





  • Xanza@lemm.eetoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    9 days ago

    They said “useful,” they didn’t say “relevant.”

    I’m really tired of this narrative. Far be it from me to defend a billion dollar company, but I’ve been using Google since its inception. For literally as long as its been available, and the issue people have with Google is that as a company they changed the way they do search over a decade ago, and people tend to not realize it.

    Google went from returning information about “restaurants” when searched, because it was relevant to the search, to assuming you likely want to know what restaurants are in your area when you search for it. Therefore it pivoted from a relevancy based search engine to a contextual based search engine. Google attempts to interpret what you mean when searching for something and provides results based on the context of that search rather than just throwing results at you simply because they’re relevant to the search terms used. And people are so fucking mad at them for trying to make search better.

    Have they done a good job? Not really. Should they be literally crucified at the fucking cross for attempting to interpret results rather than just throw a bunch of shit at you and rely on the users technical ability to filter data? Not really…

    Long story short, people need to take a fuckin’ chill pill when it comes at least to Google search results.


  • It’s evident to me that you’re either stupid, or lack the ability to read. You make up your mind on which is which.

    It’s not possible for a company, no matter where they are in the world to permit users to do things which are illegal. Period. Proton cannot allow their users to use their VPN to use the torrent network to download IP. As with any company anywhere in the world. To live in some state of reality to be unable to acknowledge this is the most insane shit I’ve ever seen in my life. You literally are living outside of reality here… The sheer level of stupidity here is fucking insane to me, so I’ll try one last time to put it into perspective for you;

    I’ve said “Murder is illegal, no matter where you are. You can’t just kill people” and you’ve said quite unironically “GLOCK allows their customers to kill people, they’ve made murder legal.”

    Do you genuinely not see how fucking idiotic and stupid you sound?

    Many countries don’t even acknowledge DMCA.

    This also has nothing to do with DMCA–which is a US law and cannot be enforced in other parts of the world. As I’ve said from the very beginning, theft of IP (torrent or otherwise) is individually illegal in all but less than 5 countries on this planet… It doesn’t matter how you do it, or where you do it. It’s always going to be illegal because all of the countries from which these VPN providers originate, it’s illegal in those countries.

    I’ve done my very best to explain this very simple concept to you–that you can’t break the law just because you’re behind a VPN and they don’t actively pursue you for every little infraction–but if you still don’t understand it after all this, then do us both a favor and just take a vow of silence for the rest of your pitiable life.

    I mean Jesus Christ.