There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

chaospatterns

@[email protected]

This profile is from a federated server and may be incomplete. Browse more on the original instance.

chaospatterns ,

That would be illegal. I worked on the software deployment of these devices in a store. If we increased the price, we’d automatically give the customer the lowest price in the last several hours.

The other problem was they were extremely low powered and low bandwidth and it would have killed the battery to update more than a few times a day.

chaospatterns ,

Accidentally typo your password and get blocked. And if you’re tunneling over tor, you’ve blocked 127.0.0.1 which means now nobody can login.

chaospatterns ,

Fears raised over ‘Chinese spy cranes’ in US ports

There are concerns that the machines are effectively Trojan Horses for Beijing and could be used to sabotage sensitive logistics

Unexplained communications equipment has been found in Chinese-made cranes in US ports that could be used for spying and potentially “devastate” the American economy, according to a new congressional investigation.

The finding, first reported by The Wall Street Journal (WSJ), will stoke American concerns that the cranes are effectively Trojan Horses for Beijing to gain access to, or even sabotage, sensitive logistics.

The probe by the House Committee on Homeland Security and the House select committee on China found over a dozen pre-installed cellular modems, that can be remotely accessed, in just one port.

Many of the devices did not seem to have a clear function or were not documented in any contract between US ports and crane maker ZPMC, a Chinese state-owned company that accounts for nearly 80 per cent of ship-to-shore cranes in use in America, according to the WSJ.

The modems were found “on more than one occasion” on the ZPMC cranes, a congressional aide said.

“Our committees’ investigation found vulnerabilities in cranes at US ports that could allow the CCP [Chinese Communist Party] to not only undercut trade competitors through espionage, but disrupt supply chains and the movement of cargo, devastating our nation’s economy,” Mark Green, the Republican chair of the House Homeland Security Committee, told CNN.

The Chinese government is “looking for every opportunity to collect valuable intelligence and position themselves to exploit vulnerabilities by systematically burrowing into America’s critical infrastructure,” he told the WSJ, adding that the US had overlooked the threat for too long.

The Telegraph has contacted ZPMC for comment.

‘The new Huawei’

A spokesman for the Chinese embassy in Washington DC said claims that Chinese-made cranes pose a security risk are “entirely paranoia.”

The US investigation began last year amid Pentagon fears that sophisticated sensors on large ship-to-shore cranes could register and track containers, offering valuable information to Beijing about the movement of cargo supporting US military operations around the world.

At the time, Bill Evanina, a former top US counterintelligence official, said: “Cranes can be the new Huawei.”

“It’s the perfect combination of legitimate business that can also masquerade as clandestine intelligence collection,” he told the WSJ.

In recent years, a handful of Chinese crane companies have grown into major players in the global automated ports industry, working with Microsoft and other companies to connect equipment and analyse data in real-time.

chaospatterns ,

Paperless does support defining a folder structure that you can use to organize documents within that paperless media volume however you should treat it as read only.

OP could use this as a way to keep their desired folder structure as much as possible, but it would have to be separate from the consumption folder.

Ticketek ‘glitch’ appears to re-sell fan’s $659 ticket for Taylor Swift concert — “They said, ‘someone else has it, we don’t know who, we can’t check or track who has your ticket’” (au.news.yahoo.com)

Ticketek ‘glitch’ appears to re-sell fan’s $659 ticket for Taylor Swift concert — “They said, ‘someone else has it, we don’t know who, we can’t check or track who has your ticket’”::A Taylor Swift fan believed her VIP ticket was ‘stolen’ from her account by Ticketek after an apparent system ‘glitch’.

chaospatterns ,

Doubtful. TicketMaster is there to take the bad PR but was designed to get as many fees and funnel part of those fees to the artist. Yes TM has deals with Live Nation that basically force big artists to use them because they have the big stadiums, but Taylor Swift is a massive artist she has tons of lawyers and can negotiate fees.

As much as I love Taylor Swift, I have no doubt that she is massively benefiting from the high ticket prices.

chaospatterns ,

I don’t fully understand what you’re saying, but let’s break this down.

Since you say you get an NGINX page, what does your NGINX config look like? What exactly does the NGINX “login page” say? Is it an error or is it a directory listing or something else?

Why is everything in consumer / American life so fucking shitty now - and companies literally just say 'oh bc profit margins' and we're now expected to swallow that and sympathize?

like I went to taco bell and they didn’t even have napkins out. they had the other stuff just no napkins, I assume because some fucking ghoul noticed people liked taking them for their cars so now we just don’t get napkins! so they can save $100 per quarter rather than provide the barest minimum quality of life features.

chaospatterns ,

Also, the law requires that publicly traded companies be greedy

The law doesn’t actually state you need screw over your customers and maximize profit. It says that executives have a fiduciary duty, which means they must act in the best interest of the shareholder, not themselves.

That does not mean they have to suck out every single dollar of profit. Executives have some leeway in this and can very easily explain that napkins lead to happier customers and longer term retention which means long term profits.

It’s purely a short-term, wall street driven, behavior also driven by executive pay being also based in stock so they’re incentivized to drive up the price over the next quarter so they can cash out.

chaospatterns ,

The problem with Grocy is that going too fine grained means you’re unlikely to keep it up to date or it be accurate. I would not try to track your usage in ml. Just track it at the bottle level.

However you can still track the price per ml because grocy lets you independently set units. Just define a mapping between bottle and ml.

chaospatterns ,

Then try something like:

Create Quanity unit of ml and a liter unit

In your product use: Unit stock: bottle or liter Unit purchase: bottle Consume: ml Price unit: ml

Set a product specific QU conversion of bottle to ml

Weirdly, the quick consume unit is based on the stock unit, not the consume unit. That seems like a bug.

chaospatterns ,

It’s true that Mozilla does collect telemetry and that Mozilla Corp is for profit, however Mozilla Corp is owned by Mozilla Foundation. That ownership structure is either a way to get around limitations on non profits, or its an opportunity for the Foundation to directly influence the Corp to be better.

However, I’ll still use Firefox/Thunderbird because: Usage stats such as number of accounts or filters is in no way comparable to my username and password. One is basic metadata and stats, the other is a massive risk. You can opt out of the telemetry, the only way to opt out of sharing your password is to not use the new Outlook.

I take a more pragmatic approach to privacy based on my trust. I understand the value of telemetry, but change it depending on the company. Big Tech I have less trust in, Mozilla, while they have issues, are on average far better for privacy vs big tech.

As a developer, I understand the value of telemetry and the risks that come with collecting any data. I pick Firefox because it challenges the homogeney of Google’s influence and it looks like I’m going to pick Thunderbird because I’ haven’t seen a better option.

chaospatterns ,

That’s not because you have a wildcard. That’s because you need to implement DKIM, DMARC, and SPF records to prevent others from using your domain name to send mail.

MTAs use those standards to verify if somebody is permitted to send email for your domain. If you don’t have those set then you can get what that ISP described.

Unpacking Amazon's stealthy mass layoff strategy in Seattle (www.seattletimes.com)

Amazon, frequently under the microscope for its pioneering but often criticized management techniques, now requires its employees to commit to office work at least three days a week. This new policy will necessitate some employees to uproot their lives and move to larger hubs closer to main offices....

chaospatterns ,

Amazon corporate employees get RSUs which are stocks, not options. After the new hire RSUs go away, you end up with two vest dates a year and new comp offerings start the following year (so in 2024 you’ll see new money in 2025 plus a small base salary bump that goes in effect that month).

Tech salaries are frequently stock based, but Amazon’s is unusual in that it’s only twice a year, and bumps start the following year, and they recently made the change to do 2 year offers instead of 3 years.

chaospatterns ,

Tailnet appears to be Tailscale which is Wireguard underneath. This means it operates at layer 3 (IP). However a bunch of smart home stuff (mDNS, WoL, etc) all depend on layer 2 connectivity (same subnet).

That means some stuff won’t work correctly.

chaospatterns ,

Will I still need to consider multicast DNS if my DNS server is on-prem (Pi-Hole + Unbound)

Multicast DNS is separate from DNS, so even if you have Pi-Hole, you’d still have devices using mDNS. It’s possible to route mDNS across separate IP networks seeing as how there’s mDNS relays across VLANs which would suggest Wireguard could support Multicast. Other things use Broadcast (e.g. WoL) which is a bit more challenging to forward across IP networks.

I’m not familiar with GRE so I couldn’t comment on whether it’s possible or not. I guess it all depends on how confident you are with your networking skills. If you get it working, you should definitely document it and share with others.

I didn’t quite do what you did, but I ran HA in a Kubernetes cluster which was logically a separate IP network. I had to setup the container with multiple network interfaces and specially craft the route table to forward broadcasts + multicast traffic to the correct network.

My Docker containers can no longer communicate with the host's local network

I feel like I’m losing my mind. A few days ago, all of my containers running on Docker Desktop on my Windows Server host were working nicely. I had NFS volumes set up on a few of them to reach my synology NAS on my local network, and things were working fine. I’ve done so much digging and tweaking over the last few days, so...

chaospatterns ,

If you’re running Docker for servers not development, then you can make Hyper-V work. I used to do that before I got a separate Linux server and it worked out.

Just setup a network adapter that gets bridged to your Ethernet adapter, then create a VM that uses that bridged adapter. The Linux VM will appear like its another computer on your LAN and you can use Docker with host Network.

chaospatterns ,

Attestation depends on a few things:

  1. The website has to choose to trust a given attestation provider. If Open Source Browser Attestation Provider X is known for freely handing out attestations then websites will just ignore them
  2. The browser’s self-attestation. This is tricky part to implement. I haven’t looked at the WEI spec to see how this works, but ultimately it depends on code running on your machine identifying when it’s been modified. In theory, you can modify the browser however you want, but it’s likely that this code will be thoroughly obfuscated and regularly changing to make it hard to reverse engineer. In addition, there are CPU level systems like Intel SGX that provide secure enclaves to run code and a remote entity can verify that the code that ran in SGX was the same code that the remote entity intended to run.

If you’re on iOS or Android, there’s already strong OS level protections that a browser attestation can plugin to (like SafetyNet.)

chaospatterns ,

Mine was flashing my Emporia Vue2 home energy monitoring system with ESPHome

I’m always interested in sensors (got a bunch of home made Air Quality and CO2 sensors) so seeing real time energy was cool.

With the per circuit sensing I’m experimenting with identifying if my fridge is left open, or identifying when my clothes washer is finished.

chaospatterns ,

What is your threat model or goal? It could hide the device you use to connect to the instance, however a lot of actions you do on Lemmy, including all upvotes, are public to other instances.

chaospatterns ,

Keepass2Android. I store everything in a KeePass database synced with OneDrive. I like KeePass because it serves as the storage for all my passwords, OTP, and even SSH keys because it can act as an SSH KeyAgent.

chaospatterns ,

First the basics. Connection refused means that nothing is running on "192.168.0.2:8020"

  1. Is 192.168.0.2 the IP address of the Django container? If it’s the host’s IP, does docker ps show that the port is bound to the host? e.g. 0.0.0.0/8082->8082

Confirmed upstream block container is running and on the right exposed port

What steps did you do to confirm that this is running?

chaospatterns ,

There was an uncaught exception to boot gunicorn workers

That’s odd that it didn’t cause the Docker container to immediately exit.

What now? So now that it looks like everything is working. What is the best practice for the nginx.conf? Leave it all in /etc/nginx/nginx.conf (with user as root), reestablish the out box nginx.conf and /etc/nginx/conf.d/default.conf

My suggestion would be to create /etc/nginx/conf.d/mycooldjangoapp.conf. Compared to conf.d/default.conf, this is more intuitive if you start hosting multiple apps. Keep it out of the nginx.conf because apt-get or other package managers will usually patch that with new version changes and again it gets confusing if you have multiple apps.

chaospatterns ,

If I create a secondary config as you are suggesting, wouldn’t it create a conflict with the server blocks of default.conf

No, you can have multiple server blocks with the same listen directive. They just need to differ by their server_name and only one server block can contain default_server; Reference

NGINX will use the server_name directives to differentiate the different backend services. This is a class virtual host configuration model.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines