FrostyCaveman

joined 2 years ago
[–] [email protected] 1 points 1 day ago (1 children)

That seems like the tower must have to keep track of a hell of a lot of beam direction info. Damn

[–] [email protected] 6 points 1 day ago

OCR makes this strategy way more useful than it otherwise would be haha

[–] [email protected] 13 points 1 day ago

Is she odd with food in general? Or just at restaurants?

[–] [email protected] 3 points 1 day ago

You made me feel old, calling Machinae Supremacy “a band at the time”.. I thought nah that can’t be right, that era wasn’t that long ago, surely? So I looked up when Overworld came out and it was 17 years ago. Oh.

I sorely miss that optimistic, anarchistic (and anarchic) old internet. But the older and more cynical I get, the more I have a deep-seated suspicion that the powers that be actively encouraged this early adopter hype-optimism, knowing they’d be able to lock us in to more exploitative forms later.

It’s a bit later in the timeline, but I also see that in the world of design language and HCI: the abrupt shift from skeuomorphic “Fruitger Aero” to soulless, flat “Material Design” encapsulates this feeling of being ensnared, of having the jail bars slam down shut behind you, in a more visual way.

[–] [email protected] 1 points 1 day ago

There is a decent metaphor buried in there, yeah. Basically trying to get at the difference between broadcast (how TV and radio worked, which everyone was already familiar with) and how the internet works which is a “unicast” kind of thing

[–] [email protected] 13 points 1 day ago* (last edited 1 day ago)

Ah sweet, my left-pad is coming today!

[–] [email protected] 10 points 3 days ago (1 children)

Save this to your phone and get permanently banned from visiting both superpowers

[–] [email protected] 4 points 3 days ago (1 children)

Admiral Adama was right again

[–] [email protected] 4 points 3 days ago (1 children)

National Secessionist Forces

[–] [email protected] 13 points 3 days ago

VERY hands on, wouldn’t recommend it haha.

But that’s the beauty of open source. You CAN do it

[–] [email protected] 43 points 3 days ago* (last edited 3 days ago) (3 children)

I think my approach is probably the most insane one, reading this thread…

So the only thing I expose to the public internet is a homemade reverse proxy application which supports both form based and basic authentication. The only thing anonymous users have access to is the form login page. I’m on top of security updates with its dependencies and thus far I haven’t had any issues, ever. It runs in a docker container, on a VM, on Proxmox. My Jellyfin instance is in k8s.

My mum wanted to watch some stuff on my Jellyfin instance on her Chromecast With Google TV, plugged into her ancient Dumb TV. There is a Jellyfin Android TV app. I couldn’t think of a nice way to run a VPN on Android TV or on any of her (non-existent) network infra.

So instead I forked the Jellyfin Android TV app codebase. I found all the places where the API calls are made to the backend (there are multiple). I slapped in basic auth credentials. Recompiled the app. Deployed it to her Chromecast via developer mode.

Solid af so far. I haven’t updated Jellyfin since then (6 months), but when I need to, I’ll update the fork and redeploy it on her Chromecast.

[–] [email protected] 1 points 6 days ago

Yep, still mad I missed the final episode of Season 6 of Stargate SG-1

view more: next ›