Isn't it incredible, that we have to read blogposts to learn how to extract an IP addr of a network interface in the shell ... in json ... in 2025 ??!
Some problems will never really get solved.
Thanks for the write up !
Isn't it incredible, that we have to read blogposts to learn how to extract an IP addr of a network interface in the shell ... in json ... in 2025 ??!
Some problems will never really get solved.
Thanks for the write up !
Nooo, I just read the omnivore Readme and was so excited, just to read this blog post afterwards realizing that now you buy in some proprietary AI shit with it :(
Edit: it seems like the selfhosting software is still seeing some traffic, but until now I didn't understand, whether there will be further development or just documentation...
Then, only the vpn provider would see the very same traffic, the ISP would see without vpn.
The ISP would just see your connection to the vpn provider.
The sites themselve would just see the vpn ip.
So it's not the question about whether anyone sees the traffic, but who.
Only Tor would hide this traffic in a sense.
Just partly related, and probably no help here - but about the fact, that you can't type in that password (regardless whether you can remember it or not):
you probably use a bluetooth keyboard on that surface? Before boot is finished, bluetooth connection is not possible, so you need some sort of USB/serial keyboard to even type.
Had this issue when full disk encrypting a surface, because without usb (or the original serial) keyboard your stuck in the luks mount process during boot...
Thanks for the write up!! :)
Could anybody in short explain, what I have to understand from "it's tagged"?
The commit shows that there was a longer with 3.0.0 tag before and now its just 3.0.0
What does that tell us? :D
This seems like a normal cheap android phone with a bootloader-unlocked operating system and some pre-installed ad-block and rethinkDNS'ish Apps imstalled?
And no offence, but the advertising video itself is more scamy then the wedding-dress shop around the corner that is always closed and dusty, but still paying a horrendous amount of rent each month...
I do the exact same thing as OP with KeepassDX at work and works pretty nice so far, since I gave KeepassDX the right acces rights on the nextxloud directory.
What diferences have you figured out so far with Keepass2android in comparison ?
I see lots of sidekicks against Manjaro, it's a thing apparently :D I am using manjaro on a framework 16 for about a year now and it never broke anything, just works wonderful for me, although I dont have any fancy requirements other than a working Linux.
But i would be interested in the critics about the team and their "bad" decisions, as stated in some comments. What were the problems?
Yes it is.
This is unfortunately completely wrong, since you can learn from the homepage of matrix very own client Element, that its supported an trusted by a whole bunch of NATO Armys, including the US of course...
I don't mean by that you shouldnt use matrix, but arguing against signal with matrix is, in so many means, hilarious.
The arguable, but professional cryptographer soatok discribes from a mathematical/cryptographical point of view, what it needs to be a Signal competitor, where matrix (and others) dont catch up (unfortunately)
I think there is a typo in the path in the body of your post, or?