[-] theit8514@lemmy.world 16 points 2 months ago

In the US they are usually governed as real estate legally. You can resell it, but most people aren't interested in paying the maintenance fees. You'll find all sorts of timeshares out there being resold for 1$ because they just don't want to pay the maintenance fee anymore.

[-] theit8514@lemmy.world 48 points 3 months ago

The -k argument on my openssl accepts a passphrase, not a file. You likely encrypted with the filename as the secret, not it's contents. Perhaps you should use -kfile instead.

$ openssl aes-256-cbc -help
Usage: aes-256-cbc [options]

General options:
 -help               Display this summary
 -list               List ciphers
 -ciphers            Alias for -list
 -e                  Encrypt
 -d                  Decrypt
 -p                  Print the iv/key
 -P                  Print the iv/key and exit
 -engine val         Use engine, possibly a hardware device

Input options:
 -in infile          Input file
** -k val              Passphrase**
 -kfile infile       Read passphrase from file
[-] theit8514@lemmy.world 10 points 4 months ago* (last edited 4 months ago)

On one hand you definitely don't want to be assigning manual/static IPv6 to all your devices because if your prefix ever changes you'll have to update it everywhere. IPv6 doesn't really have a concept of private address space (with a few exceptions). ~~On the other hand most modern IPv6 stacks support dynamic protocols like SLAAC while also assigning a static suffix to the published prefix (e.g. You want :0:0:1234:1 to go to your server, and SLAAC gets the prefix 200x::5678/64 your server would assign itself 200x::5678:0:0:1234:1).~~

DHCPv6 fixes a lot of these headaches for managed networks by allowing you to reserve specific IPv6 for a given DUID.

IMO, your network, do what you want. ~~I have two jump Raspberry PIs that I have static suffixes so I always know where they are without relying on DNS or whatever.~~ Edit: I apparently misremembered how I had these setup. I use a custom interface up script to take the SLAAC prefix and append the custom suffix to it as a secondary IP.

[-] theit8514@lemmy.world 29 points 6 months ago

The amount of Windows bashing in this thread is hilarious, for what amounts to Enterprise grade DNS-over-TLS with additional whitelisting. Doesn't help the home user, but likely won't break home users internet access either.

[-] theit8514@lemmy.world 16 points 6 months ago

Perhaps they should ask Copilot how their templating system works.

[-] theit8514@lemmy.world 10 points 6 months ago

I had analytics turned on (new phone and didn't check it before), and the app info only shows 76 kB have been transferred in the past 30 days. Seems pretty reasonable, but I disabled it anyways out of principal.

[-] theit8514@lemmy.world 69 points 7 months ago* (last edited 7 months ago)

I mean it was not too long ago there was a bug which could lead to an unauthenticated RCE against Bluetooth on Android.

https://nvd.nist.gov/vuln/detail/CVE-2022-20345

So yea, reducing surface area of attack when a feature is not needed is kinda important.

[-] theit8514@lemmy.world 56 points 7 months ago

The creator's clear check doesn't count towards the level being cleared, so these levels are uncleared. I think if the creator plays it on the uploader account it wouldn't count either.

[-] theit8514@lemmy.world 25 points 7 months ago

You can, sure, but you probably shouldn't. Encrypting and decrypting consume additional cpu time, and you won't gain much in terms of security.

[-] theit8514@lemmy.world 18 points 9 months ago

If only they had done this with .local ages ago. Still, it's a nice change, but I doubt my company will adopt.

[-] theit8514@lemmy.world 15 points 11 months ago

A torrent is broken into pieces, and further into blocks. The torrent file contains hashes of all the pieces that make up the full torrent. The client validates each piece that is downloaded and will re-download from another peer if an invalid piece is encountered. The spec goes in to more depth if you're interested. https://wiki.theory.org/BitTorrentSpecification

[-] theit8514@lemmy.world 18 points 1 year ago

There are 4 pinned posts at the top, should be more posts below that.

view more: next ›

theit8514

joined 1 year ago