NFS for storage, tailscale / wireguard for access control?
NFS for storage, tailscale / wireguard for access control?
This is hilarious and I would donate to help make it happen
Hello yes my email is dot at dotat dot at
I’m predicting we’ll see even crazier numbers once the work week is over
Phone picture album roll? Photo reel? Downloads folder! But on a phone. Apple hates calling things folders idk lol
Excellent! Thank you :)
This sounds incredible and I absolutely will find these people. Cooking my porkchops to a lower temperature and letting them rest before eating has changed my life.
My friend, you have no idea how much time I have spent searching for something like this on google. This is incredibly useful. I have saved this to my camera roll.
Naturally searching anything with “chicken” and “cook” present returns hundreds of recipe websites or food safety “articles” that all copy and paste “the fda says 165” with no further thought.
I knew a chart like this must exist, but had given up the search. Sincerely, thank you.
Other comments here do a great job pointing to DH key exchange; I’d like to try explaining it with the paint analogy.
You and Youtube need to agree on a “color of paint” (encryption key) without ever sending it over the network.
You and Youtube agree on a common “yellow” in the clear, and you each pick a secret color. Youtube mixes yellow and their secret and sends it to you. This is okay, because un-mixing paint (factoring large prime numbers) is really hard. You add your secret to the mixture, and now you have yellow+Youtube’s secret+your secret.
You mix yellow and your secret and send it to youtube. Youtube adds their secret; now they’ve got yellow+Youtube’s secret+your secret. You both have the final color!
An eavesdropper can’t reconstruct this - everything sent over the network had yellow mixed in, and un-mixing paint can be really hard. Maybe you can guess that green minus yellow is probably blue, but you can’t get close enough to decrypt anything. And what if it’s brown? Is that blue + orange, or is it red + green?
Cryptographers have worked very hard to make the communications secure. I would be more worried about the other end ratting you out - using a relay / proxy / vpn that you trust is a good idea :)
Are you telling me that pop tarts are not in fact ravioli?
Adding - triple check / proofread / rephrase the ai output. Assume the words may be used against you. If your manager is close with whomever reads the feedback, they could ask for “evidence” of any claims. You either need strong evidence, or to avoid any concrete claims. More vague more better / more defensible.
When dealing with children, the “oreo cookie” method works well - start with something nice, offer a “suggestion for improvement”, and then finish with something nice as well.
You’ll want to submit the politically correct version through official channels for traceability. After it’s submitted there, you can give a copy over slack. Don’t let anyone make any claims about what you supposedly said over slack dm. Leave a paper trail.
You’ve already been PIPed, so they have reason to look at you. Play nice and check the boxes; I would do the feedback even if the submission is entirely “yeah it was fine” level bs.
All of the above is playing it safe. Offer to provide additional feedback / “discussion” over a voice call as well, and ask what they’re looking for. If they’re building a case against your former manager, you can be honest.
If they just want “general” feedback, or they want it over text (“no time for a call”), or there are multiple people in the room, or the call is being recorded, then fall back to the politically correct version you already submitted.
Your nuclear button is to claim the PIP was retaliation for (something; you can make this up, just make it realistic), but you don’t press that button unless you’re about to be fired. It makes things extremely complicated.
I really hate office politics, but half of being promoted is knowing how to play this stupid game :(
I don’t do anything interesting. I’ve got the ten workspaces, and win+p to start stuff.
The only interesting thing is win+PrintScrn, which takes a screenshot to /tmp, and then opens it in pinta to crop.
Actually I also have win+z bound to turning off the laptop screen. That’s all I can remember
Removing caulk sucks.
The best tool for the job is a razor blade / utility knife, and a pack of replacement blades. Blades are dirt cheap, don’t be afraid to bend them / abuse them.
The game of Mao begins now.
Even more unusual variants include […] a game which, instead of allowing voting on rules, splits into two sub-games, one with the rule, and one without it.
This sounds insane and delightful
I gave their protocol page a look; it’s extremely in-depth. I have no idea what a vector clock is but now I get to learn. I like how they explain why blockchain isn’t a good fit.
I’m a touch worried about the extensability of the protocol, but I haven’t given it a deep read yet. I very much appreciate the share!
At EoL, corporate security tells the IT department to uninstall it.
Windows works great because MS tapes it back together slightly faster than it falls apart.
When EoL hits, those devices are either trashed, firewalled into oblivion, or assimilated into the kube.
Wanna come configure optimus for me?
Indeed, and good points. How many users do you have? I assume this isn’t just for you, and setting up multiple nfs shares with tailscale access policies isn’t feasible. SMB might be the best play. I’ll have to refresh my memory on file sharing protocols