I blow hot air.

  • 1 Post
  • 28 Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle

  • Compared to dumping white phosphorus over hospitals and refugee camps, killing 2 (?) children during an attack that targeted hundreds/thousands is many orders of magnitude more precise. I hate dead innocents as much as anyone, but you gotta admit the pagers were effective and included way less collateral damage than the methods Isreal has employed in recent history.

    The point of the post isn’t to praise the pagers attack. It’s to point out that Isreal is capable of causing less collateral damage in Gaza but chooses not to.











  • Vent@lemm.eetoMemes@lemmy.mlHey girl
    link
    fedilink
    arrow-up
    40
    arrow-down
    2
    ·
    edit-2
    6 months ago

    The people in the meme are at about Seattle and NYC, which is a little over 3k miles apart (by car). You’d need to be going 250mph for the entire 12 hours to make that distance. A quick google search says that the maximum operating speed of a bullet train is 200mph, but tests have been conducted at 275mph.

    So, you’d need to go non-stop at 125% max speed to make the trip in 12 hours. Even if you went at 275mph, realistically you’d make a lot of stops along the way, which is going to make the average speed a lot lower. Trains are great, but the US is really big.

    Bonus fact: a non-stop flight from Seattle to NYC takes about 5.5 hours.




  • If you’re worried about unauthorized access to the physical machine, you could always just do disk-level encryption instead or store the app’s data in something like a Veracrypt virtual disk. They’d still be able to access the data if they go through your OS/user, but wouldn’t pick anything up by accessing the drive directly.

    Nothing short of E2EE can truly stop someone from accessing your data if they have physical access to the server, but disk encryption would require a targeted attack to break, and no host is wasting their time targeting your meme server. I seriously doubt they’d access it even if you had no encryption at all, since if they get caught doing that they’d get in a heap of legal trouble and lose a ton of business.






  • Podman is purposefully built to rely on systemd for running containers at startup. It ties in with the daemonless and rootless conventions. It’s also nice because systemd is already highly integrated with the rest of the OS, so doing things like making a container start up after a drive is mounted is trivial.

    Podman has a command to generate systemd files for your containers, which you can then use immediately or make some minor tweaks to your liking.

    I use podman for my homelab and enjoy it. I like the extra security and that it relies on standard linux systems like systemd and user permissions. It forces me to learn more about linux and things that apply to more than just podman. You can avoid a lot of trouble by running the containers as root and using network=host, but that takes away security and the fun of learning.