plm00

joined 8 months ago
[–] plm00@lemmy.ml 6 points 2 weeks ago (1 children)

The campaign is more or less the tutorial. Otherwise, you set your own goals. Like unlocking new building materials, buying a new ship, stuff like that. It's a sandbox. A very good one at that.

[–] plm00@lemmy.ml 60 points 1 month ago* (last edited 1 month ago) (11 children)

This is my own conjecture, but I'm willing to bet that playing nicely with Pres. Trump somehow saves Apple billions more in lost revenue to tariffs and legislation because Trump rewards those who are on his good side. I'm also willing to bet Tim / Apple is pressured to do this and has a very different attitude behind closed doors. Not that this excuses anybody for their actions, but it's clear they're trying to game the system the best they can in the name of "business".

[–] plm00@lemmy.ml 23 points 2 months ago

This. There's a huge different between AI's shallow transliteration and an actual translation that respects the culture and context.

[–] plm00@lemmy.ml 15 points 4 months ago (1 children)

No, you'll be fine. And some distros trivialize it. In my case I don't get as good of framerates as I would on Windows, so there are some issues due to Nvidia not providing open source drivers, but it still works with Linux.

[–] plm00@lemmy.ml 2 points 8 months ago

What I was referring to is called a Bind Mount, where host directories are exposed to the docker container. You may be fine if it's an external hard drive. I use bind mounts because they're easier to back up, but I acknowledge they are less safe.

You may be perfectly fine as you are now. My (and others) suggestions are for added security. As it stands, if there's no target on your bind, the only bad traffic you'll get are from bots trying to pick away at your domain and sub domains. Generally they're not a problem. But being extra safe costs nothing but time.

[–] plm00@lemmy.ml 18 points 8 months ago (2 children)

"Secure" and "exposed" are antonyms in this scenario, that's the nature of the beast. I use Nginx which I have a domain pointing to. Worst case scenario, a hacker brute forces access to my container and mucks around within the confines. As I understand from a WireGuard VPN, there's an added level of security. You have to use the VPN to get access to your home ports, and then you can access your Docker containers as configured. There's an added layer of security.

Some things to consider:

  • Do you have a target on your back?
  • Does your container contain sensitive data?
  • If so, does your container have access to external directories?
  • Does your project have security options like Geo Blocking, rate limiting, etc?

I've been running some local servers for a few years only behind Nginx. So far nothing bad has happened. But that doesn't mean something bad couldn't happen later.

[–] plm00@lemmy.ml 46 points 8 months ago

surprised pikachu face

[–] plm00@lemmy.ml 22 points 8 months ago (6 children)

I'm intrigued. And although I read the article, I'm not entirely sure who or what this is for. It's cool, but... what?