sudneo

joined 8 months ago
[–] sudneo@lemm.ee 4 points 3 weeks ago (1 children)

But Light is like a generic incarnation of god but also knowledge, revelation etc., it's way more absolute than peace or even love. I think Light does make sense from their perspective, and in the catholic symbolism it is identified basically with all positive stuff.

You had a bunch of other references that make sense eh, I am not familiar with them, so I respect that people might have different perceptions.

[–] sudneo@lemm.ee 24 points 3 weeks ago (5 children)

I know nothing about anime, but I guess it is not that bad? Luce is straight up "light" in Italian, and Lucifer just means "the one who brings light" because it's the Angel's name, before the fall according to the fairytale. So from their POV it should all make sense.

[–] sudneo@lemm.ee 3 points 3 weeks ago

For browser, there is a webapp that can be selfhosted. See here https://github.com/logseq/logseq/blob/master/docs/docker-web-app-guide.md

I think you need chromium browsers due to the API they use, but it should work.

[–] sudneo@lemm.ee 3 points 1 month ago

Many encryption algorithms rely on the assumption that the factorizations of numbers in prime numbers has an exponential cost and not a polynomial cost (I.e. is a NP problem and not P, and we don't know if P != NP although many would bet on it). Whether there are infinite prime numbers or not is really irrelevant in the context you are mentioning, because encryption relies on factorizing finite numbers of relatively fixed sizes.

The problem is that for big numbers like n=p*q (where p and q are both prime) it's expensive to recover p and q given n.

Note that actually more modern ciphers don't rely on this (like elliptic curve crypto).

[–] sudneo@lemm.ee 0 points 1 month ago

Every point can be supported with an analogy bad enough

[–] sudneo@lemm.ee 7 points 1 month ago

Yep, my partner gave one for my birthday, it's basically plug-and-play. It can automatically harvest credentials, spoof captive portals, etc. I bet that in most places nobody would question something like this hanging on the ceiling indeed.

[–] sudneo@lemm.ee 25 points 1 month ago (2 children)

Just FYI https://shop.hak5.org/products/wifi-pineapple. There are ready-made devices that can do basically what you are describing!

[–] sudneo@lemm.ee 12 points 1 month ago

Encrypted DNS doesn't solve everything. Handshake for TLS sessions is still in clear, you can usually see the SNI, and since we are talking about Wireless, usually this data is available to anybody who is in the vicinity, not just the network owner. This already means that you can see what sites someone is visiting, more or less. TLS 1.3 can mitigate some of this (for those who implement ESNI, but you don't know that beforehand). Also TLS works until the user is not accepting invalid certificates prompts (HSTS doesn't work for everything) and there are still tons of HTTP-based redirect (check mailing newsletters and see how many first send you to an HTTP site, for example) that can be used for MiTM attacks.

A VPN moves the trust to a single provider that you can choose, which is much better than trusting every single WiFi network you can attach to and the people connected to it, I would say.

Also if you pay for the VPN (I pay Proton), it's not true that the company business is based on user data, they are based on subscriptions.

[–] sudneo@lemm.ee 2 points 2 months ago (1 children)

I can't really make an exhaustive comparison. I think k3s was a little too opinionated for my taste, with lots of rancher logic in it (paths, ingress, etc.). K0s was a little more "bare", and I had some trouble in the past with k3s with upgrading (encountered some error), while with k0s so far (about 2 years) I never had issues. k0s also has some ansible role that eases operations, I don't know if now also k3s does. Either way, they are quite similar overall so if one is working for you, rest assured you are not missing out.

[–] sudneo@lemm.ee 8 points 2 months ago (3 children)

Yeah, but you don't need anything besides the runtime with kubernetes. Podman is completely unnecessary since kubelet does the container orchestration based on Kubernetes control plane. Running podman is like running docker, unnecessary attack surface for an API that is not used by anybody (in Kubernetes).

I run k0s at home, FWIW, tried k3s too :)

[–] sudneo@lemm.ee 21 points 2 months ago (5 children)

Why would anybody use podman for k8s...containerd is the default for years.

view more: next ›