Avatar
dog's best friend
262d5a8a8201b6e0804087a9d26929935c7ac6682875b13fe24a5314a04a6cbf
Live, Laugh, Like and Subscribe

The ear totally creeps me out tho

Nobody can prevent you from making bad design decisions. It is an open network after all 😀

Replying to Avatar Chris Messina

nostr:npub1yck44z5zqxmwpqzqs75ay6ffjdw843ng9p6mz0lzfff3fgz2djlsngujmw nostr:npub1xzmt2d95f7watzyqktl982d7jfe5ptktusv4j20csz8nxxgmhq6q30eykm Perhaps! Worth an exploration — including how such a feature could be abused or lead to broken conversation context!

The Reddit-like communities running on Lemmy and Kbin work this way.

I'm using it right now in this conversation.

Eugen is pushing Mastodon tshirts and swag so hard you'd think he's trying to pump up the brand so he can sell Mastodon gGmbH or something

had to hold the sign because it curled from the rain

Where are the articles about how Veilid is a tool for criminals and has no legitimate use? It's basically Darkweb 2.0

> After years of being inundated with new shows, some are using a pause in production to finally watch all the content they missed when it came out.

Or maybe there's nothing else to watch ?

nostr:npub1w4fn9chzxjchnf04r9qyqds2n2gnefyr3e0mvrefp4ttkaeph7gs4x0j78 What is interesting is that arXiv got more people involved in peer review than stuff published the "traditional" way

They said "you won't always have a calculator around"

I had this

Is this really necessary?

Do YOU need to be able to survive a 1.3Tbps attack for your blog or whatever?

No, probably not. But you can't fault companies for choosing them.

the customer wants to upgrade their existing mailing list solution, not pivot to a forum

would still have a better UX than anything else out there that's open source

please use stable diffusion to generate images of office workers chained to water coolers

Remember that time Nagios changed their license to add a "you can't fork this" clause?

Pepperidge Farm remembers

What methods are used to dump application memory on Linux?

You need ptrace, /proc/PID/mem, and probably /proc/PID/maps right?

nostr:npub18994crjwnldrukwym5lz3y2nae84s84v20m2rkngtjnyg549lr6qvxmd6m I now have an apparmor profile I can deploy for all my containers that closes this exploit. Nothing will be able to read it.

This should probably be documented on your github as a stopgap solution until better secrets deployment capabilities / tooling are available