breakdown
don't do me like that
think of me what you will
i've got a little space to fill
don't you baby? π€π»π

i won't back down

#nostr is family π€π»
#plebchain #babechain π«π
gn loves π
rip xitter
i said, you don't have to live like a refugee
everyone who owns an iphone 15 should take a moment and remember #matthewperry #rip ππ
my sphynx cat doesn't look at me any different when i'm naked π
#nostrafterdark
love Rhys Darby π
this absolutely needed to happen π
#rhysdarby #japan

#accrescent fixes update bug but users need to manually update to v0-15-2
#foss #opensource #cybersecgirl
https://github.com/accrescent/accrescent/releases/tag/0.15.2
Our authoritative DNS nameservers now support DNS-over-TLS (DoT) with authentication via DANE TLSA and/or WebPKI. This allows DNS resolvers to make queries via securely encrypted connections. We're already seeing lots of DoT encrypted connections from multiple DNS providers.
Using DNS-over-TLS for authoritative DNS is bleeding edge and not widely supported yet. Cloudflare and most ISPs don't support this yet. Vast majority of the DNS-over-TLS connections are coming from Google Public DNS. There are only a small number of connections from elsewhere.
We're currently implementing this with an nginx TLS to TCP reverse proxy in front of PowerDNS.
https://github.com/GrapheneOS/infrastructure/commit/38bb002a019a0947c1b2c1bd0e7f5b602ae85f5c
https://github.com/GrapheneOS/ns1.grapheneos.org/commit/387f1027f8904fc148217a697fdad66d089c6cfc
This is a very forward-looking improvement. Google is the only major provider using it and only for opportunistic encryption right now.
awesome forward-thinking privacy improvements happening with #grapheneos π€π»π

