

A dystopia that Elon Musk wants to import from China where one company controls everything you do via an app on your phone.


A dystopia that Elon Musk wants to import from China where one company controls everything you do via an app on your phone.


You can use OpenEBS to provision and manage LVM volumes. Host path requires you to manually manage the host paths.


It is impossible. CPV is only going to allow the attacker to know that the device is probably not located next to the VPN server. It can only prove a positive, not a negative.
The second method you’re describing is only possible for people who control internet infrastructure and are able to infer correlations data going into your VPN server with data going out of your VPN server, which is both easier and more difficult than you’re suggesting. The attacker does not need to most of the internet routers because they only care about the data going into and out of the VPN server (it’s onion routing where the attacker needs to control many routers), but the attacker does need to have a powerful enough device to be inferring (hopefully) encrypted network flows on the public network to the packet sizes of encrypted VPN traffic for all of the traffic that is passing through that VPN server at the same time.


The latency to your VPN server is a constant added to the latency between your VPN server and whatever servers you are connected to. As long as the user’s VPN service doesn’t use different VPN servers for different destinations, it is impossible to determine the location of the user behind the VPN based on latency, and in general it is impossible to determine how far a user is from their VPN server because of varying latency introduced by the user’s own network or by bad infrastructure at the local ISP level. You can only know how far they aren’t based on the speed of light across the surface of the earth.
But, without a VPN, this is a real attack that was proven by a high school student using some quirks of Discord CDNs. Even without using Discord’s CDNs, if somebody wanted to locate web visitors using this technique, they could just rent CDN resources like nearly every big company is doing. Of course, if you have the opportunity to pull this off, you normally have the user’s IP address and don’t care about inferring the location by latency. The reason why it was notable with Discord was because the attacker was not able to obtain the victim’s IP address.
That sounds like build automation. You can use some Git forge software.


America is already working on solving that permafrost problem.


If wars kept presidents in office, presidents would only leave office voluntarily or through old age. The US is always at war.


It’s the natural progression of subreddit simulator. Somebody heard about dead internet theory and had to make it a reality.


Unfortunately, if you use either of these methods to install Windows 11, you will wind up with Windows 11. You will eventually regret it.


It’s so user friendly. It tells you exactly what to do to solve the problem. Switch to a tty (if that even works on your system) and log in, type this long command from memory, making sure not to mistake those 0s for Os or the Unicode left single quote for back tick, restart your lockscreen, which of course you know how to do, and then come back. If that doesn’t work, start terminating some processes and praying.
It says you can return using “ctrl+alt+F[N] where N is the tty number in the top left corner.” I can’t find my F0 key.


It’s not even good. It’s just scripts for some starter Arch rice, not a serious distro.


Some Unity games may be launched with a parameter that causes them to execute arbitrary code. It seems like it only makes sense on Android. Windows and Linux games can normally only be launched by a process with the same or greater privileges than the process being created, but on Android you can elevate privileges by invoking another app. In practical terms, another app can access the save data of your mobile games.
There was also something about games that register to be launchable directly from a webpage, which would allow web sites to escape the browser sandbox, but it didn’t sound likely.


Japanese people are being fed the same kind of propaganda as UK citizens and Americans. People say ridiculous things like “What if the number of foreigners increases to 20% of the total population? Then women will be sexually assaulted.” Instead of immigrant gangs taking over apartment buildings and eating the pets it’s foreigners buying up all the land to build compounds for foreigners to live in and pooping in the streets.
But there is also a feedback loop where nationalists in Japan make the news, and it’s repeated by right wing foreigners who don’t know Japan but admired their idealized, racially pure Japan where everyone is polite and orderly and this would never happen, and then that gets repeated to Japanese people as if it were large numbers of foreigners warning them not to let immigration ruin Japan as it has ruined those other countries. Most of the Japanese people in this loop don’t understand English, and the right wing foreigners don’t understand Japanese. The reality isn’t always faithfully translated in either direction, and the language barrier makes it harder for people to realize the discrepancy.


Some attackers check services that have already cataloged the services you are running, even on uncommon ports. You won’t hear from them unless you are running a potentially vulnerable service.


Isn’t this Putin’s Ukraine story?


If he had declared war on the world, which wouldn’t be so out of character for him after being insulted by an escalator, you wouldn’t need to go to wsws to read about it.


If you’re self hosting Headscale you can configure your network such that Headscale is reachable on your network with or without internet access and available from the internet.


If it were in reference to a particular issue, would that make Banksy a “terrorist?” Maybe it’s better to feign uncertainty at the BBC.


Nearly $1,000? ChatGPT can’t even give correct instructions for building a computer capable of hosting itself.
The article suggests the opposite: population decline in rural areas allows the bears to spread out and get closer to populated areas.