Honestly, it would probably be easier to just build a *arr program specifically for downloading YouTube videos directly. Tie it into the rest of the *arr suite, with naming conventions for Plex/Jellyfin.
Honestly, it would probably be easier to just build a *arr program specifically for downloading YouTube videos directly. Tie it into the rest of the *arr suite, with naming conventions for Plex/Jellyfin.
Mozilla doesn’t have a VPN. It’s literally Mullvad servers, with Mozilla’s branding on top. Mozilla doesn’t deal with any of the actual server stuff; It’s all handled by Mullvad.
FWIW, it’s a nice little drop shipping side hustle for Mozilla. They get to skim off the top of every Mozilla VPN sale, while doing none of the actual server maintenance and having no ongoing costs (hosting, electricity, etc) related to the VPN servers. But to be clear, you can get the exact same service (for a little cheaper because Mozilla isn’t skimming off the top) directly from Mullvad.
Paying for a VPN through Mozilla is like paying for a Spotify subscription through Apple’s App Store; You get the exact same service as if you had gone straight to Spotify’s site, but with an added convenience fee tacked on by Apple.
This looks like it was a timing analysis attack. Basically, they’re trying to figure out which user did something specific. They match the timing of the event with the traffic from the user, and now they know which user did the thing.
It can be fuzzed by streaming something at the same time, because now your traffic is way harder to time analyze when you have a semi-constant stream of data running. But streaming something over Tor is an exercise in patience, (and it’s not something the typical user will just always have running in the background) so timing analysis attacks are gaining popularity.
Sure, but it’s worth asking why the management is so poor. Many people have theorized that it’s because Google is pulling the strings; It would be in Google’s best interest to keep Firefox around on life support, because it helps them avoid antitrust lawsuits if they can point to Firefox and go “nope not every browser is Chromium based!” But it’s also in Google’s best interest to whittle Firefox’s usage down to near zero, which is what every single recent Mozilla decision has been aiming to do.
Mozilla was getting paid a lot of money by Google before Google got their hand slapped in an antitrust lawsuit. Many people have theorized that since that lawsuit, Google has pivoted to making deals directly with Mozilla’s management instead.
They also recently added built-in AI chat support, which just gives you contextual “summarize this text” type of stuff on your right click menu. But still, it just goes to show that Mozilla is really leaning into AI.
That’s more on the OS than the text protocol. The protocol doesn’t just hold a text in the ether until it’s time for delivery. A scheduled text is you telling the phone “hey, wait to send this message until it’s time.” Then your phone sends it at the proper time.
iOS still doesn’t have built in text scheduling. There are workarounds, (like using the Shortcuts app to build a “send this text” automation that runs at a specific time), but that’s not the same thing as native support.
It’s more about the lack of iMessage features. Things like editing, unsend, text effects, etc are absent in regular texts. If everyone is on iMessage, everyone can use those enhanced features. They’re apparently pretty popular in group chats, but even a single android user will drag the entire conversation into regular text messages instead. So lots of iPhone users (especially the younger gen Z and alpha) started complaining whenever someone had an android, or even outright bullying them for it.
And for android users, texting with an iPhone user is a horrible experience; Images are horribly compressed, videos are severely limited in file size and compressed, group texts need to be opened as an attachment to be read, etc… All because iOS refused to use the more modern RCS texting protocols.
If you already have a NAS, (since SMB was mentioned, I’m assuming there’s some sort of NAS setup going) then you may even be able to host Plex directly on the NAS. It likely won’t be powerful enough for things like video transcoding, but just audio should be fine.
There is also the hilariously misguided belief that good coders do not produce bugs so there’s no need for debugging.
Yeah, fuck this specifically. I’d rather have a good troubleshooter. I work in live events; I don’t care if an audio technician can run a concert and have it sounding wonderful under ideal conditions. I care if they can salvage a concert after the entire fucking rig stops working 5 minutes before the show starts. I judge techs almost solely on their ability to troubleshoot.
Anyone can run a system that is already built, but a truly good technician can identify where a problem is and work to fix it. I’ve seen too many “good” technicians freeze up and panic at the first sign of trouble, which really just tells me they’re not as good as they say. When you have a show starting in 10 minutes and you have no audio, you can’t waste time with panic.
Yeah, and you can dupe items in RuneScape by dropping them and pressing Alt+F4. Don’t worry, I’ll stand way over here to prove I’m not trying to steal it. If I try to pick up the item you’ll see me move, and you can just pick it up first.
The DLC launches next month, so it has seen a surge of renewed interest. And once the DLC lands, it’ll likely get a surge of new players from being on the store page again.
Which is a very easily recognized pattern, color, and size. The entire point of a dollar is that every single one looks identical.
Imagine if every single dollar bill was a different color, shape, size, printing pattern, etc… Now imagine trying to block that. Now consider that as soon as you figure out how to block all of the current versions, anyone in the world can just design a new version in 5 minutes.
Yup. Pretty much anyone who knew anything about copyright law agreed that they were making a monumentally stupid move. And their only defense basically boiled down to “bUT wE’rE a LiBRarY.” Which completely ignores the fact that even libraries need to comply with copyright laws for ebooks, via licensing agreements with the publishers.
At least on iOS, it takes it a step farther and tells you specifically when an app is accessing your location, microphone, camera, etc… It even delineates when it’s in the foreground or background. For instance, if I check my weather app, I get this symbol in the upper corner:
The circled arrow means it is actively accessing my location. And if I close the app, it gives me this instead:
The uncircled arrow means my location was accessed in the foreground recently. And if it happens entirely in the background, (like maybe Google has accessed my location to check travel time for an upcoming calendar event,) then the arrow will be an outline instead of being filled in.
The same basic rules apply for camera and mic access. If it accesses my mic, I get an orange dot. If it accesses my camera, I get a green dot.
The rich engineers weren’t the demographic affected by the “rolling” brownouts. The people in McMansions had power the entire time, while the people in apartments were shitting in grocery bags because their toilets had frozen solid from lack of power for heating.
The “rolling” brownouts were really just rolling around the same poor areas.
I have had major issues with exFAT across a variety of platforms. But I also work with a bunch of niche gear. But my point is simply that being widely compatible isn’t the same as being fully compatible. And OP was asking for the best way to reach the widest compatibility. That calls for FAT32, even if it has issues with things like file size.
This was my immediate thought as well. Portable launchers for the various OS’es on a tiny (just large enough to store the launchers) FAT32 partition, then a large FAT32 partition (the majority of the drive) encrypted by VeraCrypt. As long as it can read FAT32 and run VeraCrypt, it’ll be compatible. And that covers Windows, Linux, Raspberry Pi, and Mac ecosystems. It’s not as simple as just plugging it in and getting a password prompt, but it’s going to be the most compatible while still allowing for (nearly) the entire drive to be encrypted.
Even worse, many of those scammy companies use the Do Not Call list as a list of known active numbers. Since the DNC is an opt-in thing, the call centers know that people have proactively added their numbers to the list.
Yeah, voice notes are the “your solution to your problem is somewhere in the middle of this 20 minute long YouTube video that could have been a short forum post with some screenshots instead” of the communication world.
Reminder to avoid using Amazon boxes for this: Their boxes contain a rodenticide to keep rats/mice away from their products.