This is kinda how I’ve come to look at it. You cannot ask questions of fact to a machine that works in probabilities.
This is kinda how I’ve come to look at it. You cannot ask questions of fact to a machine that works in probabilities.
Okay… one is closed sourced and the other open. That much I know. With those points out of the way, why is jellyfish superior?
What happened with Emby? I’ve used their service for a long time and have been very happy with their lifetime premium.
Woah, naw 130 meters is not far at all for an AR-15. Max effective range for a point target is 500 meters, meaning you can accurately hit an average sized person at that range. If you have something like a standard issued trijicon ACOG RCO, look at the BDC (Bullet Drop Compensation) lines go all the way to 800m. Interestingly enough too, the width of those lines is the width of an average person’s shoulders at that range.
Good news, they support OIDC! Haven’t tested it myself so your mileage may vary.
Check out this guide to get started with exposing your services via proxy. I started with v1 and migrated to v2. Until I dug this link out for you, I had no idea about v3; but if it’s as good as the first two I can only imagine how good it is now.
https://www.smarthomebeginner.com/traefik-v3-docker-compose-guide-2024/
Ohhh come on now, you’ve got too see the irony here. Don’t you get tired of repeatedly adding that license? No, of course not. You just like the attention, it’s okay lol I won’t tell anyone your secret ;)
You use a GPG key that you then add to the yubikey. The keys can only be written or deleted off the yubikey, you can’t read the secret once written. Then you can use the GPG key to either encrypt a file or sign it. Check out Pretty Good Privacy and the GnuPrivacy Guard software for more information on how that works.
I use my yubikey to encrypt files, sign my work in Git, as well as the usual password authenticator stuff. You can still use FIDO, U2F and OTP codes while using the GPG too.
Check out this awesome guide on how to setup an airgapped computer to generate the GPG key. https://github.com/drduh/YubiKey-Guide
I believe media hosting is only against their ToS if you try and use the proxy service. In the DNS page you would want to make sure the clouds are not orange. Fair warning though now your IP is exposed to the public.
https://www.linuxserver.io/blog/advanced-wireguard-container-routing
I think what you’re looking to do is route using IPTables. I’ve achieved a similar setup with this guide, just not using a mail server. With this setup the DNS can actually be taken care of by docker. With my phone on wireguard I can resolve by the container name on my VPS, internal server docker container, internal lan, and everything else goes out to Mullvad (direct too thanks to split tunneling). Very slick setup.
This is my current work phone. Absolutely love it, also has an LED notification light. Seriously forgot how much I missed that.
It took me a bit to find this video for anyone looking for it. The more I see interactions with Tim, really shows how wholesome of a person he is.
https://youtu.be/lMcbJlidTCA