

Surely US investors won’t harvest data and/or enshittify the product!
Surely US investors won’t harvest data and/or enshittify the product!
Should have just fired the CEO instead, would’ve saved millions and the company in one go.
Just last week, they were posting job listings for DevOps engineers. Glad the CEO’s bullshit stopped me from even considering it.
Yes, it would. Those basically create sandboxes.
did you not read your link?
Is the time on your phone correct?
I’m not sure what you mean.
The reason I’m not switching yet, is that there’s no federated auth. If they had that, I’d switch in a heartbeat.
I mean, that’s always kinda been the case. Plex uses their own infrastructure to do remote streaming, and that requires that they know your IP address, and therefore your ISP. I don’t think this really changes much in regard to cops. If that’s your concern, definitely don’t use Plex.
They “work” (sometimes), but usually get it from somewhere upstream like Intelius.
The “progress bar” is not real. It’s designed to get you to dedicate enough time to the search so that you’ll be more likely to pay up when you hit the paywall.
A work around, sometimes, is to search for their opt out forms. These do not typically have that BS, and allow you to remove the relevant listings.
I’d just use benchmarks from openbenchmarking.org and Passmark’s cpubenchmark.net if you want to determine performance.
Last time I went bouldering, I broke my tibial plateau. Never again.
Lots of great suggestions. If you want one that will make you mad, Swindled is a great one about white collar crime. Podcaster is left leaning (outwardly so) and it’s (sometimes) therapeutic to hear him talk about some of the topics.
Oh yeah, I totally forgot about that - mine does do this, and the LED is right in the bottom middle, and it’s super bright.
It probably doesn’t need to be - but it was required to set up. Before I had my shield, I allowed local connections for local streaming, but you are correct, it’s probably no longer necessary.
Ah, yeah, OpenBSD would do it. You’d basically be limited to running it in a VM which would have severe overhead. For Linux based stuff, though, it has minimal overhead.
Interesting, what OS are you running? I’ve never ran into one that it doesn’t work on so that’s surprising.
I would counter that disadvantage with this: due to testing constraints, docker containers are usually updated more quickly when there’s a 0 day, and you don’t have to patch your entire OS if one single container has one. It reduces operator overhead greatly, because that’s what it’s designed to do. Even if one of your containers has a vulnerability, because it’s a container, it won’t necessarily affect your entire system, depending on the vulnerability.
I suppose that it adds technical overhead (not sure I would call it severe though), but in my opinion the benefit of docker is how easy it is to spin up a new service, and how easy it is to update and maintain the containers.
So, I use regex to block all Roku domains on my network via pihole:
(ads|logs|cloudservices|image|images|web|prod.mobile|wwwimg|captive|customer-feedbacks|amoeba|amoeba2|sr|giga.sb|cs).roku(.admeasurement)*.com$
Then, possibly overkill due to the above, I used OpnSense firewall rules to block all traffic from my Roku tv. I think I just got fed up with seeing Roku spam in my pihole, as the above regex seems to completely “break” Roku.
After that, I set up FLauncher (following the method #2 instructions on the gitlab page) on my shield. This makes it so I only see the Roku launcher for a few seconds while the shield starts up, and then I’m dropped straight into flauncher. I chose flauncher because it’s very simple and barebones, so you might want to explore other options if you want more advanced features. I don’t really need those features since I’m usually using an app anyway.
Note that I did all of that after the tv was configured and set up, YMMV if it’s a brand new tv as it may need to call home to do the initial set up.
Roku is bad, I have one older Roku ““smart”” tv that I just block from accessing the internet entirely, and use a shield with a custom launcher instead.
It’s definitely not legal, especially if your school is funded by the public. That “free internet and power” is paid by someone, and if it’s the public, it’s kind of a dick move.
They can’t see what’s in your ssh or VPN tunnels necessarily, but they can usually see where the packets are originating from and going to. So if you’re say, accessing it from home directly to the server via VPN or SSH, if you’re not doing so using a full VPN service like Mull, they’ll be able to see the origin IP of your SSH or VPN handshakes, and thus your home IP.