When i’m 90, wheel me out to the orchard and I’ll watch the chickens. If you give me a stick i’ll wave it to scare the parrots off the apples.
When i’m 90, wheel me out to the orchard and I’ll watch the chickens. If you give me a stick i’ll wave it to scare the parrots off the apples.
I think a lot of comments have missed that ntfy.sh does not use UnifiedPush, the ntfy server is a UnifiedPush provider and the ntfy app is a UnifiedPush distributor.
Regarding encryption of the push message, from https://unifiedpush.org/developers/spec/android/ :
Push message: This is an array of bytes (ByteArray) sent by the application server to the push server. The distributor sends this message to the end user application. It MUST be the raw POST data received by the push server (or the rewrite proxy if present). The message MUST be an encrypted content that follows RFC8291. Its size is between 1 and 4096 bytes (inclusive).
Aliexpress
Could go old school and build your own:
Page 66: https://www.worldradiohistory.com/AUSTRALIA/Electronics-Australia/EA-1992-07.pdf
Page 126: https://www.worldradiohistory.com/AUSTRALIA/ETI-Australia/90s/ETI-1990-01.pdf
That rules it out for me then. I like to use XMPP+OMEMO with about 4-5 clients which I can continue a conversation with at any time. Main mobile, tablet, desktop, other desktop, and backup mobile which is usually switched off. (Even if a device has been missing for too long and run out of OMEMO keys, the keys sync up again once I send a message with it.)
You have to trust the servers with your metadata, and that the servers have their inter-server communication locked down, but at least you can choose/operate servers.
Some clients are a bit flaky with their e2e encryption defaults or from a UI perspective it is easy to send an unencrypted message (in a new chat for example) before noticing that was how it was set.
There are a few XEPs the server needs which enable things like OMEMO, efficient mobile data/battery use, offline and multiple device deliverability, file transfers, etc. Audio/video calling has various requirements as I think xmpp only facilitates the setup of the call.
XMPP lacks good clients and suffers from fragmentation of protocol standards implementation
“Protocol fragmentation” is not a valid complaint about XMPP – it’s like complaining that ActivityPub is fragmented; but that’s not a problem: you use the services (Mastodon, Lemmy, Kbin, etc) built with it which suit your needs, mostly interacting with that sector of the federation (eg, Lemmy+Kbin), but get a little interoperability with other sectors as a bonus (eg, Lemmy+Mastodon).
When human shields are used, the attacking party must take into account the risk to civilians. 191 Indiscriminate or disproportionate harm to civilians remains unlawful and the civilian population can never be targeted.
So, from this I understand that every time Israel makes an accusation of “human shields”, it’s a direct admission of guilt of war crimes in that they are knowingly targeting civilians.
Don’t do it. Alkalines are all shit now and will leak all over your electronics.
Get some decent NiMH.
🤔
Yeah, X11 forwarding is only fine on a campus wide network, maybe city-wide at most, if the wan is fast enough.
Sshfs would also be painful for operations processing a lot of data (grepping gigs of log files or even creating thumbnails of images to browse).
remote access
To be fair, X11 forwarding is a straightforward thing, bearing in mind any security/performance/administrative restrictions which may apply to your situation.
Alternatively, SSHFS can be used to mount a remote directory locally.
Should one sympathise with car-supremacists?
Reader mode exposes a much better headline:
Scientists testing deadly heat limits on humans show thresholds may be much lower than first thought
deleted by creator
Most
people1, even in this very thread, clearly don’t […]
deleted by creator
deleted by creator
The plentiful cheap wild-harvested berries Finland prides itself for.