

Really you should have it direct to a clone of the site, but with fake accounts pushing whatever agenda you want.
Really you should have it direct to a clone of the site, but with fake accounts pushing whatever agenda you want.
Yeah, that would be my recommendation too. Anything else will produce a worse experience (laggy and slow) and more complexity to get setup/maintain.
I mean, this has always been true, the drones only close the gap by miles. The big issue with the drone attack was Ukraine ability to sneak explosives deep into Russian territory. The delivery mechanism of drones may make it more accurate, but it could have been rockets/mortars and the effect would have been the same.
Yeah, I was going to say that TV wasn’t much of a news source to begin with. The real issue is that social media for news is probably worse - now everyone can be spoonfed the news they want.
Some of the commands I use a lot for debugging containers, in case you go down that route:
docker run --rm -it --entrypoint bash <image_name>
docker exec -it <container_name>
Once you know how to use docker/containerization it’ll be the only way you want to deploy applications. Most popular applications will also have good guides on how to setup/config the container, but sometimes you’ll need to read up on docker and Linux to figure things out.
Thanks for sharing your perspective. It sounds like it’s the potential for harm/damage rather than the act itself that makes it an issue for you?
Thanks for sharing your perspective. It sounds like your main issue is the potential damage that could be caused and not the act itself?
I tend to lean more towards the problem being distribution rather than creation, so I’m curious about your opinion on this: Is there a difference between me imaging a sexual act with someone without their consent vs writing/drawing/deepfaking it?
Pretty much anything handling unstructed data (audio, video, text) is using training data that has copyrighted content.
Star trek touches on it a bit. Some people definitely still cook in the shows, but it’s almost seen as a thing for special occasions.
For me, it’s worked out for plex. What it offered at the time was more than worth the price and I’ve felt a little bad about it being a once and done payment.
That being said they’ve hurt some of the good will with the changes they’ve made, but also I imagine they’re struggling to find a sustainable path for development.
I always wonder how many of these are actually just patches behind the scene to fix viral trends. Or even more devious, they use the viral trends to patch a specific failure point to make it feel like progress is being made.
I think the easiest way would be to have two vlans on your local network. One that is connected to the internet and another that is local only. I think you’d have to switch networks when wanting to access the jellyfin server in that instance, but would negate the main issue, which is your VPN.
Edit: that’s about the most secure you can get I think. If you bought a different physical router to host it, you’d have about as secure a setup as possible.
Definitely, and that’s why hard/strict laws or rules can be dangerous. Much like the famous “I know it when I see it” judgment on obscenity.
The biggest issue with this line of thinking is, how do you prove it’s CP without a victim. I suppose at a certain threshold it becomes obvious, but that can be a very blurry line (there was a famous case where a porn star had to be flown to a court case to prove the video wasn’t CP, but can’t find the link right now).
So your left with a crime that was committed with no victim and no proof, which can be really easy to abuse.
Edit: This is the case I was thinking of - https://nypost.com/2010/04/24/a-trial-star-is-porn/
Oh yeah, definitely.
Refactoring a code base is kinda like general maintenance for the application. Over time deprecated features, temp fixes, etc. start to be a lot of the code base. By cleaning things up you can make it more maintainable, efficient, etc.
That being said, for systems this large you usually fix up parts of it and iterate over time. Trying to do the whole code base is hard cause it’s like replacing the engine while the car is in motion.
Make a fake account and just post random things so the government doesn’t think your lame when they check your social media.
Yep, bind mount the data and config directories and back those up. You can test a backup by spinning up a new container with the data/config directories.
This is both easy and generally the recommended thing I’ve seen for many services.
The only thing that could cause issues is breaking changes caused by the docker images themselves, but that’s an issue regardless of backup strategy.