But that’s all part of the same argument. If it was -f
or -ff
that’d make sense. Duplicate parameters are usually ignored in like all other programs I can think of.
But that’s all part of the same argument. If it was -f
or -ff
that’d make sense. Duplicate parameters are usually ignored in like all other programs I can think of.
How does the mail come in tho bro? Or is your mail server just a client machine?
Do you have a “spammy” TLD?
I’m not aware of your laws, but isn’t it just self-certification? Like you tell them “I use glasses to have normal vision” and they reply “okay cool” and write corrective lenses on your license?
The source is this article.
There’s nothing in the article that says they refuse to disclose chat contents. In my own experience they often do so when receiving a proper request from governments, providing at least the last 24 hours of messages.
My comment regarding Roskomnadzor has nothing to do with encryption, but rather Telegram cooperates with them, and that’s why they stopped trying to block the platform. A little bit of reading comprehension would do you wonders.
if Telegram refuses to turn over the chat contents (which they do)
Source?
Law enforcement can’t just eavesdrop on the conversation without Telegram’s cooperation
Why do you think Roskomnadzor gave up their blockage plans in 2018? And then made their own official government channels? “It’s technically difficult for us” has never stopped Roskomnadzor before.
That guy isn’t an experienced weirdo-sysadmin if he doesn’t have ^L in his muscle memory.
A good way to increase your risk for melanoma as well.
Aha, I think I misunderstood your situation then? I assumed you’re running these routing rules on your client machine, so you’re able to access your ssh server without it going over the VPN – not that your server is running a VPN active that blocks external connections…?
But if I didn’t misunderstand, I’d mean the (assumingly static) ssh server’s IP.
If you’re looking for more improvements, I’d recommend using a non-default SSH port and to include the destination IP in the rules.
Without direct connection, PMS uses Plex Relays, which limit streams to like 320p.
There are many crawlers, and I’m confident at least a couple have tried to connect to your server (unless you have an IP firewall, or if you’ve changed Plex Media Sever’s default port, in which case significantly less likely).
I assume it’s not really about them watching content, but to avoid them exploiting any possible PMS bugs.
You are now not hosting publicly available links
That’s also the case with open trackers (without indexers), yet I’ve gotten shut down way too many times. But that made me wonder, does this project share metadata if someone else in the DHT swarm queries for an info_hash you have, or does it simply “leech”? Pretty cool project regardless.
This gets rid of any questionably legal gray area of using sites like Nyaa, etc for Torrent links
Except that now you’re asking the swarm for metadata behind a boatload of info_hashes? Unlikely anyone would care (though you’d be surprised how many DMCAs I get when just having a simple open tracker running, not even an indexet), but I don’t see it as being any less grey than using any existing sites.
I love jq, but the rest doesn’t appeal too much to me – I’ve been in the game for so long, so I already memorize most useful flows in the normal corelibs. And because I won’t always have the alternative to install different stuff, I try to not depend on lots of non-standard software. But I’m glad you like it, FOSS is awesome.
Your parents have root or what?
Google’s maps are decent and can also be downloaded to be offline…? But yeah, it seems like it’s a nice alternative, especially if you want to be free from Google’s grips.