Just your normal everyday casual software dev. Nothing to see here.

  • 0 Posts
  • 25 Comments
Joined 2 years ago
cake
Cake day: August 15th, 2023

help-circle

  • Pika@sh.itjust.workstoSelfhosted@lemmy.worldIt's hard sometimes
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    2 days ago

    the amount of software I’ve used that lacks this type of system is aggravating. How hard is it to keep an object of property names, and if the name isn’t in it then it errors.

    this can be continued into command line as well. if flag -z doesn’t exist, you shouldn’t allow me to run a command with it. It’s clear I am trying to do something (incorrectly) thinking -z is something it isn’t, just error it and tell me that.


  • Because it’s universal, it works, it’s multi-platform, device agnostic and it’s simple to use user side.

    Nothing else available really fits that criteria.

    The closest in todays age is probally discord or teams, but neither of which are decentralized. XMPP could work for it, but nobody really uses it anymore and to be honest the standard is ugly as hell to implement.

    Browser Notifications are ineffective and have a high probability of failing or not being seen, they are more meant for real-time notices not historical notices not to mention locked to that browser.

    App notifications would be amazing for things with apps, but not everyone wants to be forced into using their mobile device for everything, and it would again only be available from said app(unless you do use something like NTFY), which would generally be locked down to a device

    Email sucks admin side, but there’s a reason its used.

    This is also ignoring the multi-use case that email allows for such as authentication as well, so if its already being stored for accounts, might as well use it for notifications



  • huh, I learned a few new words today

    for others who want to know

    • Jingoism: noun

      1. Extreme Nationalism characterized by a belligerent foreign policy

      2. A bellicose patriotism; aggressive chauvinism; belligerence in international relations

    • Bellicose: adjective

      1. warlike or hostile in manner or temperment

      2. inclined to war or contention

      3. warlike in nature/aggressive;hostile

    • Chauvinism: noun

      1. Militant devotion to and glorification of one’s country; fanatical patriotism.

      2. Prejudiced belief in the superiority of one’s own gender, group, or kind.

      3. Blind and absurd devotion to a fallen leader or an obsolete cause; hence, absurdly vainglorious or exaggerated patriotism.


  • my only complaint about it is the lack of clear “hey this is going to be a major update” on the webUI. I did the update command and was met with a different UI. Which wasn’t difficult to figure out, and I have to blame myself for not actually checking the patch notes first, but I wasn’t expecting a major update from the webUI as it only said “new version available run this command to upgrade”

    the upgrade as a whole is all and all a great improvement





  • I’ve recently setup an recipe archival project using tandoor, I’m working on converting all my grandparents fading old as dust cooking recipes from their misc handwritten cursive notecards to digital.

    Setup was uneventful but it took a little research to figure out how to use a remote postgres server, turns out the app doesn’t give an error when it can’t connect to the server, it just fails to run

    Have to say the actual program itself is absolutely absurd and how they choose their permissions, it breaks all conventional and took quite a bit to get used to.






  • You are correct, my concern with it isn’t retrieving the data however, its the possibility that if the person involved had the means to, they could have a table of check-sums of files of interest. This system could be used to confirm or deny a file of interest is present on the device.

    For the everyday person this is a non-issue, but from a privacy POV you should not be able to get any information in regards to what a file is.

    Rainbow tables for password cracking works off a similar system, they take a bunch of commonly used passwords, hash them and compare them to leaked databases. If the hash matches an account you have the password. Most password handlers get around this by salting it, and hashing it repeatedly X amount of times, but I doubt that apple would do that for a checksum(and regardless they would know X and how it was made).

    Again though I acknowledge that it’s a paranoia level concern, but I still am firm that a true encryption solution should not be able to get any type of info out of it that may help the third party.



  • Pika@sh.itjust.workstoSelfhosted@lemmy.worldHow do you keep up?
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    15 days ago

    Strangely it sounds like that’s correct. I was under the understanding that depends_on cared about it past start as well but it does not. It doesn’t look like there’s a native way of turning containers that are depending on one another when you turn the dependency off. It looks like the current recommended way of doing it is either with a Docker compose file (which doesn’t help if the process crashed/was concidered unhealthy), or having a third party script on the host monitor the dependencies and if one is considered offline, it turns the dependees off.

    Looking into it the concern has been approached twice now on the GitHub page, however every time that it’s been brought up it’s been closed for stale because nobody ever replies to the question


  • It’s important to note here that even if you turn on this option, Apple does not support full end-to-end encryption, there are still multiple factors that they keep under standard data protection which means they still have the encryption keys. They keep this under the guise of deduplication so they can save on storage costs but some examples of this are:

    • the apps+file formats you have installed
    • your phone’s make model and serial number
    • most metadata that defines what an item represents such as date time modification time
    • all file checksums (this is scary imo)

    They explain how everything with their encryption works here



  • Pika@sh.itjust.workstoSelfhosted@lemmy.worldHow do you keep up?
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    15 days ago

    I’ve never heard of komodo, I’ve heard a lot about Watchtower but I found it more annoying to set up due to its labeling systems. Is there any added benefit for Komodo over using a standard watch tower setup?

    I haven’t set up either of them, but my main concern is having a breaking change be automatically updated