To be fair it’s “made simple” not “made easy”
I haven’t used archivebox, but I tried setting it up. And I will say linkwarden gets a lot of points for easy setup and use. I’m sure it’s probably not as powerful as archive box but it gets the job done for basic use.
Might be 80% of the population of the US.
How is this the real world experience?
Yes I know this, the reason that I asked this question is because it is a departure from the rules laid out here. Oftentimes we say “the mirror” even though we are not referring to any specific mirror.
Checkout goaccess. No additional tracking needed, it just reads your server logs. https://goaccess.io/
What do people use pastebin for anyway? I’ve never felt the need to use it or something like it.
It makes a nice event page where you invite everyone by phone number. It then texts everyone with the details and asks for RSVPs. It then automatically follows up with everyone to get RSVPs and sends out automatic reminders to all the guests a week before and a day before etc.
Any way to opt out?
Great YouTube channel thanks for sharing!
If you must expose to the net (which you may do with the games servers) then again, the config guide has you covered, use crowdsec, use https, use random ports, use strong passwords and mfa.
When you say the config guide has you covered. Where is this config guide?
I feel like this video is preaching to the choir. No one who is not already concerned about their digital privacy will care about this video, and if they watch it I doubt it would change their minds.
I’m pretty sure that if you had not already been signed in, you would not have been able to use it. As the login page requires an internet connection.
What do you use for scanning for paperless?
There is a remote vector as well beyond just physical access.
There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.
Advocating for using some of the biggest privacy violators to log in to all your accounts! Business relationship or not this is not good advice for your privacy.
What about contracting a terminal illness like cancer where you might not be able to work. You need a job to keep your healthcare but if an illness or disability that you have or get at some point stops you from working and you need to pay for that healthcare, what do you do?