

If timers on the bios aren’t an option, look for the settings to power on after power outage. If you turn it on, you can use a standard timer plug to turn the power on and off.


If timers on the bios aren’t an option, look for the settings to power on after power outage. If you turn it on, you can use a standard timer plug to turn the power on and off.


Definitely, which is why i suggested hosting the image + js on a CDN. Keeps brand awareness, and lets the CDN take the brunt of any malicious activity. with a bit of code-golfing, the data served by Anubis directly prior to POW could be a few hundred bytes, without impacting its functionality.
Yeah, no doubt, he is a piece of shit.
For what its worth, he would probably choose to self-exclude himself from the Linux community, while he desperately tries to get Hurd relevant.
I didn’t say there are no pedophiles, just that its not part of the stereotype.
I had to google that, because it sounded like a type of boat.
But sure, cat-enbys are welcome.
Catgirls, Catboys, all are welcome!


Kicking off? It started years ago.
I dont think pedophiles was ever part of the profile. Catgirls sure, but not pedophiles.


If you hold the number it can’t get recycled into distribution. Signal does fall back to MFA codes over SMS from memory (I’ve recovered the signal account for my grandma, as I own the number), so anyone who controls the number controls the account.


I’m more thinking along the lines of getting a cheap sim, signing up for signal and them letting the plan lapse and the number is released for use again. And then someone buys a new plan, but gets the recycled number. Not sure how realistic that is as a risk vector though.


Charitable explanation: by allowing people to use WhatsApp/signal etc without holding onto the sim card, it opens them up to risk that someone else gains control of the phone number, and can then take over that account.
But that doesnt really require that the number stays in the same phone, just under the same persons control. Periodic SMS code check-in would be sufficient.


I dunno that is true, nothing in the docs indicates that it is explicitly anti-CDN. And using a CDN for a static javascript resource and an image isn’t the same as running the entire site through a CDN proxy.


A HTTP get request is a few hundred bytes. The response is 28KB. Thats 280x. If a large botnet wanted to denial of service an Anubis protected site, requesting that image could be enough.
Ideally, Anubis should serve as little data as possible until the POW is completed. Caching the POW algorithm (and the image) to a CDN would also mitigate the issue.


Tempmail is no signup as well.


temp-mail.org for email, lie for the rest.
royim85224@feralrex.com <- you can even use that account if you like, password is the same as the email.


I stand corrected, thanks.


ING works fine with no permissions.



Yeah, it was how my family transitioned to digital TV. USB tuner stick + windows media center. And then MS killed it.


If you want a media box, windows used to be a really good option. Back when windows media center was a thing. Not so valuable now though.
Those are rookie numbers, mine are definitely yellowing and cracking :(