• 0 Posts
  • 47 Comments
Joined 1 year ago
cake
Cake day: January 13th, 2025

help-circle

  • This is why I never used their images for any of my projects and do everything I can to use official charts made by the software vendor itself or create my own and put them in my personal git repo for automated deployments.

    Any business that gives away middleware for free, likely does that in the hopes of monetizing that pretty directly and eventually will be pressured to increase monetization of those things by those investors or will be forced to stop developing those products due to lack of funding. Middleware really doesn’t have many other good ways to monetize.



  • Right, but taxing a CPU, PC Bus, and PC memory takes more electricity than doing the same amount of “work” on a GPU with longer, more specialized pathways, allowing more work on a single cycle, but less flexibility on the type of work. So if it takes 1hr fully taxing a CPU, PC bus, etc, vs 1 hour fully taxing a GPU and its integrated memory and bus, the one using the GPU is going to take more electricity. Also, you can chain GPUs which can’t be done the same with CPUs since GPUs all have their own discrete bus and memory on a single card. Problem became that GPU production couldn’t keep up with demand so they became more expensive for the hardware, but overall, the cost of electricity vs value of the blocks combined with producing fewer blocks on a CPU once the chains reach a similar complexity as a competing cryptocurrency, means that overall you’re more likely to make more profit from GPU based mining than CPU based mining.

    It’s a complex calculation to figure out and many people mine without realizing the money they’re spending on electricity, home cooling, and parts wear is more than they’re making on the crypyo.


  • Even if the algorithm will perform better on CPUs than other crypto algorithms, there’s still the fact that the processor in a GPU is much less complex and so: many more tasks can run in parallel because they’re all very similar, the bus is much shorter, bandwidth to memory is much higher, and memory is generally much higher performing. So overall, mining on a GPU will generally be more energy efficient than on a CPU. And of course crypto becomes harder and harder to mine as they grow, by design.


  • Not sure that’s true. And mining on a CPU is even less efficient. Your hash rate will be way lower unless you’ve got a really high-end system with a really low latency bus and RAM. And if your hashrate is too low, it would take months for you to find a single block unless you’re pooling with a bunch of others and splitting the profit. It’s quite variable, but very, very few people can make profit on any popular coins. Too many people to compete with to find a block.

    Oh and don’t forget cooling cost. The fans in the computer, the fans in your house, and your air conditioner in your house need to disipate the heat and there’s a lot more generated per clock cycle from a CPU than a GPU using comperably old technologies. If you live somewhere that you’re producing more electricity with solar than you consume, then it’s probably not a cold climate.



  • That makes them think you aren’t available, but if you have any kind of voicemail it means they know it’s a real number so autodialers will probably still try later. I think this request is how can we fool the spammers (automated or otherwise) to think the number is totally invalid so they stop calling it.

    That is difficult since there’s probably some indication from the phone company other than just a voice message that indicates a number is invalid/unallocated.

    That said, muting is the way I do it, but now most autodialer systems are configured to call twice in a row to get around the Do No Disturb settings on most cell phones, so it is more annoying now.


  • irotsoma@lemmy.blahaj.zonetoPrivacy@lemmy.mlDNS4EU For Public
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    7 months ago

    You still have an upstream DNS server that you rely on to provide updates to your unbound server. Problem is that corporate or extremist government controlled DNS servers can track all of your requests as well as censor any domains they don’t approve of. And if DNS servers or their users don’t use secure protocols, then those requests additionally are tracked by ISPs or any other systems the requests travel through as well as them having the ability to block individual requests they don’t want fulfilled like the Great Firewall does or most corporate internal systems sometimes do to prevent employees from accessing social media or other sites they deem not work related.



  • Problem with Manjaro is they have their own opinionated repository that is not always in sync with Arch because they try to introduce more “stability”. I found this actually caused the opposite in most cases as there are a lot of dependencies that end up being behind and so you can’t install more stable versions of a lot of software. With the complexity of modern software dependencies, it has become a big problem. Also, they have in the past caused lots of problems with AUR and have let their SSL certs expire multiple times. Overall, they just haven’t been reliable IMHO, so I moved to Fedora a while back.



  • If you want to be as secure and private as possible, your best option is to set up your own build servers and automate builds, and validate the components used by each product conform to your needs and standards for security and privacy, and deployment to your own repository that your devices use for updates.

    Beyond that, there are tradeoffs based on your needs with each app store out there. If you need total privacy on what you install and your devices are already not connected to the internet, then a VPN or Tor to obfuscate your identity might be all you need. If you’re more concerned about components of applications that contain spyware, then some stores like fdroid has a lot of data available to hep you decide if the app is OK for your needs, otherwise you’d need to build your own packages or verify them manually before installation. And there are various other tradeoffs between more accessibility vs. more security and/or privacy.


  • There are solutions, just requires that the software has control of the hardware. But there’s always the possibility to take a picture of the screen with a second device. But, yeah, there’s basically no solution that prevents all possibility of a message totally disappearing without controlling all aspects of the display device and the environment it’s used in. That’s why things like certification exams that need to prevent information from leaking are always in fairly controlled environments, for example.



  • Can’t do that with email. Email doesn’t have the necessary protocols to keep a file from being copied, scrub file systems, or maintain external links to trusted time keeping sources or control over the hardware to prevent screenshots or other methods to save the data as it’s being displayed to the user.

    There are some possible partial implementations like encrypting a file and only allowing decryption and display on a remote server. But then what’s the point of making it an email in the first place? And if the method for viewing the data is something like a website, that doesn’t prevent screenshots or other ways of storing the data.

    The only way to truly have self-destructing content of any kind is to use a device that’s fully controlled, a sever that makes sure the device is not compromised, and a neutral third party you trust to keep all recipients from tampering with the server and devices. Otherwise, if one of the users gets control of any component, they will be able to compromise the system. Unfortunately, there are no trustworthy companies who aren’t under pressure to profit fr your data or from governments to allow access to your data. So there can never be a commercial product like that. And email doesn’t have any of this as it’s designed to be portable, not controllable.



  • I had to get away from Ubuntu because of the recent performance issues and the requirement to have an account to get updates faster. I have used CENTOS and more recently Rocky Linux on all my servers for over a decade, so Fedora was the obvious choice for me. I had problems with desktop applications being missing from rpm repos in the past, but that has greatly reduced improved and flatpack has helped with some stragglers. But I’m still not a fan of RedHat, but Fedora is a little more separate from them than Ubuntu is from Canonical.

    I tried Debian, but it’s not easy to get up and running on a more modern laptop or desktop without a lot of tweaking and kernel mods. It’s a good base OS but not good out of the box desktop OS. Same issue with Arch based distros.