DahGangalang

joined 2 years ago
[–] DahGangalang 2 points 5 months ago (2 children)

Normally I'd recommend the audio books to hit it during commutes and such, but TBH, I don't really care for the narrators.

I do think they have Bill Nye as Death. He's credited as one of the narrators, but I couldn't quite pick out which character he "plays".

[–] DahGangalang 3 points 5 months ago (4 children)

Just finished Color of Magic (from Discworld series).

Def some strong The Luggage vibes here.

[–] DahGangalang 7 points 6 months ago (1 children)

So that says to me there was a worse economic downturn for farmers in mid 70's.

I know there was a bunch of junk with oil at the time. Is that what the downturn was about or was there something else happening at that time to beat on farmers specifically? Any history buffs with the inside scoop care to share?

[–] DahGangalang 14 points 6 months ago (7 children)

I was ~8 years old when the search engine wars were going on. Even as close to the "pre-google" age as I was, I literally cannot conceive of existence without it nor fathom how difficult some (relatively basic) things must've been.

[–] DahGangalang 2 points 6 months ago (1 children)

Not sure your specific configuration (and thus limitations for tools and such), but I've had a good experience taking a tiny punch and hammering a small river in the middle (to give the drill bit some amount of purchase to start), then drilling out the rivet.

Hope that's helpful!

[–] DahGangalang 1 points 6 months ago

I hate how well this identifies me

[–] DahGangalang 11 points 6 months ago

To be fair, the 3/4 fit elves account for 2/4 middle age dads.

[–] DahGangalang 73 points 6 months ago (6 children)

Aren't 3 of the 4 "Elf Princes" still known to be incredibly fit?

[–] DahGangalang 3 points 6 months ago (1 children)

I'm out of practice with my physics so apologies if this is a n00b question, but:

I'm unclear what (rho V) is and how you converted to that from mass (m). Further unclear what (rho A d) refers to.

Can you explain / link to an explainer on this?

[–] DahGangalang 3 points 6 months ago (2 children)

I have a chip on my shoulder about the metric system as it appears in sci-fi writing.

It drives me nuts that in books like The Expanse (and I think the Bobiverse and Andy Wier's works) that the writer will call distances in "thousands/millions of kilometers".

Really feels more reasonable to just go full send and call them megameters and gigameters, but maybe that's just my American non-metric mind trying to force full use of a system in a way those born to it don't actually do.

Anyway, thanks for coming to my Ted Talk.

[–] DahGangalang 9 points 6 months ago (1 children)

I think I'd depends on what you mean by secure.

So to give you an idea of how that'd work (at least my understanding of it):

  • Your VPN will set up a virtual interface (naturally its associated with your physical network interface, but the virtual allows some cryptography magic) and sends all traffic out that "pipe". That pipe leads to (in this case) a Proton server. That pipe is encrypted from your device to that server.
  • By default, ALL traffic is forced out that pipe.
  • When you allow LAN connections, it'll basically setup a firewall rule that sends all traffic NOT bound for you local network (usually 192.168.0.0/24) through that encrypted pipe.
  • all traffic bound for the local network will go through usual routes.

On the face of it and with a "normie" home network, this is probably okay.

However, if you (as an example) run a local DNS server (like Pi-Hole) its possible that your DNS traffic gets send through normal (and potentially non - encrypted means) channels to the DNS server and then forwarded out to the wider internet. This could allow an ISP to get an idea of what you're looking at with your VPN (since they'll be able to see that you're using a VPN, this is not a difficult thing to correlate)

So really the answer is it depends. I'd minimize risks by leaving LAN connections off, unless you really need it, but that's making a bunch of assumptions about your specific needs and threat model.

view more: ‹ prev next ›