

If I understand correctly, it sounds like you moved from an ISP that uses CGNAT to one that does not. Does your ISP provide a modem? If so, are you relying on the software features of that modem, or do you have a router inbetween?


If I understand correctly, it sounds like you moved from an ISP that uses CGNAT to one that does not. Does your ISP provide a modem? If so, are you relying on the software features of that modem, or do you have a router inbetween?


I’m using Fedora 43 Plasma under Wayland, with the regular Discord flatpak. Vesktop works, but I recall some oddly hacky things I had to do to make it work


It works and has worked for a while. Application specific sharing for audio is an oddity though, since it can’t seem to isolate and you get all desktop audio excluding discord


Interviews do typically count, it just has to be citable. Videos are sufficient in that regard as well, not just articles or books. It would be different if Torvalds had edited his own wikipedia page, but an editor who updates the page and cites this video would not be in the wrong.


I mean, I feel like he outright confirms it in the video. It’s his distro of choice since it allows him to easily use his own compiled kernels in testing. Anything else is an inconvenience to his work.


These Zen-esque chips have come up before, though it sounds like this might be the first time they’ve been used in a marketed product. A couple other companies born out of the remnants of Centaur also seemed to have borrowed architectural notes from the early Zen CPUs, potentially as a result of their competitors like Hygon making that deal with AMD almost 10 years ago. It’s the first time one seems to be almost a boilerplate 1700x though.


How’s the overall health of the drives? You might want to get a quick SMART report.
Otherwise, this sounds like pretty normal drive activity. It could be the result of anything from indexing tools to casual background processes doing a read.
If it’s periodic in a way that’s consistent, then it’s almost definitely something in software. What docker services are you running? Do you have any auditing tools or security processes that might be actively logging activity?
It’s pretty unlikely you’ve contracted malware unless you’ve gone out of your way to expose the server to outside sources, so I think you can alay those concerns.


A couple points:
I dove into self-hosting several years ago and ultimately I think I found the experience quite welcoming. I also don’t know that Safebox has a lot to offer over well-established alternatives these days like Unraid or TrueNAS, which have large user-bases and a depth of support articles to help admins better understand what they’re doing and how to do it. It’s true that not everyone would want to do this as a hobby. No one wants their services to break, or their data to be lost, and more tools that make it easier to prevent these scenarios are helpful. With that in mind, I am not left with a clear understanding of how Safebox is meant to provide safeguards here.
I used the word “admin” in the previous paragraph for good reason. Self-hosting makes you the administrator, and it means that you, the administrator, have the power to make mistakes. My recommendation is not to talk down to your users. Someone interested in self-hosting should be aware of the potential security implications of what they’re taking on, alongside the risk to their data and that breaking changes are something they can and will make along the way. If you really want to make self-hosting accessible, then the documentation for your tool needs to be accessible too.
Safebox runs on Linux, macOS, and Windows, supports both x86 and ARM64 (including Raspberry Pi, Banana Pi, and others), and handles domain/subdomain setup, Let’s Encrypt certificates, DNS configuration, reverse proxy (nginx), and also offers WireGuard-based remote access.
A user should be able to learn why these elements are important and how they work together. Talk about the limitations of running it on a raspberry pi vs a workstations or server. What’s a reverse proxy? Is WireGuard good? This doesn’t mean the average person needs to know how to configure detailed permissions or application configs, and if the goal is to provide a repository of pre-hardened Docker configs for use then that’s cool too, but there should never be a barrier to the information itself. Especially as it is relevant to the tool you’ve built.
I think that fundamentally, you’ve built a good tool that simplifies things someone who is already familiar with its components, and where it needs to improve is by expanding to help new users familiarize themselves. Education is as big a part of accessibility as the ease-of-setup.
If this is based on the GamersNexus videos, those are pretty absurd hit pieces that seemed to come from some bizarre place of resentment. They’ve had process issues when it comes to how they benchmark hardware, but never anything paid or purposefully misleading.
I’m honestly wondering if you’ve confused it with something else.


Something KDE has done seems to have resolved the issues I used to have with DPI related scaling problems in Wayland. Once Plasma 6 hit, it’s been nothing but rapid improvements with Wayland as a focus and man does it feel nice.
That said, there’s virtually no downside to still using X unless you have explicit display features you need from Wayland like HDR or the per-display scaling. Xfce is stupid lightweight and still my default for anything where battery life is a benefit.


Interesting effect of this seems to be a brief rush to buy up skins, inflating their prices as a result. My inventory of cheap junk saw a massive spike in market pricing as the price of knives flatlined


Not until now. Covert was the highest level item you could receive in a trad-up contract. Knives and gloves have been exclusive to the cases.


In my experience, they come in waves. They come either as data centres seek to replace or renew existing drives, but as a result, there aren’t as many lower capacity drives available. Lately, I’ve only seen 10+TB drives under a recertified banner, though you can find lower capacity drives that are “refurbished” instead. They will have the power-on hours to match though, as these are the refuse from those sorts of drive replacements.
You may find better luck with local used marketplaces if you only need cheap storage. Otherwise, they do seem less common if you don’t need large capacity drives.


Echoing the sentiment of the other commenter. A link would be great!


Most domain registrars make whois info private by default these days. It’s typically just a toggle. Same with DNSSEC
I’m not sure about the coins but I’ve been using it for a few months now and have been thoroughly enjoying the service. I think the coins are literally just their store wallet, and whether you keep some store credit there or not doesn’t matter. It’s equivalent to buying an iTunes gift card or something. You can just pay for whatever you want outright.


“Community Add-ons” leads me to think this is probably Kodi. You can generally do IPTV streaming through it, or torrent streaming even.


I think I’d almost consider it the same as starting with nothing when they began the next phase of construction in 2002. The map then vs now demonstrates that, and mostly follows China’s industrial/modern expansion in urban environments in recent memory. I think it’s still difficult to comprehend what a massive shift they’ve had in urban construction since the mid-90s as they’ve become the economic center for trade and manifacturing in the last couple decades. The transit still can’t keep up with demand, even with a subway system so extensive. It’s also still a very car-centric urban environment and I imagine now faces many similar civil construction challenges as in North America. It’s a good part of why I’m curious to see how things shape up in the coming decades for them and how they overcome those challenges at a scale Canada hopefully never needs to contend with.
Yes, you got it.
It’s possible that however your ISP provided router is designed, it’s got some hidden port forward configuration. If that router has an option typically referred to as “bridge mode”, you could bypass its routing features altogether and use your own router instead.
ISPs often have clauses about using their residential internet for hosting servers or exposed services, and it’s possible your has taken a different approach to mitigating traffic from those sources.
If you can, I’d recommend using your own router rather than what the ISP provides.