• 0 Posts
  • 11 Comments
Joined 2 months ago
cake
Cake day: March 10th, 2026

help-circle
  • Every discussion I have seen on the subject says that docker ipv6 is pretty busted from a security perspective and you have to implement a bunch of workarounds.

    I don’t have to time both to migrate to podman (and maybe have to run dual stacks for what isn’t available) AND migrate to ipv6. But apparently the way podman does it is also kind of a hacky way (I am far from a networking expert) so I will sit with my pretty decent, secure, and working ipv4 lol



  • Yes, but also on the hardware level.

    I don’t know enough about OS programming to know if it is the architecture or the (closed source, as mentioned) CPU design itself that is more difficult to implement.

    Looking at the MCU space, even with a known architecture (like ARM), each processor has to be individually implemented in software and firmware which is a ton of work, and the only people who necessarily know how are the processor designers unless it is open source. But take that with a big block of salt, because I have never done it, just looking at industry practices.






  • Spinning up and down hard drives repeatedly drastically reduces their lifespan though. Once a day or so, fine, but if you set a 30 minute idle time or something and it spins them down a dozen times per day, you are putting acceleration forces on the drive many more times than intended.

    If you have to buy a new HDD twice as often because you spin it down, any financial or environmental savings is instantly negated and in the end it is much, much worse in both respects.




  • It was literally never about the children

    There is a lawyer’s wet dream of evidence against thousands of real-world non-speculative child rapists and abusers with names, phones, emails, and literal video evidence and written admissions of guilt of systematic rape, torture, abuse, and child sex trafficking that are legally usable in court.

    What has been done about it?

    Not one. Single. Arrest. Because the guys implementing the tracking are the same ones raping and torturing children.

    This is not a policy or tool to protect children.

    This is a way for the exact same sadist pedophiles to track children’s identities so that they can use that plus data broker data to figure out what kids are most vulternable and target them to be raped, tortured, and abused.