

If there was so much voter fraud, why don’t we have a special presidential election in 2026? Since he’s doing such a great job as president and he’s fixed all the voter fraud, surely he’ll win again by an even greater margin.


If there was so much voter fraud, why don’t we have a special presidential election in 2026? Since he’s doing such a great job as president and he’s fixed all the voter fraud, surely he’ll win again by an even greater margin.
Check the README for piper. It moved to https://github.com/OHF-Voice/piper1-gpl


Doublethink? Bestie, I don’t even think once.


Trump did the same thing to Obama 17 years ago.


Where does that 12 billion for soybean and corn farmers come from? The people who can’t afford their groceries. America has enough corn. America grows corn just to burn it as a gasoline additive. Maybe if the price of corn is falling, it’s time to grow something else.


Nextcloud shouldn’t be seeing your MAC address. However, my guess is that Nextcloud has been configured to invalidate the session if the client IP changes, and randomizing the MAC address is one way that can happen.


Impeachment has lost all meaning. Trump has been impeached multiple times but remains in office. Trump loyalists in congress prevented him from seeing any consequences for those impeachments and block new impeachments. Unless something changes, the only way Hegseth is leaving is if Trump decides to remove him.


Are you looking for a VPN or are you looking for an IPv6 tunnel broker like Hurricane Electric?


Does investment fraud benefit businesses? Businesses are investors too.


Who’s on first joke names can’t be good for SEO.


An immutable distro… like NixOS? Or do you mean your root filesystem is immutable? NixOS can do that too. You could normally mount your nix store as readonly and remount rw during updates if you really care about filesystem immutability, or use some snapshot system if you’re paranoid about adding new files to the store corrupting other files already in the store during an update.
The nixpkgs VM creation module, which I’ve never seen documentation for, has a mode where it generates a kernel, initrd, kernel command line, and erofs image containing a prepopulated /nix directory and that’s enough to boot the VM.
Ansible is disappointing as an IAC tool. It’s good for doing things, but it’s not good for converging systems to a desired state. Too often you end up with playbooks that are not idempotent or rely on something that was done during a previous execution of the playbook or just don’t do something that was done by a previous version, and then unless you are constantly recreating your systems you won’t notice until it’s a problem and you can’t get your system back.


That’s what I’m saying. If you signed up to defend and then got assigned to invade DC, getting shot at in DC isn’t what you signed up for.


People don’t join the national guard to invade somewhere and get shot at. The national guard is supposed to be protecting people at home.


You can host a Proton mail bridge to use different apps running on different machines, including phones.
Self hosting e-mail, particularly SMTP, will likely require a static IP from a reputable provider. Mail servers may reject incoming mail based on the reputation of the sending server. You can avoid this by relaying through another SMTP server and configuring your DNS rules to allow that server to send mail on your behalf, but that’s not really self hosting anymore.


This is a states’ rights issue: the right of the state to do what is convenient for the states’ rights party.


The article suggests the opposite: population decline in rural areas allows the bears to spread out and get closer to populated areas.


A dystopia that Elon Musk wants to import from China where one company controls everything you do via an app on your phone.


You can use OpenEBS to provision and manage LVM volumes. Host path requires you to manually manage the host paths.


It is impossible. CPV is only going to allow the attacker to know that the device is probably not located next to the VPN server. It can only prove a positive, not a negative.
The second method you’re describing is only possible for people who control internet infrastructure and are able to infer correlations data going into your VPN server with data going out of your VPN server, which is both easier and more difficult than you’re suggesting. The attacker does not need to most of the internet routers because they only care about the data going into and out of the VPN server (it’s onion routing where the attacker needs to control many routers), but the attacker does need to have a powerful enough device to be inferring (hopefully) encrypted network flows on the public network to the packet sizes of encrypted VPN traffic for all of the traffic that is passing through that VPN server at the same time.
“Ministry of Love” doesn’t sound very edgy.