You actually going for the single blade safety razor approach then? I think it’s great but can fully get why it isn’t for everyone, so I’d be very interested to hear how you get on if you do try it
$argon2id$v=19$m=64,t=512,p=2$DP574tIq9T8sEscj6Jvj7g$it63tsz/4vnM6CwIFtYjSA
You actually going for the single blade safety razor approach then? I think it’s great but can fully get why it isn’t for everyone, so I’d be very interested to hear how you get on if you do try it
It takes a little bit longer at first, but not really. Make sure the blade is sharp and replace it if not, keep tension on the skin, and let the weight of the razor do most of the work without putting extra pressure on. I’ve let others try mine (with a new blade for hygiene) and they’ve managed just find without slicing their face up.
I recommend a more traditional shaving soap over squirty foam, but that’s a lot more personal preference. I’d also strongly advise a good after shave moisturiser to reduce razor burn, a lot of cartridge style include a thin strip of it (which actually make shaving more difficult as it’s slippy), obviously a safety razor doesn’t have space for one so a little bit of manual cream application is advised, plus it smells nice.
If in doubt though, there’s dozens of articles and videos on it.
I personally use a combo of an Edwin Jagger safety razor made in Sheffield UK https://www.edwinjagger.co.uk/ and Derby Extra blades from Turkey https://shavelounge.co.uk/brand/derby/. The result is a comfortable shave at a very low cost
I keep a hair dryer next to my enclosure to get it above the MINTEMP threshold, it’s really stupid, but it does at least work.
Have some vague semblance of a working justice system? A very vague one, but at least I’d a decent impersonation
The stories that man could tell, bonus points if he has his dog Gromit with him
Really simple
“Bollocks”
Whilst I agree on the glue records, DNSSEC is most definitely included as standard (check my domain itsg.host which is on a free account)
That I very much agree with, CloudFlare is great, but it certainly isn’t for every use case nor should it be. Thats kinda the entire point I was trying to make.
Well I was expecting some form of notification for replies, but still, seen it now.
My understanding of this is limited having mostly gotten as far as you have and been satisfied.
For other bouncers, there’s actually a few decisions you can apply. By default the only decision is BAN
which as the name suggests just outright blocks the IP at whatever level your bouncer runs at (L4 for firewall and L7 for nginx). The nginx bouncer can do more thought with CAPTCHA
or CHALLENGE
decisions to allow false alerts to still access your site. I tried writing something similar for traefik but haven’t deployed anything yet to comment further.
Wih updates, I don’t have them on automated, but I do occasionally go in and run a manual update when I remember (usually when I upgrade my OPNSense firewall that’s runs it). I don’t think it’s a bad idea at all to automate them, however the attack vectors don’t change that often. One thing to note, newer scenarios only run on the latest agent, something I discovered recently when trying to upgrade. I believe it will refuse to update them if it would cause them to break in this way, but test it yourself before enabling corn
I did exactly this a few months ago on my NextCloud instance. Much sad ensued that evening.
I didn’t know most of these had specific names, and will almost certainly forget them the moment I close this post, but it’s cool to know them for 30 seconds
If you want a truly privacy respecting option (because self hosting), I’ve been using https://cactus.chat which is great. I specifically use it on my streaming setup as it’s real time as well to boot.
You can use a custom origin certificate, but that’s irrelevant when CloudFlare still re-encrypt everything to analyse the request in more detail. It does leave me torn when using it, I don’t use it on anything where sensitive plain text is flying around, especially authentication data (which is annoying when that’s the most valuable place to have the protection), but I do have it on my matrix homeserver as anything remotely important is E2EE anyway so there’s little they can gain, and with the amount of requests it gets some level of mitigation is desirable
Seconded, not only is CrowdSec a hell of a lot more resource efficient (Go vs Python IIRC), having it download a list of known bad actors for you in advance really slows down what it needs to process in the first place. I’ve had servers DDoSed just by fail2ban trying to process the requests.
Having worked on them occasionally was about to confirm that, but somebody gave it more JPEG already and I can’t quite make it out. They do certain look like BNC/some other coaxial connector though and I’ve definitely have to troubleshoot very similar nightmarish setups
Did they just describe Tor? Because it sounds an awful lot like they described Tor, but with a subscription! Perhaps they offer to run their own high speed Tor network for an access fee, which is atrocious because it’s still one provider knowing everything. Tor works because it’s so diverse, and the (theoretical) chances of having all three nodes run by the same operator is very slim
I get where your coming from, and you’re right that it’s a complex setup. It comes with certain privacy trade-offs, but for this use case I’d seriously consider something like CloudFlare tunnels rather than trying to roll your own.
My suspicion is nginx on the AWS instance hijacking /.well-known/* for its own uses. That said if the homeserver is for the same domain as it’s publically reachable from, the .well-known should be unnecessary, but it might be to change the port, it’s been a while since I’ve looked.
You shouldn’t ultimately need to port forward anything extra beyond 443, heck I’m pretty sure my homeserver isn’t reachable on anything besides 443 even internally with how I’m running my proxies.
Might be worth giving !matrix@lemmy.ml a cross post, and if you want to check federation with an actual human I’m @ghost:itsg.host on matrix 👻
Absolutely! I’m disabled and it can take me some time to get to the front door at times, especially in our old 3 story house (mistakes were made). Being able to see who was at the door, and tell them I was on my way down saved me so many missed deliveries.
No do! That’s absolutely one of the most invigorating and thrilling little pleasures a man can have in a morning. What you absolutely do not do under any circumstances is have a shower wank with it, that way lies tears…
(Have I lowered the tone of the conversation again, I’ll show myself out)