

Take it away Ern!


Take it away Ern!


I simply do not understand the sentiment that not being a total bastard is something celebrated and not expected or required.
It’s simple really. If you don’t give positive feedback, you’ve lost the major lever that can be used to get what you want.
Using negative feedback is a useful tool but it’ll never achieve the same outcomes if used by itself.


They also can’t “stay away in droves” they just aren’t interested.


No they’re still on Earth actually, though they’re running on software written in the 50s
Not being funny, I’m pretty sure you can stick regular glass bottles in the sand anyway…
Neovim user here. Why the switch. (I’ve never tried emacs)


Duckduckgo Ecosia Startpage Brave search
If anything, the force will probably make it worse. Why not just kick the unstable, explosive battery that’s now stuck in place.
Dumb idea.
I’ll go against the grain on this one, I actually think something akin to this is the right approach.
“Protect the children” will have to go somewhere, it’s not going to just die. Getting kids devices, with locked down access is better than the ridiculous changes to the internet that are being planned.
This might not be the right implementation, but I think the idea is along the right lines… or at least, the least worst option.


Maybe they use an umbrella hat?


I would like it to be like in Harry Potter and the Goblet of Fire.
“At the sound of the cann…” BOOM


I don’t know how much hackery and fuckery there is with docker specifically. The majority of what docker does was already present in the Linux kernel namespaces, cgroups etc. Docker just made it easier to build and ship the isolated environments between systems.


I assume portainer communicates via the docker socket? If so, couldn’t you just point portainer to the podman socket?
You can do that with a CPU, it’s just slower.
A huge petition that undermines the government’s democratic mandate is never a bad thing, even if they responded.
As a Brit… … yeah actually


Better late than never
Ah, I’m not giving a full picture there. Technically you can use layered encryption like tor uses on the clearnet. Tor additionally exposes tor-only services that route exclusively via tor’s onion routing (not just http wrapped inside an encryption onion).
i2p works differently under the hood, but the shared piece is exclusive services, only accessible through a non-standard protocol. That’s how you’d get a different web. Unless we’re talking physical layer stuff.
Basically. Look up onion routing (tor protocol).
Just the one? Make it a bushel so we can make it a party