

No they’re still on Earth actually, though they’re running on software written in the 50s


No they’re still on Earth actually, though they’re running on software written in the 50s
Not being funny, I’m pretty sure you can stick regular glass bottles in the sand anyway…
They could be talking about bubble wrap to be fair
Dunno what it’s like these days but brought steam to a crawl when I last used it
Neovim user here. Why the switch. (I’ve never tried emacs)
That’s it… That’s all the context there is…
I think in terms of thought process, we probably have all the context available…


Duckduckgo Ecosia Startpage Brave search
That’s sure to get a rise outta the police
I’ll go against the grain on this one, I actually think something akin to this is the right approach.
“Protect the children” will have to go somewhere, it’s not going to just die. Getting a device with locked down access is better than the ridiculous changes to the internet that are being planned.
This might not be the right implementation, but I think the idea is along the right lines… or at least, the least worst option.
I get it the least


I don’t know how much hackery and fuckery there is with docker specifically. The majority of what docker does was already present in the Linux kernel namespaces, cgroups etc. Docker just made it easier to build and ship the isolated environments between systems.


I assume portainer communicates via the docker socket? If so, couldn’t you just point portainer to the podman socket?
You can do that with a CPU, it’s just slower.
A huge petition that undermines the government’s democratic mandate is never a bad thing, even if they responded.


Sounds like a skill issue. Just need to be careful how you wash it, don’t leave it wet and re-season every now and then. None of that takes any more time than going to the shop to replace the teflon pan that’s gotten chipped.


If it’s looked after, lasts several lifetimes
Ah, I’m not giving a full picture there. Technically you can use layered encryption like tor uses on the clearnet. Tor additionally exposes tor-only services that route exclusively via tor’s onion routing (not just http wrapped inside an encryption onion).
i2p works differently under the hood, but the shared piece is exclusive services, only accessible through a non-standard protocol. That’s how you’d get a different web. Unless we’re talking physical layer stuff.
Basically. Look up onion routing (tor protocol).
I think you’re actually describing a two part series