Now you mention it, I have spend so many hours on Windows trying to get the damn game to work. Trying to hide run Windows games on Linux, if it doesn’t work immedietly and I can’t find easy tweaks to fix it then I just assume it doesn’t work on Linux. But when a Windows game doesn’t work on Windows, I will spent hours making it work because I know it should!
I didn’t intend to imply that by using the same username across instances you were breaking some sort of rule. Different instances have different moderation policies, different federation policies, and different intents. Having multiple accounts in good faith should not be an issue and was not what I was trying to imply.
Rather, the intention was to show that we know bad actors do this with nefarious intent. Here’s an example (they show zero comments as they have been banned with content removed - also I think these ones only had posts not comments anyway):
I don’t really use my TV, but spend a lot of time watching TV lying down. I turn my phone so it’s facing the right way for me to see, though I get it would be a lot harder to get the cat to hold it upright.
I’m not quite sure I get what you’re getting at. If you’re using Cloudflare (for more than just a nameserver), then the client’s browser is connecting to Cloudflare via a Cloudflare SSL certificate. Any password (or other data) submitted will be readable by Cloudflare because the encryption is only between the browser and Cloudflare. They then connect to your reverse proxy, which might have SSL or it might be unencrypted. That’s a second jump done by re-encrypting the data.
How does the reverse proxy help, when the browser is connecting to Cloudflare not to the reverse proxy?
They explicitly use free DDoS protection as a way to get you in the door, and upsell you on other things. Have you seen them “drop your tunnel like a hot potato”?
Now obviously if their network is at capacity they would prioritise paying customers, but I’ve never heard of there being an issue with DDoS protection for free users. But I have heard stories of sites enabling Cloudflare while being DDoSed and it resolving the problem.
If you use DNS with proxy it still applies, you should get a Cloudflare certificate then. But yes, if you use Cloudflare as DNS only, then it should be direct. I believe you get none of the protection or benefits doing this, you’re just using them as a name server.
The Cloudflare benefits of bot detection, image caching, and other features all rely on the proxy setting.
Also if proxying is enabled, your server IP is hidden which helps stop people knowing how to attack your server (e.g. they won’t have an IP address to attempt to SSH into it). You don’t get this protection in DNS only mode either.
Basically if you’re using DNS only, it’s no different to using the name server from your domain registrar as far as I can tell.
I was in traffic on the weekend that was doing about half the speed limit, and passed a car that had been pulled over. I thought they must have done something pretty impressive to manage that.
For one, Aegis is more well known. Aegis has 6k+ stars where FreeOTP+ has about 500. This doesn’t mean it’s better, just that people are more likely to recommend it.
Aegis also has more features, and can import from many different authenticator apps (though as many don’t allow exports, this may require technical knowledge to get the database and feed it in). If you have root then Aegis can pull directly from the other apps.
Aegis claims they are better than FreeOTP because the encrypt passwords at rest.
One big difference is FreeOTP+ lets you not have to enter a pin/password to see the codes while Aegis you need to enter a pin, password, or biometric to see your codes.
I had assumed because Aegis had an option to import from Google Authenticator that this would mean you could export in bulk. Bad assumption to make, it sounds like you can do it if you have a rooted phone but Authenticator doesn’t make it easy. I did find this that shows a method to do a handful at once: blog.jay2k1.com/…/how-to-bulk-migrate-from-google…
In the past, governments didn’t have inflation targets. The black friday event involved the government flooding the gold market, dramatically reducing the value of gold. At the time the value of a dollar was directly tied to the value of gold. In hyper-inflation events (that don’t often happen in developed countries but do still happen in some countries around the world), inflation may be 50% or 100% or 200%. Sometimes way more.
These days (the last 30 or 40 years), inflation and gold have been decoupled, and instead the government has a target range of approx 1-3% inflation (depending on your exact government, but if you’re in a developed country then it is probably close). This was intended as a target that would allow businesses to have some certainty and was low so they could ignore inflation in their forecasts. The original target range was 0-2% set in New Zealand, but as it spread around the world it got slightly adjusted to a 1-3% range.
The governments now try to directly control inflation by changing the cost of borrowing money. You might have recently had inflation hit as much as 9%, but this is nothing like what happened in the old days.