

I don’t have a thermostat, but I have indoor and outdoor temp and humidity sensors, and a window position sensor. HA notifies me (via lighting color) if I should open the window because the outdoor conditions are better than indoors, or vice versa.
I don’t have a thermostat, but I have indoor and outdoor temp and humidity sensors, and a window position sensor. HA notifies me (via lighting color) if I should open the window because the outdoor conditions are better than indoors, or vice versa.
Take all this with a big grain of salt—it’s based on the oddly naïve assumption that the police are trying to catch the actual instigators, and that they need real evidence to get convictions.
In my experience, the objective of the police is to create a particular public narrative (which they present to the media after the fact): the police acted with restraint, respecting the peoples’ right to assemble, until a handful of agitators turned destructive and the demonstration threatened to escalate into a major riot—at which point they swiftly intervened, caught enough of the agitators to prevent an escalation, and saved (most of) the city’s businesses from destruction.
Now, they do want to intimidate the crowd to keep things from escalating too far, but they also want to allow for some destruction to legitimize their tactics and to support the argument that the police force needs more officers. So they leave the actual instigators alone, because they’re useful to their narrative (up to a point) and because the police don’t want to engage with a group prepared to fight back. (What they really want to avoid is a large crowd seeing the example of multiple people physically resisting the riot police without being immediately subdued.)
Instead, they target:
These last are the only ones they will try to prosecute, and often their black bloc attire plus the testimony of cops who claim they saw them engaged in destructive activity will be enough to get a conviction. In this case the anonymity of their dress backfires, because the cops can pin the actions of anyone with similar clothing and body type on them by claiming they saw the act first-hand and caught the suspect immediately afterward.
Meanwhile, the real instigators are convinced that they escaped due to the brilliance of their tactics and not because the cops had no interest in catching them.
That said, all this goes out the window when dealing with Trump’s federal agents: they’re working from different narratives with no pretense of protecting businesses, maintaining local support, or respecting anyone’s rights.
How does that compare to the growth in size of the overall code base?
If there’s public information about the methods they use to protect their privacy, then those methods aren’t working.
If there’s a new party willing to take over administration of the entire instance as-is, why not just transfer ownership of the original server?
I assume it’s because it reduces the possibility of other processes outside of the linked containers accessing the files (so security and stability).
The password to my home server is a salted hash of my primary (memorized) password, so I can recover it from any computer that can run the hash function. From there I can access the rest of my saved passwords, bookmarks, etc.
CasaOS is not an operating system and more like a GUI for Docker
So it’s more like Portainer?
The current version of Affinity is great and will continue to work forever—there’s no need to switch to an alternative if you’re already using it. I just don’t have much hope for its future development.
I guess technically, Raspbian.
The Affinity Suite is great, but I’m suspicious of its acquisition by Canva—I’m afraid their solution to “bringing the suite to Linux” will be turning it into a web service.
Ok—to the extent that SVG is HTML, the variant of HTML that it is is a flavor of XML.
More precisely, both are flavors of XML.
Internal server (Home Assistant etc.): domus
External server (Nextcloud etc.): nimbus
Router/firewall: murus
If they tell law enforcement they can’t produce an unencrypted copy and it’s later proven that they could, the potential penalty would likely be more severe than anything they could have gained by using the data themselves. And any employee (or third party they tried to sell the data to) could rat them out—so they’d have to keep the information within a circle too small to make use of it at scale. And even if it never leaked, hackers would eventually find and exploit the backdoor, exposing its existence. And in either case they’d also have to face lawsuits from shareholders (rightly) complaining that they were never warned of the legal risk.
I believe so—see Wake-on-LAN.
While [Trump-supporting] CEO Andy Yen’s recent public statements have raised my hackles more than a little, Proton remains structurally committed to privacy, encryption, and user control, ensuring its ecosystem stays independent of political shifts.
That’s a pretty weak definition of “Trump-proof”.
If anyone’s interested in adding similar functionality to their own MediaWiki installation, you can use the ModernTimeline and SemanticMW extensions without the need for an AI to parse the pages for dates.
The way Linux treats many things as part of the file system (devices, sockets, etc.) that Windows doesn’t.