alias stopresisting="sudo"
stopresisting !!
This is an alt account, you may see it around. I am not ban-dodging intentionally, I promise!
This is the main
https://scribe.disroot.org/u/drkt
alias stopresisting="sudo"
stopresisting !!
The current owner is not and has not ever been interested in maintaining it. He bought it to squeeze it of its worth and now that it’s suddenly going to cost a lot of money to bring back he probably just won’t.
I ask because a ‘homelab’ isn’t usually just one machine. I have Debian on literally every computer, container and VM I have tho
OS on what?
Why do you think an RSS feed can’t sit on a CDN?
All pictures from trip https://p.drkt.eu/2025/AbandonedPlantstore
All pictures from this trip https://p.drkt.eu/2025/AbandonedPlantstore/
An RSS feed is literally the same as going to the website. A request is being made to the domain and anyone who can see the data between you and the website can see it. If you think you’re secure going to the website normally, then an RSS feed would be secure, too.
Oh for the 5th year in a row? Alright, I’ll believe that when I see it.
Day 1 failed, you didn’t post a photo
It is immature and if you go around showing it to girls expecting a date you’ll be disappointed.
Do it because it’s funny, not because you could use it as an ice-breaker (you can’t). If you really want to impress girls, doing it and not giving a fuck what your sister thinks is more likely the impress someone, girl or not- but it’s not an ice-breaker.
There is nothing I do consistently except denoise. Every picture is it’s own challenge!
Maybe I can interest you with these?
I wouldn’t even know where to begin, but I also don’t think that what I’m doing is anything special. These NVR IPs are hurling abuse at the whole internet. Anyone listening will have seen them, and anyone paying attention would’ve seen the pattern.
The NVRs I get the most traffic from have been a known hacked IoT device for a decade and even has a github page explaining how to bypass their authentication and pull out arbitrary files like passwd.
I love the idea of abuseipdb and I even contributed to it briefly. Unfortunately, even as a contributor, I don’t get enough API resources to actually use it for my own purposes without having to pay. I think the problem is simply that if you created a good enough database of abusive IPs then you’d be overwhelmed in traffic trying to pull that data out.
I have plenty of spare bandwidth and babysitting-resources so my approach is largely to waste their time. If they poke my honeypot they get poked back and have to escape a tarpit specifically designed to waste their bandwidth above all. It costs me nothing because of my circumstances but I know it costs them because their connections are metered. I also know it works because they largely stop crawling my domains I employ this on. I am essentially making my domains appear hostile.
It does mean that my residential IP ends up on various blocklists but I’m just at a point in my life where I don’t give an unwiped asshole about it. I can’t access your site? I’m not going to your site, then. Fuck you. I’m not even gonna email you about the false-positive.
It is also fun to keep a log of which IPs have poked the honeypot have open ports, and to automate a process of siphoning information out of those ports. Finding a lot of hacked NVR’s recently I think are part of some IoT botnet to scrape the internet.
Long live the Linux phone.
I may have misunderstood, but Google isn’t doing Android behind closed doors; it’s just development. The released versions will still be as open as they are now, as far as I’ve understood.
If you want to preface the command, yes, but my alias works after the fact unless blurting out “FUCKING!!” when people tell you no is just part of your quirks I guess :P