It does DNS already, so why do I need an external DNS server?
You need an external DNS server to access it externally. If you’re happy with internal access only, you can probably set some sort of DNS override in UniFi.
It does DNS already, so why do I need an external DNS server?
You need an external DNS server to access it externally. If you’re happy with internal access only, you can probably set some sort of DNS override in UniFi.


This isn’t about Firefox, and there are zero mentions of Firefox in the article. This is about Mozilla screwing over their volunteers by replacing their human written translations, with inaccurate machine translations written by a closed source LLM.
It doesn’t really matter how you setup dynamic DNS and SSL. I prefer to handle dynamic DNS on the router, incase it’s smart enough to refresh the IP after DHCP renews it. I do SSL on a seperate nginx instance, but I run a few other sites; it might be easier to configure it directly on home assistant, but I haven’t tried.
If you want some extra security, I’d look into mTLS, as that establishes some cert based authentication at the TLS layer before HTTP, but it can be complicated to configure.


on these atomic distros where even something like syncthing involves shenanigans to keep active week to week? Ain’t happening.
I don’t see why you couldn’t kexec into a new kernel. kexec will load a kernel into memory from an already running kernel, and jump into it. It’ll suck for the user as they’ll have to semi-reboot everytime they want HDMI 2.1, but it’s easy and doesn’t install anything.
There’s also live patching, but I think that’ll be a bit of work.
Of course the kernel needs to be compiled with those options enabled, but most distros do.
Edit: And they probably won’t work with kernel lockdown/secure boot.


DP has an option to transmit HDMI signals instead, this is what passive adapters use and will still have the same HDMI 2.0 issue. A DP source can be passively adapted to HDMI, but a HDMI source cannot be passively adapted to DP.
You can also get active HDMI adapters which actively convert the signal, and can work with HDMI 2.1. Intel actually has an active converter chip built into their ARC GPUs, and is how they get around this issue.


You’re going to have a hard time trying to get that working over the WAN (if that’s even possible).
Wake on LAN is still encapsulated in an IP packet, so you can send it over the internet, and most WOL clients let you specify an IP. However your router will need to DNAT it to a broadcast address. Some routers have a check box for this (e.g. An ISP provided Technicolor router I have), some let you port forward to broadcast (e.g. Many routers, sometimes with workarounds), and some let you manually configure NAT (e.g. MikroTik routers).
So it is possible, but forwarding public internet traffic to a broadcast address seems like a bad idea, and I wouldn’t recommend it. Why I know this: I used to do this in middle school, and it does work quite well.


If you just want an IPv6 prefix and don’t need the encryption a VPN provides, you can use an IPv6 broker. Hurricane Electric’s broker is a popular one.


keyring lets you set backends with environment variables, I believe you can try PYTHON_KEYRING_BACKEND=keyring.backends.null.Keyring which is the simplest backend as it doesn’t save anything.
Edit: You can also try keyrings.alt as it has an insecure file backend, if you absolutely need password saving.
Fair enough. It seems like vibrant visuals is possible with GPU spoofing, but I haven’t tried it.
You can also play the Android release fine with Waydroid.


The browser extension also lets you scan the page for QR codes for the TOTP key.
I’ve always wondered, why do we put the GPU drivers and their firmware into the initramfs? Can’t we just rely on the framebuffer drivers until the root partition is mounted? Since most of the firmware size is from GPUs, that should reduce initramfs size, and speed up booting as there’s less to load into memory.
And I feel like it’s not a good idea to have a modem directly attached to the pc directly unless you’re using it as a router?
Yeah I feel like this is the issue. The modem/router would be firewalling between the networks hiding the PC behind it.
Also from the description, does OP have a router at all? Is their ISP somehow just allocating public IPs to everything? Do your IPs start with 192.168 or something else?


Someone has also just done 100 modems over a T3 line using Cisco gear: https://youtu.be/rOdGK6GVIVU
Maybe it was used as some sort of privilege escalation? E.g. NP++ downloads an XML file to %TEMP%, some already present malware modifies it, then GUP downloads a payload and executes it with administrator permissions.