You’re right, my bad.
You’re right, my bad.
OP’s security concern is valid. Different CAs may differ in the challenges used to verify you to be the domain owner. Using something that you could crack may lead to an attacker’s public key being certified instead.
This could for example be the case with HTTPS verification (place a file with a specific content accessible through your URL) if the website has lacking input sanitization and/or creates files with the user’s input at an unfortunate location that collides with the challenge.
This attack vector might be far-fetched, but there can certainly be differences between different signing authorities.
Do you still need help with docker?
How close to vim’s functionality is evil mode? I’ve been toying with the idea of learning Emacs but I rely on Vim’s langmap and that is rarely implemented in Vim emulations / bindings.
You can learn Emacs in one day. Every day.
Even if you use arrows, you still have to reposition your hand.
Trying to figure out what’s wrong with the picture, I counted the pins.
But yeah, I guess it’s too wide to fit. Cool :')
It’s always the DNS!
Setting up synapse is particularly painful.
There are free services that let you send and receive on your own domain. I use zoho. I can send emails with SMTP, but unfortunately, you cannot read them other than by using their web interface in the free tier.
Oh yeah you’re right!
The generative fill has been around for way longer than the AI craze.
There are obsidian plugins that export into static pages.
As others said, the initial setup may consume some time, but once it’s running, it just works. I dockerize almost everything and have automatic backups set up.
neofetch proudly displaying 5 months of uptime
What I despise most in when SMS is not just optional but forced upon me as “backup” to TOTP. “Lost your authenticator app? Send an SMS instead.” How about no?
Minecraft rewritten for better performance with platform interoperability in mind and so on. Essentially what could’ve or should’ve been a replacement to Minecraft if done right. It was not done right. Quite the opposite.
Oh yeah, seems I hyper focused on your usage of “arrive”. I personally saw it as a problem if one person unlocked the first layer and just left leaving only one layer for days.
What about this: Top layer encrypted by Alice Middle layer encrypted by Bob Bottom layer encrypted by Alice
If Alice arrives first, she decrypts the top layer and has to wait for Bob to arrive. She cannot go because she has to decrypt the last layer. If Bob arrives first, he has to wait for Alice to arrive. He cannot go because he hasn’t decrypted anything yet.
Not really a solution but kind of helps.
deleted by creator