

On the other hand, then your mobile provider can’t see what you’re doing, so six of this, half a dozen of the other.
Off-and-on trying out an account over at @tal@oleo.cafe due to scraping bots bogging down lemmy.today to the point of near-unusability.


On the other hand, then your mobile provider can’t see what you’re doing, so six of this, half a dozen of the other.


So would it be possible for a whole bunch of people to ddos google/other big popular websites ipv4 to ipv6 translation such that their services would still function over ipv6 but make everyone’s day awful if running ipv4. Enough angry customers and pissed off users seems like a very effective way to get isps and mobile service providers to get their act together and start issue sing ipv6 to people.
Trying to DDoS attack Google’s IPv4 services to get your mobile provider to provide IPv6 support seems kind of…indirect.


Anybody have recommendations for truly uncensored models?
Are you wanting something for ERP (erotic role-play; sexy chatbots)?
How much VRAM can you afford to spend on it?
If the answer to (1) is “yes”, then:
If the answer to (2) is “large GPU range”, maybe 16GB+ -ish, then I’d maybe look at Cydonia, based on Mistral Small. I find that this tends to become increasingly nonsensical and repetitive at a conversation grows to a certain (sub-context window) size, but it’s quite popular with users on /r/SillyTavernAI, and for the memory, I do think that it’s fairly solid.
If the answer to (2) is “unified memory range” — I use a 128GB Framework Desktop myself — then I personally use AnubisLemonade, a merge of two popular Llama 3.3-based models, sophosymphonia’s StrawberryLemonade and Anubis.
Anubis (based on Llama 3.3) and Cydonia (based on Mistral) are both done by /u/TheDrummer, a user who is active on on /r/LocalLlama on Reddit.
You’ll probably want a quantitized version (probably Q4_K_M and up in size, if you can afford the memory). For AnubisLemonade, quantitized versions:
https://huggingface.co/bartowski/ockerman0_AnubisLemonade-70B-v1.1-GGUF
For Cydonia, quantitized versions:
https://huggingface.co/bartowski/Cydonia-22B-v1-GGUF
EDIT: In general, /r/SillyTavernAI is probably the best current resource for people talking about models for ERP use that I’ve run into. Even if you don’t want to comment there, use Reddit, you probably should consider searching discussions there as a resource, as there’s a fair about of useful material.
EDIT2: For non-ERP uses, my impression is that things are somewhat-heading down the MoE route (as with Qwen), which is more-friendly to consumer GPUs. I’ve seen some commenting that these tend not to do ERP (or writing in general) terribly well. My limited experimentation has kind of caused me to agree.
EDIT3: Just to be clear, the base models that these are on are censored (and closed-source, though open-weight; open-weight is often referred to as being “open source”, though I personally wouldn’t call it that, as the training material is not made public). I don’t think that there are competitive open-source models aimed at ERP out there, as things stand.


Have you ever set up wake on LAN?
Nope, sorry. Also, based on the WP article, apparently there’s now a wireless variant of Wake-on-LAN that I’d never heard of until now (again, assuming that the wireless chipset and the system supports it).


When your laptop is sleeping, it can’t be doing computation. I mean, that’s not specific to LLMs. You’re going to have to set it in your OS to not sleep if you want to remotely access it, or to sleep under conditions that don’t arise for you (e.g. “don’t sleep if the lid is closed while the laptop is plugged in” or whatever).
The only exception I can think of would be if you (a) have it connected to wired Ethernet and (b) the laptop can do Wake-on-LAN; in that scenario, you could rig something up where it wakes up when something tries to contact it. In practice, you probably just don’t want to have it sleeping.


For a given user, I suppose that depends largely upon whether what a given end user wants to use character.ai for is copyrighted characters.
EDIT: I’d also add that copyrighting of characters and settings is something of a pet peeve of mine. Historically, many of our great works, like, say, the collection of literature dealing with Greek mythology or around Robin Hood or that sort of thing relied on many unaffiliated authors being able to write about the same set of characters and in the same settings.
But most copyright holders don’t permit that. H. P. Lovecraft was something of an exception, which is why you see so much Cthulhu stuff in random places.
I do think that if you’re Disney, you should have some route to make it clear that you are the original-rights-holder to, say, the Star Wars IP, so that someone else can’t pass off their work as canon as being endorsed by them. You should have some way to distinctly identify yourself, maybe via use of trademark. But I also have grave doubts that we would be unable to fund the creation of fictional works if characters and settings had a fair use exemption, so that a third party was guaranteed the ability to be able to create works in the same fictional universe.
QUIC works hand-in-hand with HTTP/3’s multiplexed connections, allowing multiple streams of data to reach all the endpoints independently, and hence independent of packet losses involving other streams. In contrast, HTTP/2, which is carried over TCP, can suffer head-of-line-blocking delays if multiple streams are multiplexed on a TCP connection and any of the TCP packets on that connection are delayed or lost.
SCTP was going to do that too. It hasn’t seen much uptake.
https://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol
Features of SCTP include:
- Delivery of chunks within independent streams eliminates unnecessary head-of-line blocking, as opposed to TCP byte-stream delivery.
Honestly, a lot of people are probably posting in !selfhosted@lemmy.world when their questions really are better-suited to another community. Not just on hardware, but on other technical questions. I don’t think that it’d be a bad thing if they posted in the other places.
However.
End of the day, you need to split up a community when either (a) the traffic is too much of a firehose of content to be able to identify the most-interesting stuff, which isn’t the case for me for this at all or (b) there’s too much unrelated stuff showing up and people are getting a lot of stuff that they don’t want thrown at them. I think that there’s enough overlap between the interests and knowledge of most of the subscribers here and what’s covered that it’s probably not producing a lot of stuff that they aren’t interested in or where their knowledge isn’t relevant.
Like, we have a handful of video-game-specific communities, but they see so little traffic that just using general-purpose video gaming communities like !games@lemmy.world still works pretty well. Maybe some genre-specific communities, like !shmups@lemmus.org.
I think that if we, say, grew the Threadiverse userbase by a factor of ten, then some of the higher-traffic communities that exist now really should split up. But as it is, I personally am not too fussed about having more-centralized stuff from a user standpoint. I tend to say “I’d like to have more traffic in the communities I’m in” than “there’s too much traffic and I need help in filtering it down”.


change the default SSH port
Any port scanner — take nmap — is going to turn this up. $ nmap -p0-65535 <hostname> takes a little longer than checking a single port, but what’s the threat that you’re worried about? Someone brute-forcing a password? That’s going to take a hell of a lot longer than that, and you use strong passwords that will make that wildly impractical, right? A zero-day remote exploit in OpenSSH’s sshd? If someone gets one of those, they probably aren’t going to waste it on you.
SSH is also trivial to fingerprint as a protocol. Here’s me running netcat to my local SSH instance:
$ nc localhost 22
SSH-2.0-OpenSSH_10.0p2 Debian-7+deb13u2
^C
$
It ain’t rocket science to identify an SSH server.
I personally think that port-knocking isn’t a great idea and just adds hassle and brittleness to something, but I’d do a port-knocking setup before I tried running sshd on a nonstandard port.
If you honestly don’t trust SSH, then okay, fine, wrap it with a VPN or something with real security so there’s another layer (of course, that raises the issue of whether you trust the VPN software not to have remote exploits). Or have one host that you can reach and bounce from there to another host or something.
There are ways that I’d say are useful to try and secure an SSH instance. Use keys rather than passwords. Whitelist user accounts that can be connected to remotely.
But anyone who is likely to be a real risk to your system is going to be able to find an ssh server running on a nonstandard port.


I’m rather concerned about what I do when my Surface Pro 7 dies
Well, most of what I’ve seen expects memory prices to be coming down in 2028. So if it’s got two years of use in it, you’re probably good.
If you’re desperate for a laptop sooner and cheaper, you can get used laptops on eBay (well, maybe somewhere else if you’re not in the US; dunno what the used PC market is like globally).
so I figured that using pipewire to co-ordinate this would be the easiest way forward, except it turns out that it’s a (GUI) user space process, which doesn’t make sense on a server with no GUI users.
I’m not entirely sure what you mean by “(GUI) user space process”, but if it’s that it’s a systemd user process (e.g. it shows up when you run $ systemctl --user status pipewire rather than $ systemctl status pipewire, which appears to be the case on my system, where there’s one instance running per user session), then you probably can run it as a systemwide process, where there’s just one always-running process for the whole system. IIRC, PulseAudio could run in both modes. I don’t know if you have concerns about security on access to your mic or something, but that could be something to look into.
searches
Sounds like it’s doable. Not endorsing this particular project, which I’ve never seen before, but it looks like it’s possible:
https://github.com/iddo/pipewire-system
PipeWire System-wide Daemon Package (Arch Linux)
This package configures PipeWire, WirePlumber, and PipeWire-Pulse to run as a single system-wide daemon as the root user. This setup is optimized for headless media servers, HTPCs, or multi-user audio environments.
every hardware website I’ve checked so far, either don’t have any mini pcs, nucs or similar, or they have zero information about the hardware.
Well, if they give you the manufacturer and model number, you should be able to look them up with the manufacturer.
I’m not on there, but you might have more luck in !localllama@sh.itjust.works
You might also want to list the hardware that you plan to use, since that’ll constrain what you can reasonably run.
Ah, so I bet what they’re doing is looking like a single VPN from the Android OS level, setting a default route into that, and then doing routing in userspace.
I have not used such a configuration, but I believe that it’s fine to have multiple WireGuard VPNs concurrently up, at least from a Linux client standpoint. I have no idea whether your phone’s client permits that — it could well be that it can’t do it.
Your routing table would have the default route go to a host on one of them (and your Internet-bound traffic would go there), but you should be able to have it be either. Or neither — I’ve set up a WireGuard configuration with a Linux client where the default route wasn’t over the WireGuard VPN, and only traffic destined for the LAN at the other end of the WireGuard VPN traversed the WireGuard VPN.
From Linux’s standpoint, a WireGuard VPN is just like another NIC on the host. You say “all traffic destined for this address range heads out this NIC”. Just that the NIC happens to be virtual and to be software that tunnels the traffic.
EDIT:
It sounds like this is an Android OS-level limitation:
https://android.stackexchange.com/questions/261526/are-there-technical-limitation-to-multiple-vpns
In the Android VPN development documentation you can find a clear statement regarding the possibility to have multiple VPNs active at the same time:
There can be only one VPN connection running at the same time. The existing interface is deactivated when a new one is created.
That same page does mention that you can have apps running in different profiles using different VPNs at the same time. That might be an acceptable workaround for you.


I have additional sound deadening material if I need to apply it but I’m not there yet.
That’s probably a pretty good idea in terms of cost. I checked earlier when I made the comment to see what the price difference these days was, and IIRC a non-isolated 18U is ~$800 and an isolated 18U is ~$1800. They aren’t putting anything like $1k of sound-absorbing material into the rack.


Heh. Someone else in this thread posted an image that has three disconnected Elitedesks just stacked on each other on the bookshelf housing their homelab, another powered-on one, and what I think might be two or three more Elitedesks that are partially-obscured.
Sounds like trying to compete with Steam’s Big Picture Mode.