DroidFS has been working well for me. It’s available on F-Droid.
DroidFS has been working well for me. It’s available on F-Droid.
Where is the analytics data supposed to go if you aren’t hosting a service to store it? Are you expecting the author of this free and open source analytics platform to also provide free hosting and storage?
all public bodies must disclose the source code of software developed by or for them, unless precluded by third-party rights or security concerns
So this effectively changes nothing.
This is not a great option for couples that ever touch eachother.
Direct skin to skin contact with the area where the combination gel is applied will result in transfer of the testosterone in the study gel to other people. This may result in increased testosterone levels and unwanted side effects to women, children and other men. Special care must be taken to lessen the possibility of transferring testosterone to women (especially pregnant women), children, and other people you may come in close physical (skin to skin) contact with. Therefore, it is important that you and your partner take the necessary precautions to avoid direct skin to skin contact while you are taking part in this study.
Installing by piping from curl is pretty common and not a red flag in and of itself. Even Rust is installed this way. If you don’t trust the URL, you also shouldn’t trust any binary installers downloaded from that website.
Where does the initial cryptographic verification come from? I’m not arguing that you can’t pin certificates.
There is no way a user can know the website is real the first time it’s visited, without it presenting a verifiable certificate. It would be disastrous to trust the site after the first time you connected. Users shouldn’t need to care about security to get the benefits of it. It should just be seamless.
There are proposals out there to do away with the CAs (Decentralized PKI), but they require adoption by Web clients. Meanwhile, the Web clients (chrome) are often owned by the same companies that own the Certificate Authorities, so there’s no real incentive for them to build and adopt technology that would kill their $100+ million CA industry.
I can’t explain the differences in comment tone, but the differences in votes are understandable. People don’t like to see duplicate posts in their feed.
Personally, if I want to upvote a particular that has a duplicate I’ll always upvote the one with more upvotes. And I’ll usually downvote the other, too. I don’t want to have to open both posts to read the comments, so I’d like the community to align behind one of the two posts as the “real” one.
If you expose port 80 on the PiHole service, can you login? Are you certain it’s a problem with Traefik? The PiHole could just be having problems.
You might also look into the 302 redirect that PiHole does upon login. It might not play nicely with Traefik.
P=V x I
65W ≠ 5V x 2A
I don’t know how easy it would be to migrate to your own local machine, but what you’re describing sounds like Desktop-as-a-Service. All of the major cloud providers offer this in some form.