You can’t have a Lemmy wide rule for anything because that’s not how federation works.
You can’t have a Lemmy wide rule for anything because that’s not how federation works.
There’s actually a pretty simple explanation to this if you understand the way that GPT-3 trains on the models that it’s given.
I’ll try to make this as short as possible, because to naturally explain it it would take hour by hour
by hour to endure a response by hour by hour and keep going and learning. Each by hour by hour. Thank you by hour for each hour.
Fuck the context I wanna be MAD!
Speedrunning the debian download process. You should post that time.
Oh this is interesting. Yours is shortened too.
I host my own instance and it’s just me (because I’m so unlikable I can’t even get my 2 FRIENDS to join my instance. I digress)
I wonder if there’s some setting or ENV variable somewhere on the instance to change that.
As far as I can tell the full username is only hidden on the same instance. So for instance, I see your full user name, but I only see the shortname for mine.
Well in that case, tailscale is running as a daemon, so it effectively is doing it’s own little Dynamic DNS.
I suppose the point I’m trying to make is SOMEONE has to know your public Home IP. In the case of using tailscale, it would be the tailscale servers. But you would be correct that I don’t believe it would be published to any public DNS servers.
In my case, I’m using cloudflare for DDNS.
The solution I describe comes with a bit of risk acceptance (just like anything else really).
Well the VPN connection depending on what technology you use will still need to connect to the Public home IP, which is probably dynamic, which means that you’d probably need to use Dyanmic DNS to keep it connecting properly.
As far as someone just connecting to the reverse proxy the Home IP shouldn’t be visible at all. I just mean it wouldn’t hide well were someone really trying to find it.
I’m not sure I’m explaining this well. I haven’t had coffee yet.
It’s not a perfect solution but, and requires some sort of VPS, but you could run a reverse proxy on a VPS, site-to-site vpn from the VPS to your Homelab, and point your reverse proxy to the services over said VPN.
I do something like this. However, it doesn’t completely hide your IP.
So the software you’re looking for is a Reverse Proxy (nginx, traefik, caddy… etc. there are tons), a VPN (Wireguard, OpenVPN, StrongSwan (IPsec)), and more than likely some sort of VPS. My Linode VPS costs me $5 a month. They constantly have sponsor deals that will get new users free time though.
Hope that gets you started.
That’s ok we have /c/linux now.
Not only that. They are a for profit company that is extremely dependent on volunteers to moderate their subs. I feel like they are going to learn a hard lesson about alienating your volunteer workforce.
My partner’s crappy HP all in one that charges insane prices for ink seems to work fine whenever I rarely have to use it.
I did this for a while with single GPU passthrough, Although keeping it working didn’t seem to be worth it in the long run.
Use the eagles? You don’t just USE the Eagles. They are intelligent beings. They don’t submit to the will of anyone. They kindly risked their lives toward the end, and only because things had escalated already.