@timorl @cwebber@octodon.social @spacelogic Also, playing the "genre" card where it is a rip-off. FTL was roguelike, sure. But its clones are clearly FTL-like.
@spacelogic @cwebber@octodon.social InfiniteJest-like[1]
[1]: The jest is finite, but has an amusing footnote.
@spacelogic @cwebber@octodon.social "Ironmanlike: save scumming is allowed if you scream profanity before loading"
@spacelogic @cwebber@octodon.social "Hardcorelike: you keep everything, but have to change the character name"
@gregeganSF Perhaps. But can it ignore the previous instructions?
@cab404 Yeah, but without the Intel in the middle.
Now that every PC ~and their dog~ has had USB-C/USB3 ports for a while It is strange that we can't use it for direct connection easily and still have to bounce link off some noisy channel first.
Like, come on, the devices are sitting next to each other. With a single symmetric cable we could be having secure 5Gb+ connections right away! ![]()
@tk what's next? Space ships under space sails?
@leftpaddotpy but they still require phone numbers?
@tdback I hope you have an option to exclude certain paths...
@iron_bug sorry, I'm not sure I'm getting what's exactly the problem here with nginx and regexps. Can you post a brief example?..
I hosted and proxied both ways quite a few sites with nginx, but can't figure out how it relates to name records.
@iron_bug @NGIZero IDK, it looks reasonable enough while staying generic enough to accomodate future usage.
It is more close to http://www.somehash.onion URIs than to ordinary DNS zones. Browsers work with GNS zTLDs just as fine.
The idea is very similar here - rely on public key cryptography directly instead of trust-based registries and certificate roots.
@Sherifazuhur Um, what censoring? I never asked you to stop posting anything anywhere. I've asked you as an expert on the matter as you seem to promote it and explicitly told you know everything about it.
@jwz wouldn't that overload server' block lists for no good reason?
@Sherifazuhur look, I don't want to contest IDF manufacturing evidence, they have the incentives. What I don't get is why e.g. "quds network' you've boosted decided to spread fakes that are already debunked. They should have plenty of authentic material, why plaster it with lies?
@Sherifazuhur @palestine @israel How do you know the videos of explosions are fake, but videos of.. well.. other explosions aren't?
@Sherifazuhur @palestine @israel It is possible to make a video of anybody saying (and soon, doing) anything for some small bucks.
And pro-palestinian sources are notorious for faking stuff. I don't know why, but the amount of manipulated, generated and otherwise misleading material is through the roof. It's barely possible to believe anything anymore. Maybe you can tell me why they decided to flush their credibility down the drain? Because I don't understand. This psyops doctrine worked fine before pervasive surveillance and global OSINT communities, but shouldn't they stick to hard facts now?
Toots as he pleases.