i hate it.

  • 0 Posts
  • 53 Comments
Joined 1 year ago
cake
Cake day: June 30th, 2023

help-circle


  • If you run a server…

    #!/bin/sh
    INSTANCE=myinstance.com
    psql -U lemmy -c "SELECT (person.name || '@' || instance.domain) AS user, 
    ('https://' || instance.domain || '/u/' || person.name) AS their_instance_url,
    ('https://${INSTANCE}/u/' || person.name || '@' || instance.domain) AS url,
    comment_like.score
    FROM comment_like
    JOIN person ON comment_like.person_id = person.id
    JOIN instance ON person.instance_id = instance.id WHERE comment_id = $1;"
    

    Edit: lol@ the downvotes. Do people think lemmy operates on the principles of magic? Sorry my SQL offends you.


  • I will say, I’ve had an old mechanical window AC trip the ZEN15’s overload detection when the thermostat short cycled and the compressor was stalled. So I would trust it for that in a pinch, and especially with a resistive load. But for an outdoor heating element application, I still would oversize the switching device (and get the 40A contactor), and put 15A circuit breakers before the contactor. Also, that 40A device can drive either a two pole 240V device (unison contacts) or two 120V devices, so you could just put each heater on its own pole and heat up your wiring a little less. Or probably just wire only one pole, I haven’t read the manual.


  • My guess is that they see their device controlling a heating element of unknown (to them) provenance as a liability. My zen15 manual specifically has a warning against using it with heaters.

    CAUTION This is an electrical device - please use caution when installing and operating the Power Switch. Remote control of appliances may result in unintentional or automated activation of power. Do NOT use this Z-Wave device to control electric heaters or other appliances which produce the risk of fire, burns, or electrical shock when unattended.




  • I fail to see your point. Of course it is not merely “encrypting your shit.” But a constructed language is more dangerous than using existing crypto. It is subject to frequency analysis and many other analyses. And aside from the point of “if you can memorize it’s flawed,” you might as well just use a one time pad at that point. Generally, if you are not a cryptographer and you design a cipher, that cipher will be flawed. The human element of being suspicious of a surveillance state is certainly valid, and you are right, it is not something I generally worry about on a daily basis, mostly because I am not presently engaged in any such high risk activities. I am saying nothing about this not changing and never becoming something to worry about, but you bet your ass I will be employing cryptography designed by experts if that day comes.

    And anyway, all my webservers are https, I am an avid user of gpg, and I’ve been working in “cybersecurity” for over a decade now, so I like to think my opsec isn’t total garbage. After all the Snowden stuff came out, it just reinforced my existing practices and birthed new ones. Also, wireguard is the shit.












  • There are a lot of variables that could cause that situation. Were both machines on the same physical link (ethernet vs wifi)? Changes to their RTT could influence it. The only thing I could really add is that you have found the reason QoS mechanisms exist, lol.

    edit: I guess I can add this: if computer 1’s download was from a host that has longer total round trip latency than computer 2’s download, computer 2’s download will return ACKs quicker and thus get PSH packets with data quicker than computer 1. This will lead to it filling available bandwidth more easily.


  • There is no allocation if you haven’t configured any. Whoever can get their shit stuffed in the pipe first wins. From that point, any bottlenecks either FIFO to/from buffers, or if buffers fill up, just start taildropping. TCP (and other transport layer protocols like QUIC) implementations then have a sliding window algorithm that figures out the optimal amount of data to keep in flight at one time based on RTT and any packet loss caused by taildrops along the way.