

I was under the impression that he had enough money to self finance Avatar 4 + 5 if need be and was not going to be dissuaded from making them one way or the other


I was under the impression that he had enough money to self finance Avatar 4 + 5 if need be and was not going to be dissuaded from making them one way or the other
The headline is based on the classic Onion headline / News In Brief article used after every new mass shooting in America
Come on down to real fake doors data


I’m actually pleasantly surprised to find out he’s still alive and there wasn’t some mysterious hand waving to cover up his “misplacement”


Summon the thorn character guy
Somewhat. They can certainly maintain a list of known IP addresses. Those IPs can be changed.
When they change, you as a user need to be able to find the new addresses. Whatever mechanism you can use, your ISP can likely disrupt too. For instance, they can DNS block the API that returns the list of possible endpoints (as sometimes happens to Proton where I live).
You can then counter by using private DNS. It’s a cat and mouse game.
Thanks for that! I have struggled with watchtower from time to time, so knowing there is a good fork out there is great. I’ll try it out.
NAS, Jellyfin/Plex, Copyparty (Google Drive replacement), Kiwix (Wikipedia), Joplin, Searxng, Ollama (LLM). Plus all the various searching tools, the maintenance tools, etc. I have pretty strong compartmentalization of my storage into separate media pools that all have their own RAID setups, plus an external backup.
It’s a bit of work to get all set up, but I use docker compose and autoheal / watchtower to keep the services going. I use Caddy and my own domain to make the services I want available externally to my network.
Ben is a treasure and his videos are amazing - not in production value, necessarily, but content. I’ve learned so much from him
Because, see, they look like boy scouts. And their motto is “be prepared.”


Nobody wants to read your spam ads


What did I just read here?


I’ve heard that someone is working on one, so fingers crossed it comes out soonish. It’s fine for me as is, but it’s a little difficult to promote to people used to the simplied Google and Apple UIs


The UI is a little crazy but I am a big fan of copyparty. I have moved my entire family off of Google Drive and we use copyparty, and it works great. Uploads are fast, lots of features, easy to stand up and doesn’t consume lots of resources. But like I said, the UI could be better.
There are two Tesla dealerships within 15 minutes of my house. Both lots are filled with cyber trucks. Nearby, there’s a mostly-empty office complex that has another 25+ cyber trucks in the parking lot, clearly being used for overflow. Crazy.


I think I just filled out my keyword bingo card from that headline alone


I can appreciate your concern and point of view, but I asked “so if I want to do this, how can I prepare to do it safely?” And your response was “just don’t, do this instead.” I can certainly seed, but that’s not what I’m aiming for. I am far more interested in creating systems and providing content. My time is…flexible. Suffice to say, the time concern is not going to be the roadblock.


I’d be more than a little interested to be pointed towards a guide, or even just a bullet point list, of good opsec considerations or tools for a project like this. I’ve got time and technical ability but don’t spend a lot of time thinking about these concerns. The last thing I want is to cause myself trouble I’m not ready for, but I’d like to make a significant contribution to the community, so I want to prepare adequately.
Any guides or lists you can think of?
That’s a fair take on things. Thanks for the insight. I figure anyone who can build a submarine company and an ocean explorer vessel and some hologram data visualization system and whatever else sort of shenanigans he is up to, has a very different set of concerns around money than most of us do