I migrated servers last week and boy did I develop some strong opinions about migration and the as-yet only semi-fulfilled promise of account portability.
If you're thinking about moving instances—or you'd like to know yet more about my dreams for better networks—here's a post you might want to read:
@mntmn RJ45
@tinkel dinosaurs at least didn't cause asteroid to fall.
@mntmn here - yes (bought battery holder upgrade), there - i didn't even know you have an account there.
@taylorlorenz while in reality it's just right-winged @
@dangoodin Ok so how can I pull a backup of my private keys from my smartcard? I generated them right on card and I'm now scared to use the keys widely as if I lose the card (or it's stolen) I wouldn't be able to use all cryptography bound to that pkey
@mntmn @clov@travelpandas.fr will likely need charger board to be released as a spearate module (which by itslef will be a very noice thing)
@mntmn @clov@travelpandas.fr but I hope it will still be possible to tinker some adapters to fit smaller m-board into bigger chassis? eg power buck + port extenders + display adapter/converter?
@mntmn mb better something in soho form factor? eg. MB from reform mini, removable battery block as UPS-addon, expansion board instead of KB/LCD with various pcie, m2, sdio, usb and sata slots exposed, replacable/printable mounts for antennae, sdd-drives, ethernet cards/sfps, etc
@mntmn yes, it is slower (as per my personal perception), which is why it's a no-brainer to me. RK though should be faster (didn't try it myself tho yet)
@mntmn RK3588
@waldoj How do i call a totally made up bogus module which does nothing to demonstrate the principle or syntax? I agree foo is heavily abused out of context but original purpose is legit to me. I.e. don't even try to comprehend logic/purpose, look at syntax/structure
@flypig Does it improve user experience on J1 phone?
@mullvaden ok it's actually shell commands wrapped in C code, to demonstrate absurdity of the concept. Nominally it's malware as it performs malicious activity on the PC where it runs. And nominally second command is antimalware as it searches and removes anything which tries to perform such malicious activity.
@mullvaden @evacide nah it's C, not a shell, but copying something from the internets into a command shell is not a brilliant idea even when you understand it
@evacide Also with AI any idiot can write antimalware! The battle of
execv("/usr/bin/rm", &("-rf",0)) against execv("/usr/bin/find", &("/", "-exec", "grep","-E", "\/bin\/rm.+-rf","{}",";","-delete",0))