

And all the photos look like shit because they’ve been recompressed in JPEG, and all the metadata is just gone.
And all the photos look like shit because they’ve been recompressed in JPEG, and all the metadata is just gone.
.order(created_at: :desc)
I don’t have a point, but felt like typing it in Ruby. Maybe someone else will have something snarky to say.
I don’t know why but this makes me picture some dusty old-school newsroom with that one guy in all the TV shows smoking a cigar acting kind of like an asshole, and he looks up from the rough draft and while pointing at it with the cigar half-yells “have ChatGPT take a crack at it, maybe it’ll spice things up!”
If only there were an anonymous, distributed, peer-to-peer network where things like this could be hosted easily. cough i2p
But you can do all that without selling out your users to third parties.
As a web developer that blocks all this shit, that’s the line I always use. I would just use first-party analytics from the same domain the website is hosted from. The added bonus is that people like me wouldn’t even be able to block it without blocking the entire website (at least with DNS).
This is why I’m such a cunt about blocking this stuff at the DNS and/or IP level. Google Analytics is essentially everywhere including IRS web pages with your Social Security number in the DOM.
For that price I might as well get a used desktop or another mini PC.
It does matter to me and I live in an area with frequent power outages. Unfortunately I didn’t check this out before purchasing so I’m pretty annoyed by this behavior.
Why is this even being covered?
That is sad to see. I’ve moved on to Raspberry Pi + hard disk enclosure (with incredible performance) but it’s still upsetting to see Synology go this route.
to try to* ban it
Ohh AVIF, fancy schmancy
Just did a whole routine to check the link for UTM parameters. 😭 (It links to the bare domain.)
I’m just using WireGuard on a VPS with multiple interfaces. I’m still doing heavy ad/tracking blocking via DNS too.
As for App Connectors I’m working on a script (compiled program hopefully down the road) that can query a specific hostname using a specific interface (say, a US-only website using DNS over a US-based VPN) then create a virtual IP address that directs to that same IP using the correct tunnel.
My reasoning for the virtual IP address is that I don’t want to redirect every website on the host to the other tunnel—lots of servers have an array of websites on them.
What I found disappointing about Tailscale is I had to do a lot of “hacks” to make things work—DNS on each exit node had to match perfectly (despite using different exit tunnels)—then the shit would only work like 20% of the time. One day traffic for the US tunnel worked, the next day it was going out of the exit node. I also never got it working correctly in Docker so I was running multiple VPS servers.
If I remember correctly with App Connectors your client would query the App Connector for the domain, then it would return an IP address. The IP address would be set up to always go through the defined exit node. So if your DNS was off or you were accessing another website on the same server you were screwed. On top of that, it just didn’t work.
I loved Tailscale for about a year but am moving away from it because having multiple exit nodes with each redirecting traffic via commercial VPNs with DNS-based ad blocking and App Connectors grew way too complex.
I’m not saying you’re doing all this but if you do get to a point where you’re directing traffic to multiple countries Tailscale turns into nightmare to manage.
“S-Q-L ‘aight” for SQLite?
Yeah that’s a whole other can of worms. I see this a lot at work where people are asking for direct database credentials and cringe every time.
Is it though? I haven’t used a framework since probably 2007 that doesn’t do this. There are the smaller, more DIY frameworks out there but I’ve never used them professionally.
Such an original, Reddit-style one liner. 😒