deleted by creator
🇨🇦
deleted by creator
A paid plex share is a plex server that someone is running + selling access too.
This is against plex’ terms, gets plex accounts banned; and in some cases, Plex (co) has taken rather drastic action by blocking entire VPS providers from reaching plex.tv; thus plex server software no longer functions on those VPS’s at all.
Naturally, people selling shares want to maximize profit, so they use VPS providers on the cheaper end; resulting in cheaper VPS solutions being blocked for everyone.
Adam Savage exploring Makitas autonomous lawnmower R&D facility
They’re often pretty quiet too.
Get an automatic/self-driving one, and you can just watch your vegetation be mutilated instead of doing it yourself.
If they are injecting ads into the actual video stream; it won’t matter what client you use. You request the next video chunk for playback and get served a chunk filled with advertising video instead. The clients won’t be able to tell the difference unless they start analyzing the actual video frames. That’s an entirely server-side decision that clients can’t bypass.
Only if the ads are a fixed length and always in the same place for each playback of the same video.
Inserting ads of various lengths in varying places throughout the video will alter all the time stamps for every playback.
The 5th minute of the video might happen 5min after starting playback, or it could be 5min+a 2min ad break after starting. This could change from playback to playback; so basing ad/sponsor blocking on timestamps becomes entirely useless.
I’d just like to clarify: the new machines aren’t MRI (the magnets in those would prohibit all metal objects being within 100ft).
The new machines are also xray; but the xray emiters and detector are now on a spinning carriage similar to an MRI. This allows you to build a 3d model of the object and calculate it’s volume, which when combined with the density measurements gives much more reliable material detection.
This also means your stuff doesn’t have to be removed from bags to ensure items aren’t blocking each other from the scanner.
Fun fact: until recently, most airport scanners literally couldn’t differentiate between water and many common explosives. Hence the scrutiny of water based products/possessions.
You should certainly drive with more caution than a typical vehicle; but you’ve still got to get fuel and travel between storage and wherever you’re having fun.
A trailer + a vehicle to tow it isn’t always available/practical.
Point is, it’s likely not on public roads often or very long. It’s not like it would be out getting groceries and picking up the kids from school every day.
Tbh, regarding visibility; it doesn’t seem any worse than a semi truck. Probably has better stopping power too.
Sure, there are definitely some assholes out there; but all we’ve got here is this picture.
This does not show him being an asshole in anyway; dudes just existing alongside his toy. What’s wrong with that?
A sensible person wouldn’t judge a stranger based on the actions of others.
Except in this case, the driver is being called a POS simply for owning a toy and legally driving it down the road.
I could understand if he was actually engaged in some assholery like taking up multiple lanes… But he’s fine.
Something tells me it’s not a daily driver…
People are allowed to have toys.
True. Known as Encrypted Client Hello now, as part of TLS1.3.
It seems many more browsers support it than last I’d looked. I’m curious to see how much of the general web has adopted support for it onnthe server side. I’ll have to look into that more, and see what it’ll take to setup for self-hosting.
It will prevent the ISP from snooping on, or tampering with, the DNS request. However when you go to use the IP you’ve retrieved via DoH/DoT; your first request establishing a TLS connection to that IP will contain an unencrypted SNI which states the domain you are trying to use. This can be snooped on by your ISP.
But what’s not encrypted by either is the Server Name Indicator or SNI, ie: the initial request to a webserver stating which host you’re trying to reach at that IP, before establishing the TLS connection, contains the domain you’d requested via DoH/DoT, in plaintext.
Lmao, yeah… You can make a can so secured a bear definitely won’t get in; but will people go to the effort to use it then?
Definitely some overlap there.
deleted by creator
deleted by creator
I tend to drop the link into yt1s.com
Sometimes just for audio, sometimes for the full vid.
I’m rarely grabbing more than one video at a time though.
[re-commenting as I meant this to be a top-level comment, not a reply]