Skip to content

Is Google about to destroy the web?

Technology
65 37 214
  • 335 Stimmen
    17 Beiträge
    0 Aufrufe
    L
    Great interview! The whole proof-of-work approach is fascinating, and reminds me of a very old email concept he mentions in passing, where an email server would only accept a msg if the sender agreed to pay like a dollar. Then the user would accept the msg, which would refund the dollar. So this would end up costing legitimate senders nothing but would require spammers to front way too much money to make email spamming affordable. In his version the sender must do a processor-intensive computation, which is fine at the volume legitimate senders use but prohibitive for spammers.
  • Your Go-To Tool for FB Video & Reels Downloading

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    8 Aufrufe
    Niemand hat geantwortet
  • 367 Stimmen
    27 Beiträge
    98 Aufrufe
    P
    They're like "Wahhh we need to hit 3.5% and then the fascist dictator will totally resign!" and then Trump is like "Oooo my delicate little feefees, oh well, here comes my Gestapo!" while the 50501 protest marshalls chant "We did it! We don't need crushing violence to make a change!" while completely ignoring that the NKD protests accomplished literally nothing.
  • Claude Exporter: Claude to PDF, MD and more

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 95 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    86 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 0 Stimmen
    6 Beiträge
    28 Aufrufe
    H
    Then that's changed since the last time I toyed with the idea. Which, granted, was probably 20 years ago...
  • *deleted by creator*

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    14 Aufrufe
    Niemand hat geantwortet