Hacker Newsnew | past | comments | ask | show | jobs | submit | c45y's commentslogin

As I understand they weren't building tunnels, so every time a legit client wanted to it has to wade through all the bad nodes to find a good one, so everything slowed right down. I was building at about 3% success rate during the issue which enables general eepsite browsing but torrenting was essentially dead


Extremely easy copy paste deployment into projects


Probably an expectation for floating IPs for load balancing instead of DNS.

Relatively simple inside a network range you control but no idea how that works across different networks in geographical redundant setups


Agreed; I have no idea how you'd implement that across multiple ASNs, which is definitely a requirement for multi-cloud or geo-redundant architectures.

Seems like you'd be trying to work against the basic design principles of Internet routing at that point.


You can configure your assigned network numbers that other AS are allowed to announce certain networks of your own. Not uncommon for in examples authoritative name server addresses.


TIL, I always thought IP:ASN mappings were 1:1.


With cloud providers and such the wording could also be "bring your own address".


Anycast pretty much


I use thunar with niri and some of the taskbar applets for bluetooth etc in waybar


Officially no deaths caused by police.

Chan yin-lam case is one that always sticks in my head.

I can well believe correlation is sometimes the answer but the odds of an award winning swimmer doing a midnight dip and washing up naked the next day, with a rushed police investigation and extremely expedited cremation is a fair bit to accept as coincidence


I checked Chan Yi Lam’s Wikipedia page. It was ruled a suicide. The conspiracy theories surrounding this case are absurd and out of control. People even challenged her mother’s identity, forcing a DNA test to be done, and yet the crowd still continued to harass her mother.


https://yggdrasil-network.github.io/ for the most part enables this - otherwise I2P and Tor for the most part facilitate this with the bonus encryption element.

We might one day have it natively with ipv6 adoption increasing.


I really appreciate the k3s default with HelmChart type and operator installed. Makes working with charts simpler in my view


Yes, I use flux which has a similar HelmChart/HelmRelease resource. One of the things that took me a while to "get" with K8s is operators are just clients running on the cluster.


Innocent until the courts say otherwise. It's why we apprehend people for crimes instead of just shooting them (in most countries)


How one person can be so good at putting out useful security tech is just wild.

I'll add this to my pile of filo made security I consistently rely on


It should be exactly that for exactly that reason


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: