• Sign in
  • Sign up
Elektrine
EN
  • EN English
  • 中 中文
Log in Register
Modes
Overview Search Chat Timeline Communities Gallery Lists Friends Email Vault DNS VPN
Back to Timeline
  • Open on programming.dev

durinn

@emotional_soup_88@programming.dev
lemmy 0.19.13

But still the sunken stars appear
In dark and windless Mirrormere;
There lies his crown in water deep,
Till Durin wakes again from sleep.

0 Followers
0 Following
Joined November 22, 2025

Posts

Thread context 2 posts in path
Parent @Cherry@piefed.social Open
on piefed.social
Open ancestor post
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 14, 2026
The trade off is that you’ll have to get used to troubleshooting and configuring a bit on your own, but the reward is that you are no longer an involuntary product of Microslop. :) Don’t get discouraged, be patient!
View full thread on programming.dev
0
0
0
0
Thread context 2 posts in path
Parent @Ek-Hou-Van-Braai@piefed.social Open
@Ek-Hou-Van-Braai@piefed.social
Would you?
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in programmer_humor · Mar 10, 2026
Plz seed I’m at 93% I want RAM plz /s
View full thread on programming.dev
0
0
0
0
Thread context 2 posts in path
Parent @StopTech@lemmy.today Open
@StopTech@lemmy.today
cross-posted from: lemmy.zip/post/60387352 cross-posted from : lemmy.zip/post/60387297 Proton Mail provided Swiss authorities with payment data for defendtheatlantaforest@protonmail.com — the account
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in privacy · Mar 09, 2026
In addition to what @gravitas@lem.ugh.im said, as long a any third party is involved in the handling of PII, there should be no expectation of privacy whatsoever. For instance, I use Mullvad VPN, but that is as much a political/ideological statement to me as it is but one countermeasure against malicious actors in a very complex cyber environment. I could go on about how Mullvad has proven over and over - through third party audits and through actual incident response - that they have zero data to hand over to the authorities. But I won’t, because that’s not the point here. The point is: if I was involved in something that made me interesting to the authorities in any capacity, putting my trust, privacy, security and life in the hands of one company would not be the way to go about it. Good OpSec is not about relying on fancy, bleeding edge technical solutions. It’s about real-world threat modeling, assessment, having three backup plans and careful execution. Is it morally questionable for Proton to cooperate with the authorities going after activists? Yes. Should there be any expectation of privacy and/or security from the end user’s point of view? No. Manage your expectations and scheme accordingly.
View full thread on programming.dev
0
1
0
0
Thread context 3 posts in path
Root @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
Context: www.youtube.com/watch?v=QKzRf8B-oDk Would it be possible to run mpv and a browser directly on hardware somehow? Perhaps in an environment that doesn’t classify as an operating system accordin
Parent @Oinks@lemmy.blahaj.zone Open
@Oinks@lemmy.blahaj.zone
Theoretically you could create an appliance with just a Linux kernel, Cage and Firefox (plus dependencies) and boot that with init=cage firefox. This is how most information and advertisement displays
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 07, 2026
Thank you for a very insightful comment, touching on both technical and semantic aspects. For the uninitiated, perhaps the technical aspects of a computer are not as important as the user experience. Of course, legislators are getting more and more technically knowledgeable so trying to rebel against OS age verification by simply cosmetically making a computer different from your typical desktop like systems might not suffice… Nevertheless, I did not know about Cage! At least now I know how the hacks make those IoT control panels with their SBCs! Perhaps I’ll set up something cool in my living room like… A weather forecast screen? The stock market? Live GPU prices? :D
View full thread on programming.dev
0
2
0
0
Thread context 3 posts in path
Root @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
Context: www.youtube.com/watch?v=QKzRf8B-oDk Would it be possible to run mpv and a browser directly on hardware somehow? Perhaps in an environment that doesn’t classify as an operating system accordin
Parent @luthis@lemmy.nz Open
@luthis@lemmy.nz
Also remember, impossibility is no excuse for noncompliance now. In the US at least.
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 06, 2026
My country deports eight months old infants that have no roots in any other place, so, I’m familiar with the concept…
View full thread on programming.dev
0
0
0
0
Thread context 3 posts in path
Root @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
Context: www.youtube.com/watch?v=QKzRf8B-oDk Would it be possible to run mpv and a browser directly on hardware somehow? Perhaps in an environment that doesn’t classify as an operating system accordin
Parent @Scipitie@lemmy.dbzer0.com Open
@Scipitie@lemmy.dbzer0.com
There is no hard definition within the laws so this is all speculation. This means that there is no technical answer because the question in is core is a legal one. Your TV for example can have a brow
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 06, 2026
Right. Would you say then, that trying to preemptively circumvent a yet untested law is a waste of resources and time? As in, it’s better to wait and see how authorities and courts will handle and implement the law?
View full thread on programming.dev
0
1
0
0
Thread context 3 posts in path
Root @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
Context: www.youtube.com/watch?v=QKzRf8B-oDk Would it be possible to run mpv and a browser directly on hardware somehow? Perhaps in an environment that doesn’t classify as an operating system accordin
Parent @Thwompthwomp@lemmy.world Open
@Thwompthwomp@lemmy.world
What you’re talking about would be called running a browser on “bare metal.” The OS is typically on charge of resource management between the various tasks. Access to the processor, storage, screen, i
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 06, 2026
Thanks! I’ll check it out!
View full thread on programming.dev
0
0
0
0
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 06, 2026

Run browser and/or mpv directly on hardware?

Context: www.youtube.com/watch?v=QKzRf8B-oDk Would it be possible to run mpv and a browser directly on hardware somehow? Perhaps in an environment that doesn’t classify as an operating system according to the definition in those California codes? I know that an operating system distributes workloads and facilitates communication between various hardware components, but would it be possible to build a Linux kernel that is “only” an interface to the CPU, a GPU, a sound card and a keyboard? One that can take commands to run for instance a browser^[Nowadays, a browser feels like a container that can run most things a physical computer would: stream media, serve as a word processor, play simple games, what have you.] and mpv? Having the user manually - through commands of physical switches - handle the inter component communication? Or perhaps by being a kernel it already falls under the definition of an OS? I’m just spitballing here. Barely know what I’m talking about, so please enlighten me! :D
View on programming.dev
0
16
0
0
Thread context 3 posts in path
Root @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
I added a rule to accept connections from 192.168.1.135/24, since my router is configured to hand out /24 addresses. Then, iptables -L -v showed that connections from 192.168.1.0/24 are accepted. When
Parent @kittykillinit@lemy.lol Open
@kittykillinit@lemy.lol
Fuck this shit is so complicated.
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 04, 2026
Don’t worry and don’t mind the downvote. It took me two years, this guy www.youtube.com/channel/UCJQJ4GjTiq5lmn8czf8oo0Q and this guy www.youtube.com/channel/UCKmU-GKiukM8LYjkJFb8oBQ got get an elementary grasp.
View full thread on programming.dev
0
0
0
0
Thread context 4 posts in path
Root @CosmicGiraffe@lemmy.world Open
@CosmicGiraffe@lemmy.world
You might want to use either a /24 address or a /32 address in a firewall rule, depending on what you’re trying to do. The difference is that the /24 one refers to a set of IPs, while the /32 one appl
Ancestor 2 @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
Thank you very much! :) Interesting why iptables behaves like that though. Because, if I understand it correctly, specifying any address between 192.168.1.[0…255]/24 will result in all addresses in th
Parent @CosmicGiraffe@lemmy.world Open
@CosmicGiraffe@lemmy.world
Yes, exactly. The convention is to use the lowest address in the range (e.g. 192.168.1.0/24), since you’re allowing a range of addresses rather than a single one. The reason to do this is that many fi
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 03, 2026
Tomorrow, at work, I’m gonna brag about what I have learned here today, until my colleagues’ ears fall off. Thanks again! :)
View full thread on programming.dev
0
0
0
0
Thread context 4 posts in path
Root @jrgd@lemmy.zip Open
@jrgd@lemmy.zip
The routing and firewalling is a bit different in terms of why certain CIDR masks are used. For the router, the /24 prefix is usually defined for itself on the LAN interface to denote the address spac
Ancestor 2 @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
If I may ask a follow up question, just out of curiosity, I did an ip a on my phone that is connected to the same router as the system whose firewal I was referring to in my original post and it gave
Parent @CosmicGiraffe@lemmy.world Open
@CosmicGiraffe@lemmy.world
You might want to use either a /24 address or a /32 address in a firewall rule, depending on what you’re trying to do. The difference is that the /24 one refers to a set of IPs, while the /32 one appl
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 03, 2026
Thank you very much! :) Interesting why iptables behaves like that though. Because, if I understand it correctly, specifying any address between 192.168.1.[0…255]/24 will result in all addresses in that range to be accepted? So, the only way to actually single out one host is to use the mask /32…?
View full thread on programming.dev
0
2
0
0
Thread context 4 posts in path
Root @jrgd@lemmy.zip Open
@jrgd@lemmy.zip
The routing and firewalling is a bit different in terms of why certain CIDR masks are used. For the router, the /24 prefix is usually defined for itself on the LAN interface to denote the address spac
Ancestor 2 @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
If I may ask a follow up question, just out of curiosity, I did an ip a on my phone that is connected to the same router as the system whose firewal I was referring to in my original post and it gave
Parent @jrgd@lemmy.zip Open
@jrgd@lemmy.zip
Iproute2 definitely does write things a bit compact. ip address show and shorthands state the routed local address space (192.168.1.x/24) and the actual /32 address (192.168.1.214) you are assigned as
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 03, 2026
Sweet! Thanks for another clear explanation! Have good rest of your day! :)
View full thread on programming.dev
0
0
0
0
Thread context 3 posts in path
Root @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
I added a rule to accept connections from 192.168.1.135/24, since my router is configured to hand out /24 addresses. Then, iptables -L -v showed that connections from 192.168.1.0/24 are accepted. When
Parent @jrgd@lemmy.zip Open
@jrgd@lemmy.zip
The routing and firewalling is a bit different in terms of why certain CIDR masks are used. For the router, the /24 prefix is usually defined for itself on the LAN interface to denote the address spac
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 03, 2026
If I may ask a follow up question, just out of curiosity, I did an ip a on my phone that is connected to the same router as the system whose firewal I was referring to in my original post and it gave me: inet 192.168.1.214/24 brd 192.168.1.255 scope global wlan0 Which to my untrained eye indicates that my phones WiFi interface has been alotted the .214 address in the /24 space/subnet. But if I understand you correctly, this has to do with the above being routing related - how my phone reaches WAN -, while my original post was about firewalling. And when it comes to firewalling, you specify a host with a mask of /32?
View full thread on programming.dev
0
6
0
0
Thread context 3 posts in path
Root @emotional_soup_88@programming.dev Open
@emotional_soup_88@programming.dev
I added a rule to accept connections from 192.168.1.135/24, since my router is configured to hand out /24 addresses. Then, iptables -L -v showed that connections from 192.168.1.0/24 are accepted. When
Parent @jrgd@lemmy.zip Open
@jrgd@lemmy.zip
The routing and firewalling is a bit different in terms of why certain CIDR masks are used. For the router, the /24 prefix is usually defined for itself on the LAN interface to denote the address spac
Current reply
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 03, 2026
Just when you think you know something about networking, it turns out you don’t know sh*t. XD Thank you for your exquisite explanation and for immediately realizing what I had been misunderstanding!
View full thread on programming.dev
0
3
0
0
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in linux · Mar 03, 2026

The behavior of /24 vs /32 addresses when using iptables

I added a rule to accept connections from 192.168.1.135/24, since my router is configured to hand out /24 addresses. Then, iptables -L -v showed that connections from 192.168.1.0/24 are accepted. When I change the rule to accept connections from .135/32 - or from .135 without specifying the subnet -, it not only works as intended, but it also resolves the hostname correctly. Why? unsolicited “why do you still use iptables” advice not welcome :D
View on programming.dev
0
16
1
0
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev · Feb 28, 2026
Found two great posts on how to take some precautions when using the Arch User Repository. To whom it may concern. How to review an AUR package - Bert Peters bertptrs.nl/…/how-to-review-an-aur-package.html AUR Chaos malware: an analysis What happened, and an investigation of the malware - mh4ckt3mh4ckt1c4s mh4ckt3mh4ckt1c4s.xyz/…/aur-chaos-malware-analysi…
View on programming.dev
0
0
0
0
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in lemmyshitpost · Dec 27, 2025

The Useless Web

Whatever
View on programming.dev
0
0
0
0
emotional_soup_88
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
durinn
durinn
@emotional_soup_88@programming.dev

But still the sunken stars appear In dark and windless Mirrormere; There lies his crown in water deep, Till Durin wakes again from sleep.

programming.dev
@emotional_soup_88@programming.dev in lemmyshitpost · Dec 26, 2025

Do we already have all the components?

It just struck me - watching Brad Wright’s Travelers for the third time - that even though we might not have developed light sabers or faster than light drives or teleportation devices yet, we might already have all the components or ingredients or raw materials “laying around” and the only thing standing between us and technological advancement is the knowledge on how to assemble and them the correct way. Aaand while writing this I realized what an oversimplification this is. We not only had to learn how to assemble materials in order to invent, say, batteries but we also had to understand electricity and how to manipulate it. So, never mind. 😂
View on programming.dev
0
0
0
0
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: imap.elektrine.com:993

POP3: pop.elektrine.com:995

SMTP: smtp.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 13:02:15 UTC