its like taking the condom off and walking out of the room, which I have to imagine is legal.
Lmao. Beleive it or not; straight to jail.
🇨🇦
its like taking the condom off and walking out of the room, which I have to imagine is legal.
Lmao. Beleive it or not; straight to jail.
We’ve been having some stability issues over the past few days
I was gonna ask about that. I had noticed several slow downs over the last couple days, but pretty brief. Glad to see it’s being looked into/sorted out.
Chears, m8!
I tend to drop the link into yt1s.com
Sometimes just for audio, sometimes for the full vid.
I’m rarely grabbing more than one video at a time though.
[re-commenting as I meant this to be a top-level comment, not a reply]
deleted by creator
127.0.0.1 is the loopback address. Ie it’s your computer trying to reach a service its hosting (prowlarr)/talk to itself. Sonarr/Radarr should be using this address as long as prowlarr+sonarr/radarr are on the same machine.
Prowlarr is either not running, or port 8080 is blocked by your firewall.
This is still a thing in the US?
Canada abolished that crap years ago… Phones are sold unlocked, and any remaining locked phones are required to be unlocked free of charge just by asking the Carrier.
So… If a bunch of friends and I just fill up a roundabout with our cars, just going round and round…
Straight to jail.
If the sarcophagus still has ‘juice’ in it, I think you might be a little early for archeology…
Pretty sure that’s just grave robbing
A paid plex share is a plex server that someone is running + selling access too.
This is against plex’ terms, gets plex accounts banned; and in some cases, Plex (co) has taken rather drastic action by blocking entire VPS providers from reaching plex.tv; thus plex server software no longer functions on those VPS’s at all.
Naturally, people selling shares want to maximize profit, so they use VPS providers on the cheaper end; resulting in cheaper VPS solutions being blocked for everyone.
Drink less paranoia smoothie…
I’ve been self-hosting for almost a decade now; never bothered with any of the giants. Just a domain pointed at me, and an open port or two. Never had an issue.
Don’t expose anything you don’t share with others; monitor the things you do expose with tools like fail2ban. VPN into the LAN for access to everything else.
and using DDNS
As in, running software to update your DNS records automatically based on your current system IP. Great for dynamic IPs, or just moving location.
Sure, cloudflare provides other security benefits; but that’s not what OP was talking about. They just wanted/liked the plug+play aspect, which doesn’t need cloudflare.
Those ‘benefits’ are also really not necessary for the vast majority of self hosters. What are you hosting, from your home, that garners that kind of attention?
The only things I host from home are private services for myself or a very limited group; which, as far as ‘attacks’ goes, just gets the occasional script kiddy looking for exposed endpoints. Nothing that needs mitigation.
Unless you are behind CGNAT; you would have had the same plug+play experience by using your own router instead of the ISP supplied one, and using DDNS.
At least, I did.
I’d be curious to know more about the methods used.
Did they somehow spread an infection through the bittorrent protocol, or was there an alternate route used?
How exactly did the malware arrive on consumer devices?
Because library patrons are the ones setting military policy ofc… Glad the message is reaching the right people.
No. You just need to be able to exit without power. Getting back in mechanically isn’t a requirement.
It should be, but it’s not.
It’s not immoral until you start having your kid throw games to swing the odds in your favor.
No. Battery optimization is disabled for this app, it’s far more abrupt than a power managed app, and there are crash logs.
This appears daily for the last 2 weeks:
Stacktrace
java.lang.NullPointerException: Attempt to invoke virtual method ‘java.lang.Class java.lang.Object.getClass()’ on a null object reference at androidx.compose.ui.graphics.layer.LayerManager.persistLayers(Unknown Source:118) at androidx.compose.ui.graphics.AndroidGraphicsContext$componentCallback$1$onTrimMemory$1.onPreDraw(Unknown Source:16) at android.view.ViewTreeObserver.dispatchOnPreDraw(ViewTreeObserver.java:1204) at android.view.ViewRootImpl.performTraversals(ViewRootImpl.java:4723) at android.view.ViewRootImpl.doTraversal(ViewRootImpl.java:3288) at android.view.ViewRootImpl$TraversalRunnable.run(ViewRootImpl.java:11344) at android.view.Choreographer$CallbackRecord.run(Choreographer.java:1689) at android.view.Choreographer$CallbackRecord.run(Choreographer.java:1698) at android.view.Choreographer.doCallbacks(Choreographer.java:1153) at android.view.Choreographer.doFrame(Choreographer.java:1079) at android.view.Choreographer$FrameDisplayEventReceiver.run(Choreographer.java:1646) at android.os.Handler.handleCallback(Handler.java:958) at android.os.Handler.dispatchMessage(Handler.java:99) at android.os.Looper.loopOnce(Looper.java:230) at android.os.Looper.loop(Looper.java:319) at android.app.ActivityThread.main(ActivityThread.java:8919) at java.lang.reflect.Method.invoke(Native Method) at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:578) at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1103)
END of stacktrace
Thread info
Name: main ID: 2 State: RUNNABLE Priority: 5 Thread group name: main Thread group parent: system Thread group active count: 32 Thread time: 0 hr 5 min, 5 sec
END of thread info
Device info
Report ID: 14f3b073-a751-49aa-9a7b-222db9bf0e15 Device ID: 88a115ded4d03269 Application version: 69 Default launcher: com.sec.android.app.launcher Timezone name: Pacific Standard Time Timezone ID: America/Vancouver Version release: 14 Version incremental : A546WVLS7CXE1 Version SDK: 34 Board: s5e8835 Bootloader: A546WVLS7CXE1 Brand: samsung CPU ABIS 32: armeabi-v7a, armeabi CPU ABIS 64: arm64-v8a Supported ABIS: arm64-v8a, armeabi-v7a, armeabi Device: a54x Display: UP1A.231005.007.A546WVLS7CXE1 Fingerprint: samsung/a54xcs/a54x:14/UP1A.231005.007/A546WVLS7CXE1:user/release-keys Hardware: s5e8835 Host: SWDK6120 ID: UP1A.231005.007 Manufacturer: samsung Product: a54xcs Build time: 1715231961000 Build time formatted: 08-05-2024 22:19:21 Type: user Radio: A546WVLS7CXE1,A546WVLS7CXE1 Tags: release-keys User: dpi User IDs: N/A Is sustained performance mode supported: No Is in power save mode: No Is in interactive state: Yes Is ignoring battery optimizations: Yes Thermal status: STATUS_NONE Location power save mode: MODE_NO_CHANGE Is device idle: No Battery percentage: 91 Battery remaining time: 31-12-1969 16:00:00 Is battery charging: No Is device rooted: No CPU Model: N/A Number of CPU cores: 8 Up time with sleep: 509 hr 22 min, 56 sec Up time without sleep: 340 hr 53 min, 28 sec
END of Device info
Exit reasons
Exit reason #1
Description: crash
Importance: FOREGROUND
Reason: CRASH
Timestamp: 22-06-2024 10:50:05
END of exit reason #1
Exit reason #2
Description: crash
Importance: FOREGROUND
Reason: CRASH
Timestamp: 22-06-2024 06:08:27
END of exit reason #2
Exit reason #3
Description: crash
Importance: FOREGROUND
Reason: CRASH
Timestamp: 21-06-2024 19:44:57
END of exit reason #3
END of exit reasons
Application info
App name: Jerboa Version code: 69 Version name: 0.0.69 Package name: com.jerboa Short package name: jerboa Flavor: N/A Signatures: nORRaWmGNmrBj18PL/p3svEr/s4= Is debuggable: No First installed: 27-09-2023 19:04:21 Last updated: 15-06-2024 01:37:51 Requested permissions: android.permission.ACCESS_NETWORK_STATE, android.permission.INTERNET, android.permission.READ_MEDIA_AUDIO, android.permission.READ_MEDIA_IMAGES, android.permission.READ_MEDIA_VIDEO, com.jerboa.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION, android.permission.READ_MEDIA_VISUAL_USER_SELECTED Default prefs: N/A Default prefs: N/A
END of Application info
Currently running foreground/background processes
N/A
END of running foreground/background processes info
That’s Rathaniel to you.