• 0 Posts
  • 122 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle



  • Definitely agree 100%.

    The cop thing is weird. In all the cases where (extremist) people talk about wanting to use the military that would normally be handled by the police, like crowd control, detaining large numbers of people, or systematic checkpoints and door to do searches, I’d actually prefer the military to the cops. Not because they’ll push back or violate civil liberties any less, but because military training is consistent and actually happens, so when someone shoves them at a checkpoint the training they regress to will be at least of a higher baseline quality than the average cop.


  • Never. There’s no space in their oath for fragging their commander in response to a legal order.
    At the highest level, doing so is a military coup, and directly opposed to their oath.

    Rounding up innocent Americans and putting them in camps isn’t unconstitutional if you pass a law saying you can do it. Just ask the Japanese citizens of the country of the military stood up for them, or if they just accepted their legal orders.

    Relying on the military, the violent arm of the state, to protect us from the civilian arm of the state is at best not going to happen. More likely it’s so much worse if they do, because they typically don’t turn control over to someone better, if they do at all.




  • I mean, the human will to evil and the military leadership being willing to listen to political evil are in alignment in this case. So if the military is ordered to do some camps, they’re gonna do some camps.

    You just always here a lot of talk about how much the military is focused on not doing atrocities, and it’s tossed out as a knowing trump card whenever talk of the military doing stuff on US soil comes up.
    “The army would never torch a subdivision in Milwaukee, the houses look like their houses, the people look like them, and they get too much training telling them not to evil in specific ways in specific contexts”. It misses that the same people who explained the rules are the ones who’ll be telling them to do the evil, and that our soldiers aren’t better or worse than any other, morally. And soldiers regularly do evil in places that look like their homes, to people who look like their families.

    The integrity of the military is just not a barrier to them being used to do bad things ™ domestically.


  • We have plenty of examples of soldiers merrily war-criming their way into history in Iraq and Afghanistan.
    It doesn’t matter how many power points you watch, it doesn’t make a soldier not a soldier, and soldiers are defined by signing up to maybe do a bit of unprovoked violence.
    They may or may not get punished for it later, but the sheer number of civilian casualties in both those wars makes it abundantly clear that killing civilians isn’t the hard line we like to think it is. We just need to tell the pilot that it’s a valid target, and chances are they’ll bomb that wedding.

    Humans are pretty willing to do messed up stuff in war. All that training is what gets you to the point where it’s a coin toss, and not perfect willingness to engage in collective punishment, reprisal killing, intimidation murder or just plain “shooting through the windshields of cars for fun”.


  • We don’t have a lot of reason to think that the military wouldn’t comply. We have a handful of examples of troops refusing orders from very close in the command hierarchy to commit overt inarguable war crimes. We have more examples to the contrary.

    If they get the order from someone just up the chain to torch a subdivision and napalm the children, it’s a coin toss. If it’s the presidents policy, and they’re just relocating people? Bit risky not to comply.

    Is this uncharitable to the troops that a lot of people have high ideals will behave morally as regards legal and illegal orders? Most definitely. But also, they napalm civilian targets, torch villages and have literally rounded up Americans and our them in camps before, without due process. It’s not even a novel situation.





  • You actually can. The simplest way is to literally just give the research away and charge a fair price for the medicine. That’s allowed.

    The slightly more capitalist way would be to sell the rights to the government to recoup costs.

    The slightly less capitalist way is for the government to notify you that you don’t own it anymore because of the public good.

    This is also ignoring exactly how much the public already funds the basic research that goes into pharmaceuticals, which is quite a bit more than you might expect, so the argument of what’s even “fair” is less clearly in favor of the company than you might expect.


  • So, you’re going to run into some difficulties because a lot of what you’re dealing with is, I think, specific to casaOS, which makes it harder to know what’s actually happening.

    The way you’ve phrased the question makes it seem like you’re following a more conventional path.

    It sounds like maybe you’ve configured your public traffic to route to the nginx proxy manager interface instead of to nginx itself.
    Instead of having your router send traffic on 80/443 to 81, try having it send the traffic to 80/443, which should be being listened to by nginx.

    Systems that promise to manage everything for you are great for getting started fast, but they have the unfortunate side effect of making it so you don’t actually know what it’s doing, or what you have running to manage everything. It can make asking for help a lot harder.


  • You’ll be fine enough as long as you enable MFA on your Nas, and ideally configure it so that anything “fun”, like administrative controls or remote access, are only available on the local network.

    Synology has sensible defaults for security, for the most part. Make sure you have automated updates enabled, even for minor updates, and ensure it’s configured to block multiple failed login attempts.

    You’re probably not going to get hackerman poking at your stuff, but you’ll get bots trying to ssh in, and login to the WordPress admin console, even if you’re not using WordPress.

    A good rule of thumb for securing computers is to minimize access/privilege/connectivity.
    Lock everything down as far as you can, turn off everything that makes it possible to access it, and enable every tool for keeping people out or dissuading attackers.
    Now you can enable port 443 on your Nas to be publicly available, and only that port because you don’t need anything else.
    You can enable your router to forward only port 443 to your Nas.

    It feels silly to say, but sometimes people think “my firewall is getting in the way, I’ll turn it off”, or “this one user needs read access to one file, so I’ll give read/write/execute privileges to every user in the system to this folder and every subfolder”.

    So as long as you’re basically sensible and use the tools available, you should be fine.
    You’ll still poop a little the first time you see that 800 bots tried to break in. Just remember that they’re doing that now, there’s just nothing listening to write down that they tried.

    However, the person who suggested putting cloudflare in front of GitHub pages and using something like Hugo is a great example of “opening as few holes as possible”, and “using the tools available”.
    It’s what I do for my static sites, like my recipes and stuff.
    You can get a GitHub action configured that’ll compile the site and deploy it whenever a commit happens, which is nice.


  • Vpns and casting create a complicated network situation sometimes. Without being able to see exactly what was going on, it can be difficult to tell what’s happening.

    Sometimes casting involves sending the data from the controller, your laptop, to the renderer, your TV. That means you laptop pulls the data down and then forwards it.
    Sometimes it involves telling the renderer how to get the data so that it can pull it down and play it.

    When you use a VPN, you’re sending your traffic through a tunnel so that it’s “outside” your local network. There will be some exceptions for certain local behavior that needs to be local, unless you configured it not to but you probably didn’t.

    It’s honestly curious that it ever works, since the VPN should make it so you’re basically “not there”, and so casting shouldn’t be possible.

    My recommendation would be to use Plex if it works.
    Download on the VPN and then drop off to cast it is an alternative.

    There’s enough moving parts that you’re not going to have any fun figuring it out, and the answer will probably be something you can’t fix.