

ok doomer
ok doomer
I remember you were worried about your ISP messing things up for you, hence the VPN. I would recommend creating a “Virtual Machine” that does all of your downloading to whatever hard drive you’re using. That VM can have proton installed. Then, on your regular computer (not within the VM), you can host Jellyfin with no VPN involved, making it accessible at 192.168.0.xx.
I think this hits your goals without needing to expose Jellyfin to the Internet. Plus it has minimal technical complexity. Your downloading traffic will be VPN protected, but Jellyfin will still be accessible to your local network.
edit: You can set up a password for Jellyfin, protecting it from your internal threats.
edit2: You can use letsencrypt to create a certificate that picky clients will accept. Buy a domain, any domain, and configure the “A record” to point to 192.168.0.xx (your Jellyfin IP). Then tell your client to go to whatever domain you get, like “luigiliterallydidnothingwrongplzfree.com”, then the client will have to use the internet to ask DNS what the IP address is, but after that, it will just use your local network.
edit3: Since you just have the raspberry PI, instead of using a Virtual Machine, you could have 2 separate SD cards. One only has the downloader and VPN installed, the other only has Jellyfin installed (no VPN). Then swap as needed.
I find this hard to believe, because surely they’ve rushed past the point where it kinda horseshoes around and accidentally starts stabilizing, right?
“Jeanne Price said her daughter, who was a new employee, made attempts in July to secure time off, but either didn’t qualify or was told she’d have to wait. Two business days after she notified her supervisors that she planned to apply for disability leave, they fired her.”
That’s not true, and it’s frustrating to see such confidence coming from someone who’s really active in the community. I’ve pasted the whole thing, section 2, article 19 of the state constitution. I’ll add section 20 for context, so you can be certain that “bill” does not somehow mean initiative.
SECTION 19. BILL TO CONTAIN ONE SUBJECT
No bill shall embrace more than one subject, and that shall be expressed in the title.
SECTION 20. ORIGIN AND AMENDMENT OF BILLS
Any bill may originate in either house of the legislature, and a bill passed by one house may be amended in the other.
I continue to be reaffirmed in my belief that this is one of the greatest constitutional protections in the modern world. “No bill shall embrace more than one subject, and that shall be expressed in the title” 10/10, no notes.
I’m glad Europe is getting more united! Thanks for providing hope to my broken American heart
And what of his co-pilot?
I agree that straight up using Tailscale would likely be easier. But to answer your question, you’re looking to “push routes” because what you actually want to do is “route” but that’s kinda hard to Google haha. This looks maybe promising: https://forums.freebsd.org/threads/wireguard-how-to-route-another-subnet-through-it.89744/
This approach largely works, with the caveat that it then requires you to always be on the tailnet. If someone wants to connect locally AND via tailnet using the same URL, they’ll need to push/advertise routes (or do some other hacky thing)
Right now, I’ve only got the spoons to provide rough guidance, not details. In order to use non-tailnet IPs, you’ll need to configure your tailnet host to “advertise routes/push routes”. In more laymen terms, tailnet needs to say, “hey network client, I do know where 192.168.0.69 is! So I can route that request”. By default, each tailnet host only advertises the other tailnet hosts. Anything else fails.
Also, I really appreciate how detailed your question is!
Former President of the free world. imo, that title now rests with Ursula von der Leyen
Are there examples of neutral news sources that you like?
Well, if the Republicans hate it, it’s probably reasonable. Let’s check the article. “It would require the Secretary of State’s Office to check addresses during the signature verification process and it would require signature gatherers to sign a declaration on each sheet of signatures they collect.”
That’s basically the smallest, least intrusive thing that can be done to prevent fraud. It’s kinda wild that wasn’t already in place, but that probably explains the ease with which unpopular, right-wing, corporate-sponsored initiatives have been ending up on the ballot 🙄
idk if this is a programming specific question. It feels more like “perfectionism” or a low-level OCD. For the programming piece, using some sort of task tracking system might be helpful. For example, after a task has been completed (aka a solution was found), move on to the next predefined task.
Another vaguely related term: premature optimization
To add, here’s an example of my OpenVPN config addition to ensure 192.168.3.* is accessible over VPN
verb 5
push "route 192.168.3.0 255.255.255.0 vpn_gateway"
I think it shows that they’re taking on standard combat roles. The alternative could be them strictly filling non-combat roles, such as logistics/cargo transportation or engineering-type work like building trenches and other fortifications.
We can do better than prison rape jokes :/
The idea is to disrupt the visual (and possibly thermal) signature to make automated targeting less effective