Puedo comer vidrio, no me hace daño.
- 0 Posts
- 41 Comments
- CumBroth@discuss.tchncs.detoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•FFS can we stop it with this Atmos Vision BSEnglish5·4 months ago
Did you mean to say Dolby Vision?
Certified Mark Fisher moment.
- CumBroth@discuss.tchncs.detoSelfhosted@lemmy.world•What p2p software do you host?English3·7 months ago
Using Nicotine+ on my server. https://github.com/fletchto99/nicotine-plus-docker
- CumBroth@discuss.tchncs.detoSelfhosted@lemmy.world•What p2p software do you host?English15·7 months ago
Soulseek, among others. Putting my ~400 GB classical music collection out there.
- CumBroth@discuss.tchncs.detoSelfhosted@lemmy.world•Need help routing Wireguard container traffic through Gluetun containerEnglish1·1 year ago
Gluetun likely doesn’t have the proper firewall rules in place to enable this sort of traffic routing, simply because it’s made for another use case (using the container’s network stack directly with
network_mode: "service:gluetun"
).Try to first get this setup working with two vanilla Wireguard containers (instead of Wireguard + gluetun). If it does, you’ll know that your Wireguard “server” container is properly set up. Then replace the second container that’s acting as a VPN client with gluetun and run tcpdump again. You likely need to add a postrouting masquerade rule on the NAT table.
Here’s my own working setup for reference.
Wireguard “server” container:
[Interface] Address = <address> ListenPort = 51820 PrivateKey = <privateKey> PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE PostUp = wg set wg0 fwmark 51820 PostUp = ip -4 route add 0.0.0.0/0 via 172.22.0.101 table 51820 PostUp = ip -4 rule add not fwmark 51820 table 51820 PostUp = ip -4 rule add table main suppress_prefixlength 0 PostUp = ip route add 192.168.16.0/24 via 172.22.0.1 PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE; ip route del 192.168.16.0/24 via 172.22.0.1 #peer configurations (clients) go here
and the Wireguard VPN client that I route traffic through:
# Based on my VPN provider's configuration + additional firewall rules to route traffic correctly [Interface] PrivateKey = <key> Address = <address> DNS = 192.168.16.81 # local Adguard PostUp = iptables -t nat -A POSTROUTING -o wg+ -j MASQUERADE #Route traffic coming in from outside the container (host/other container) PreDown = iptables -t nat -D POSTROUTING -o wg+ -j MASQUERADE [Peer] PublicKey = <key> AllowedIPs = 0.0.0.0/0 Endpoint = <endpoint_IP>:51820
Note the NAT
MASQUERADE
rule.
- CumBroth@discuss.tchncs.detoAsk Lemmy@lemmy.world•What do you use AI/LLMs for in your personal life?162·1 year ago
Among other things: Cooking. They’re really helpful in those situations where I have a bunch of ingredients lying around in my pantry but I lack concrete recipes that can make a proper meal out of them.
- CumBroth@discuss.tchncs.detoAsklemmy@lemmy.ml•Do you still get the "it's Friday!" feeling?3·1 year ago
Not since I’ve started working from home.
- CumBroth@discuss.tchncs.detoSelfhosted@lemmy.world•So SBCs are shit now? Anything I can do with my collection of Pis and old routers?English1·1 year ago
deleted by creator
- CumBroth@discuss.tchncs.detoAsklemmy@lemmy.ml•Is it just me, or have the comments on Lemmy become extra aggressive over the past 3 months?5·1 year ago
test, spoiler test
eueaouaoeuaoeuaoe
The syntax is a bit confusing. You need to leave the first “spoiler” untouched. You can delete the second “spoiler” to set the title, and then replace the three underscores ___ with your text:
"
::: spoiler my-title
my-text
:::
"
Edit: Looks like most apps don’t support this and this spoiler markdown only works in the browser.
Is… is this a Raphaël reference?
I set it up manually using this as a guide. It was a lot of work because I had to adapt it to my use case (not using a VPS), so I couldn’t just follow the guide, but I learned a lot in the process and it works well.
- CumBroth@discuss.tchncs.detoSelfhosted@lemmy.world•Have you tried LocalGPT PrivateGPT or other similar alternatives to ChatGPT?English2·1 year ago
I’ve tried both this and https://github.com/jmorganca/ollama. I liked the latter a lot more; just can’t remember why.
GUI for ollama is a separate project: https://github.com/ollama-webui/ollama-webui
- CumBroth@discuss.tchncs.detoTechnology@lemmy.world•Gamers enraged at Ubisoft for injecting ads into the middle of video gamesEnglish2·2 years ago
deleted by creator
- CumBroth@discuss.tchncs.detoTechnology@lemmy.world•Firefox will support at least 200 new extensions on Android this DecemberEnglish121·2 years ago
I wish they would carry on the momentum and also finally support hardware keyboard shortcuts. This is the one thing that’s killing Android tablets for me (I’m not willing to use a Chromium-based browser): https://connect.mozilla.org/t5/ideas/need-more-physical-keyboard-support-for-firefox-mobile-on/idi-p/3836
Issue is being tracked here: https://bugzilla.mozilla.org/show_bug.cgi?id=1794664
Anschluss 2 when?