Is docker virtualized or otherwise emulating something? It’s just a way to package things, like an installer? Then it’s bare metal.
I had to look this up too, I thought docker containers were virtualized.
Is docker virtualized or otherwise emulating something? It’s just a way to package things, like an installer? Then it’s bare metal.
I had to look this up too, I thought docker containers were virtualized.
That would make sense if the cause is some looping from hanging DNS lookups. Someone should (and likely has) notified the devs about this.
Another possible solution, from https://help.nextcloud.com/t/server-hangs-and-then-is-fine-for-a-bit-then-hangs-again/153917/16
Works fine on Boost.
I tried Sync for a couple hours before I uninstalled.
In theory, if I were to use an online solution, bad actors wouldn’t be able to pull my vault from memory.
It’s the same issue once you login to your vault via browser extension. They have to download your vault locally on login to decrypt it when you enter your password anyway*. Even if they don’t store your vault password in memory, they either store the entire vault (unlikely for size reasons) or a more temporary key to access the vault. Local compromise is full compromise already.
*If they don’t, then they either made a giant technological leap, or they’re storing your passwords on a simple database on their servers and that’s not what you want from a password manager.
Yup, I have been using KeePassXC locally since (one of) the first big LastPass breaches. I thought “password manager company… they know encryption” and then kept some of the most important things stored in my vault including notes of Bitcoin seedphrases etc. Thought "even if they get hacked, they wouldn’t let anyone exfil the huge amount of data from the USER VAULT SERVER… thought “my passphrase is like 25-30 chars long, nobody will crack that”…
5 years after my last login and I find out the breach happened, user vaults were exfil’d, the encryption was absolute shit, and the notes weren’t even encrypted.
I don’t trust cloud companies to keep promises or know what they’re doing today. and anything self-hosted isnt Internet accessable unless it’s on dedicated hardware subnetted off and wouldn’t matter if it got hacked.
Curious if their proxy host was cloudflare or DDoS-Guard (Russian) or even a lesser known service.
They’re just smartphone apps as a way to interact with Lemmy, versus visiting it in a browser. If you mostly use Lemmy on desktop, search ‘lemmy frontend’ for other options.