• 0 Posts
  • 10 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle

  • FrederikNJS@lemm.eetomemes@lemmy.worldThat owl is a menace
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    2 months ago

    Yeah, it demotivated me too with the limited lives… If you still want Duolingo, I can mention that it has regional pricing, so you only need a VPN server in India to get it much much cheaper.

    But it’s understandable if you don’t want to support those kinds of business practices in any way.



  • The depth perception also makes quite a difference. The side of your face can clearly be seen in a mirror to be the side of your face, but depending on lighting, the side of your face can look as if it’s part of the front of your face in a picture as you don’t have the depth perception. The result is that photos make you look fatter than your mirror image would.



  • As the other poster said, both Zigbee and Zwave devices do not talk to the Internet. They can’t even connect to your Wi-Fi anyway. They need to connect to a device that acts as a router but specifically for Zigbee or Zwave, usually called a Hub or Coordinator.

    There’s many different hubs around. Many commercial ones do indeed connect directly to the WiFi and therefore internet. But nothing is stopping you from buying a USB Dongle Hub with open source firmware and plugging it into a Raspberry Pi, if you want to eliminate the potential spying.

    The Zigbee and Zwave networks inherently cannot communicate with the Internet. So the only risk of spying is if you installed something in the Raspberry that spies on you.

    Both Philips Hue and IKEA Trådfri and many other vendors simply use Zigbee, which means you can bring your own Hub and completely eliminate the risk of spying.





  • I really don’t see much benefit to running two clusters.

    I’m also running single clusters with multiple ingress controllers both at home and at work.

    If you are concerned with blast radius, you should probably first look into setting up Network Policies to ensure that pods can’t talk to things they shouldn’t.

    There is of course still the risk of something escaping the container, but the risk is rather low in comparison. There are options out there for hardening the container runtime further.

    You might also look into adding things that can monitor the cluster for intrusions or prevent them. Stuff like running CrowdSec on your ingresses, and using Falco to watch for various malicious behaviour.