

It’s 3.6GB upload though, which doesn’t make much sense for a firmware update. The download usage was 96MB. But I agree that’s it’s probably something failing and retrying.


It’s 3.6GB upload though, which doesn’t make much sense for a firmware update. The download usage was 96MB. But I agree that’s it’s probably something failing and retrying.
My Mikrotik routers and switches also reboot in seconds (even for upgrades), which I’ve never seen consumer gear do!
Even my Ubiquiti switches seem to take a minute or so to start forwarding traffic after a reboot; whilst my Mikrotik switches reboot faster than any of my unmanaged switches start up.


Cloudflare usually blocks ‘unknown’ bots, which are basically bots that aren’t search crawlers. Also I’ve got Cloudflare setup to challenge requests for .zip, .tar.gz, or .bundle files, so that it doesn’t affect anyone unless they download from their browser.
There’s also probably a way to configure something similar in Anubis, if you don’t like a middleman snooping your requests.


I just used a bot to read it: https://web.archive.org/web/20250901133211/https://cheapskatesguide.org/articles/debian-netinstall-waf.html
It shouldn’t be because you’re not actually the owner of the IP address. If any user could get a cert, they could impersonate any other.
They’re ‘shortlived’ 7 day certs, verified using a HTTP challenge. It doesn’t matter who owns the IP, it’s just a matter of who holds the IP.
It doesn’t look like the normal boot log for Linux (or FreeBSD), so I’m not sure what it is either.
Pretty sure they’re talking about why the meme says, ‘WINDOWS’, ‘LINUX’, and ‘ios’.


Cert pinning is pretty uncommon in the self hosting community though, especially when both Cloudflare and Let’s Encrypt have a 90 day validity period and often renews after 60 days.


Uhh, this might be true for WebRTC, except not much uses WebRTC other than for realtime streaming/calling. Jellyfin for example is just an mp4 stream over http; and http(s) will only use the IP in the DNS record. I’d like to see a packet capture if you are certain something is switching IP.


I’m pretty sure QWERTY telegraph keyboards post-date typewriters.
Yeah they do! Actually a Japanese research paper (and this video) also theorises that they also grouped similar sounding letters in American Morse Code together (e.g. Z ∙ ∙ ∙ ∙ & SE ∙ ∙ ∙ ∙, or C ∙ ∙ ∙ & S ∙ ∙ ∙)
Yeah, YunoHost explains why http://localhost:8536/ wouldn’t be working. If cloudflared and Lemmy are in separate containers you have to put an actual IP in, since localhost points to the container itself.
How are you accessing it without Cloudflare? How do you know that Lemmy is actually listening?
What’s the URL you using to access it without Cloudflare?
Edit: Also that curl tells me it’s not listening on that IP/port.
Can you access it without Cloudflare?
Does curl http://localhost:8536/ work?
You are using cloudflared right? Because normal (non-cloudflared) Cloudflare doesn’t support port 8536.


With dynamic DNS? Yeah it always has, as long as you can host a http server.
With a dynamic IP? It should do, the certs are only valid for 6 days for that reason.


I know this seems pretty much solved, but I just wanted to point out:
Frigate doesn’t need a TPU, OpenVINO is quite performant even on decade old Haswells, or if you’ve got a GTX 750 or higher you might be able to use that as well.
No it’s real! I can’t verify the exact rating since it OL’s my meter, but with some circuitry it can power my Pi for a few minutes. I got them from element14, so it’s unlikely to be a fake product.


You can host a page with an iframe, but you can’t directly change the DNS record to point to something that isn’t GitHub.
Guys you’re not gonna believe this:

Misunderstanding aside, thanks for the link!