Why would it be a security risk?
Why would it be a security risk?
I don’t see how it’s a privacy risk since you’re not exposing your IP or anything. Likewise the images are already uploaded to your servers, so there’s no extra privacy risk for the uploader.
You can actually run it in async model without pictrs safety and just have it scan your newly uploaded images directly from storage. It just doesn’t prevent upload this way, just deletes them.
You don’t get public traffic redirected. It’s not how it works
It stops doing checks. Iirc you can configure it yes
https://github.com/db0/fedi-safety and the companion app https://github.com/db0/pictrs-safety which can be installed as part of your lemmy deployment in the docker-compose (or with a var in your ansible)
Not all web traffic, just the images to check. With any decent bandwidth, it shouldn’t be an issue for most. It also setup in such a way as to not cause a downtime if the checker goes down.
The software is setup in such a way that you can run it on your pc if you have a local gpu. It only needs like 2 gb vram
Ye, generally I would only use njalla for discardable services and domains.
Ye, going for extreme privacy like this has these kind of downsides.
Wait, if they suspended your domain, can you even transfer it away? if not, that’s really fucking scary.
I don’t have good interaction with them either, but nothing as bad. I used one of their VPS to hold the reverse proxy for my lemmy instance like a year ago. Randomly it went down and the support was non-existent. Eventually it came back on its own after some days but I had already moved everything away from them
Invest in some poster hanging strips, mate ;)
Ye pretty much. I was just quite astounded at that statement as the AI Horde is basically just a lot of python processes behind a very low powered haproxy server.
Personally, I understand people like to stay with the familiar, which is perfectly fine for a non-demanding service, but when something becomes demanding, I find the haproxy specialization serves better. I wish lemmy deployment by default utilized haproxy myself.
Not sure why you say haproxy can’t serve python. I do it all the time. You just use something like python waitress and then point haproxy to it’s port.
Ye this idea I would like to expand on. Start with a normal size canvas and let it run normally for 24h. After 24h, have a new 1px empty line appear on the bottom every 3 minutes or so while the highest 1px line becomes read only. Keep doing this until the event ends.
This will in turn cause a canvas that keeps expanding downwards but previous creation are “locked in” slowly.
From the matrix chat, it’s not an alt. Just a no-lifer.
Ah simple enough. Should be possible to identity simple alts (same name, different instance) through this.
Is there a way to see one’s own amount?
You mean an exploit payload embedded in an image, and pwning a system parsing that image through python PIL? While there’s never a 100% chance of anything, you’re more likely to be struck by lightning than this coming to pass and at that point you’re at more security risk at using the internet altogether.