Applying AI-voodoo to a non-existing problem with unknown side effects? Sign me up!
Applying AI-voodoo to a non-existing problem with unknown side effects? Sign me up!
It’s not. Image hosting sites have existed for decades. Websites are not liable unless they have actual knowledge of illegal content and ignore takedown requests. Stop fearmongering.
While it’s stupid that ISPs are using their monopolies to screw consumers, the concept of data caps is not as stupid as you might think.
You’re not just paying for the connection between you and the ISP, but also all the other data links that get your internet traffic to its destination. For example, those cables across the ocean are owned third parties and they charge money for every byte that goes through. It wouldn’t be unreasonable for ISPs to pass that cost to users.
Furthermore, most links are overprovisioned in order to keep costs down. For example, if you assume that users only use 10% of their bandwidth on average, that means you can fit 10x as many people on a connection (or maybe 8x to account for peaks). This does mean that users should be discouraged from using their full bandwidth for long durations, otherwise the network operators can’t overprovision as much and have to invest more in infrastructure.
Just so you know, this also creates more load on other instances, especially the larger ones.
Never repeat anything 👍
Yes, that was what I was referring to. However, this is assuming that Lemmy has properly implemented webfinger and doesn’t store direct links (which I haven’t checked).
Alternatively, you could proxy all requests with application/activity+json
in the Accept
or Content-type
headers.
You can, but other servers will not recognize it as the same server.
There are however ways to run your server on a subdomain and make it appear as if it’s still the original domain. Is that what you’re looking for?
Yes, it is generally a good idea to put internet-facing servers on a network that is separated from the local network. The point of this is not to minimize their attack surface (since they are already connected to the internet after all) but to prevent them from being used as a stepping stone for attacks on your internal network. To make this effective, you should block traffic from the internet-facing network to the rest of your network and treat it as potentially untrusted.