Show newer

@owncast

My friend once said: A lot of what looks “whoa how did you do that?!” comes down to “sat down and did all the 500 steps, one by one”.

Want to watch me slowly do steps one at a time? I'm trying to get back to streaming my work regularly. Live now working on making email servers radically easier to self-host! stream.sequentialread.com

Streaming stream.sequentialread.com/

Music today: 🎸🥁 Sleater-Kinney 👩🏻✊🏻 Working on for-fun social media app project.

Stop by and say hi!

It would be nice to have more ips, like with IPV6, but that **ON ITS OWN** is not going to make it easier...

Er, I should say, impossible without "external help" for routing/bandwidth.

@peter

Internet protocol is all about routing and transferring, it says nothing for authenticity or integrity so the question of who owns it is only relevant when it comes to gatekeeping and rent-seeking routability... By my estimation, its already possible to use software to defeat this routability rent-seeking as long as the protocols you are using have been updated since the 80s and 90s (they are wrapped in TLS OR they can tolerate alternative ports).

Honestly, usability/ease of use/maintainability is the primary problem that potential server operators face. It would be nice to have more ips, like with IPV6, but that's not going to make it easier for folks to host servers safely and reliably. How do you expect my mother to understand both numbers AND letters for her server's address!? 😲😲

IMO its more scary that mobile networks (most internet users) tend to employ symmetric NAT & most mobile device computing is purely consumption oriented as a result, making mobile production impossible.

@f0x Thats really cool, I wanna try out gotosocial soon with the svelte-based standalone UI, i forgot the name of it.

@f0x are you working on somethting for gotosocial?

my techbro shit reaction:

what's the point of TLS if some CAs/DNS operators somewhere own all the keys to kick folks off the network, impersonate them, etc?

Obviously cloudflare is worse because its impossible tell how much they are processing/recording your traffic, while bona-fide attacks against TLS/x.509 are harder to hide..

at any rate, trying to make my own mini cloudflare service where the user exclusively owns the keys, and maybe has automated monitoring to spot the x.509 authority attacks if/when they happen 😬

my favorite co-host decided to join me today. he blends into my shirt lol

Show thread

this is my kid, millisecondsSinceUnixEpoch. He's a real straight-forward lad

@f0x It might be illuminating to collect a metric for "cache misses caused by previous cache evictions". You would just have to store the cache keys for longer than the actual cache entries, or something.

Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.