thick stews/curries have some base ingredient which is the reason why they're thick.
If you're talking French food, you would start with a roux. That's butter and flour cooked in the bottom of the pan until it browns. Then the liquid is added while folding and stirring to try to minimize lumps.
If you're a American vegan punk, you might make your curry out of squash. boil or roast a butternut and huck it in a blender with some olive oil.
Others may use full fat yogurt, coconut milk, mashed tubers, mashed legumes, etc.
Powder mashed potatoes can be a quick fix maybe ?
And then there's cornstarch which I would view as more of a last resort or a final slight adjustment at the end.
A small amount of corn starch is added to a small cup. Cold water is mixed in until it's fairly homogenized and there's no lumps. And then the mixture is poured into the hot soup while stirring.
@handle I just first try rolled "kinda awake viper chap" Which sounds like it was not randomly generated, but it actually was
🐍🎩
@handle I solved the "how do you generate a secure password" problem by just writing the code myself.
https://pwm.sequentialread.com/
Obviously, that's not something that the average person can do, but I hope at least that I'm improving the situation by publishing my result.
Sometimes I don't even use that thing though. I just think up random words. it will be some word or weird train of thought that comes from something that happened that day or from a news article that I saw that day. And after I choose a word, then I start over and try to find another separate source of something random to choose a word based off of.
I'm sure that this produces slightly less entropy than a dice roll would, but honestly, I don't think it really matters. I don't think anyone brute forces these kinds of things.
@handle Diceware is for encryption key seeds imo.
Guess and check style passwords, like a debit card pin, don't actually need to have that much entropy in them. They just need to not follow obvious patterns and to be unique. And unfortunately, they also need to be flexible enough to adhere to whatever stupid draconian password policy will be forced on the user.
If I was going to teach someone one thing about passwords, I would probably teach them Password Manager + paper backup. Am I cheating? Is that two things? I don't know. If I had to cut it down to one thing I might choose paper.
Also, I definitely should have put a disclaimer that I know almost nothing about this. This is telephone between multiple people and so a lot of this information is probably inaccurate.
I have a radio friend who went to Defcon and kind of saw the meshtastic / meshcore controversy happening in real time.
Basically, some furries out that the security model of meshtastic is similar to using SSH where you always assume that the server certificate is correct and you never check it. In other words, as soon as someone starts trying to man in the middle and lie about what the server certificate is, then the security of the entire system crumbles and it might as well be plain text from the perspective of the attacker.
These furries were motivated by the way that the meschtastic project has become more and more proprietary and started lashing out open source developers that were building anything which would be compatible with their proprietary stuff. So this proof of concept to DEFCON and were able to take over the entire meshtastic network that was present at DEFCON.
How much this security issue matters in practice is up for debate... But just like with SSH, properly tracking all of the known host keys and never accepting any of them automatically has a serious burden on the usability.
For example, a lot of quote-unquote enterprise grade tools like Terraform have the same exact vulnerability. By default and without warning they always accept whatever host key the SSH server provides.
Anyways, my friend would probably recommend Meshcore because it's developed in the open by furry hackers who are not trying to gatekeep and make money from it. But that said, it's obviously much more of a "some assembly required" type scenario. You won't be able to connect to anyone else until you add their key.
That might seem extremely detrimental, but honestly, in my opinion, these radio mesh networks are kind of jank and don't really make sense compared to a hub and spoke radio network architecture. Maybe that's because I'm having a different idea about where the usage of these networks is going....
Oh, yeah, one last little tidbit about meshtastic.
I've heard from the same friend that a lot of meshtastic products which you can buy are based on microcontrollers. The bandwidth that these things have is so limited that it's trivial to completely DOS all of them with just a single Linux computer that's running on a real CPU and sending packets. Sometimes, with enough of them in a network, they can even DOS themselves. And then you have to bring in a faster computer with a real CPU into the network to handle all of the packets and send acknowledgements and stuff, otherwise it'll stay stuck forever.
You probably already know about this, but If you ever do reinstall your wifes win 11, its possible to do it without linking it to an online account. I managed that on my win 11 and glad I spent the time to figure it out.
https://pureinfotech.com/bypass-internet-connection-install-windows-11/
The detour starts by making sure the computer is not connected to ethernet,
and then at the “Oops, you’ve lost internet connection” or “Let’s connect you to a network” page, instead of connecting, use the “Shift + F10” keyboard shortcut.
Then you type the magic word OOBE\BYPASSNRO
and it will restart, this time giving you an option for "I don't have internet" and end up creating a local account
What's so slow ? It looks like its supposed to be doing the build cache thing right ?
I dream of CI that is instantaneously fast just like how local development can be... Esp with go incremental builds
Spaceys
20xx
Wombo c
Whr uat
The most interesting thing about the Charlie Kirk shooting is how the unredacted Epstein files still have not been released.
@notplants idk, I guess I kinda felt like since bitcoin was first it might make sense to use that one for something as foundational as DNS. Like a bet on which one will be around the longest. But maybe that question is irrelevant now for bitcoin and ethereum since the answer is probably "if one will live, so will the other". Maybe I wrote this after the big ETH drama and hard fork idk lol
@notplants er, I should say, namecoin as best _purely technical_ solution, more realistic solutions will probably be more akin to private trackers or algospeak on social networks, social solutions
@notplants I think the story with ATProto was supposed to be that the identities were DIDs, which means you can use DNS for your identity, but you can also use multiple other pluggable DID interfaces. But it sounds like they very quickly bailed on that when building the app, requiring things like HTTP since they "just work"
I think people justifiably have soured on entirely p2p systems not named bittorrent. Because so many of them have been developed and then instantly failed, like, they basically won't turn on or they won't connect or they just appear to not do anything. As far as I know, the unfortunate reality is there just aren't any public & censorship resistant name systems that work reliably. (Zooko's triangle)
If you can tolerate the name being non-human readable, then it works fine, like a magnet link. Magnet links are... they work every single time.
I personally believe that namecoin is probably the best attempt to solve this problem. However, I gave up on using it after my namecoin names expired, I forgot to renew them, and they were stolen by a squatter. wrote about it long ago here:
https://sequentialread.com/how-to-register-a-namecoin-bit-domain-with-electrum-nmc/
Maybe one day it would be nice to have a comprehensive full suite of software and services that would make namecoin usable. I always kind of planned on trying to build that stuff... But I convinced myself that it was more important to make servers usable as they are first to create a jumping-off point for independent publishing, kind of like what you're working on right now. And then after I feel comfortable with that, then I would consider looking into improving the usability of namecoin.
@notplants To be fair, everything else except for the super hardcore peer-to-peer networks like nostr and SSB have that problem. It's particularly bad for activity pub where the domain name is in the ID of every single object.
I suppose it's not much of a consolation, but DNS is not strong censorship. Its easy to circumvent for those who seek and desire.
We already have to circumvent DNS censorship regularly; If you want to download Circuit Board diagrams for obsolete TVs or something you will probably need to bypass DNS censorship. ICE bragged about censoring 8 million domains in a year iirc.
LZ Config Day v2 and Grilling
<p>Layer Zero, Sunday, September 28 at 01:00 PM CDT</p><p>Round 2 of LZ/Cyberia configuration day and grilling</p><p></p>
https://calendar.layerze.ro/event/lz-config-day-v2-and-grilling
I am a web technologist who is interested in supporting and building enjoyable ways for individuals, organizations, and communities to set up and maintain their own server infrastructure, including the hardware part.
I am currently working full time as an SRE 😫, but I am also heavily involved with Cyberia Computer Club and Layer Zero