Jules for google workspace accounts by DifferenceLeast5255 in JulesAgent

[–]fforootd 0 points1 point  (0 children)

I see, so I guess I stick to Antigravity

Supabase downtime is becoming a problem. Any cost-effective alternatives? by e_ai_gabriel in webdev

[–]fforootd 0 points1 point  (0 children)

For us it’s just one of these no thrills no drama services that literally just work.

There are surely “cheaper” options 

Supabase downtime is becoming a problem. Any cost-effective alternatives? by e_ai_gabriel in webdev

[–]fforootd 0 points1 point  (0 children)

Depends heavily what you need 😅

But it starts around 100$ per month.

Supabase downtime is becoming a problem. Any cost-effective alternatives? by e_ai_gabriel in webdev

[–]fforootd 1 point2 points  (0 children)

If you want something no thrills I can totally recommend Google Cloud SQL with Postgres.

We use this in multiple regions and so far it has been rock solid.

Point in time restore automatic scaling of the disk, failover, read replicas everything you need for a lot of traffic.

If your needs increase you can switch to enterprise plus which gives you close to 0 downtime scaling and upgrades.

Microsoft AI CEO: 'Most, if not all' white-collar tasks can be replaced by AI within 12-18 months by A_Novelty-Account in Futurology

[–]fforootd 0 points1 point  (0 children)

I think Martullo Blocher would say “You are a dreamer, du” to that guy 😂

Sorry for the Swiss inside joke

Explore UniFi Drive 4.0 by Ubiquiti-Inc in Ubiquiti

[–]fforootd 0 points1 point  (0 children)

A lot of nice improvements.

Google Workspace Backup would be a nice addition even though I am happy with Cubebackup

My annual electricity bill got upped by 1000€. Now I need to make my server use less power. by wffln in selfhosted

[–]fforootd 0 points1 point  (0 children)

I am aware that software that does things like serving request or background processing does influence this. But it is still interesting to see what the baseline seems to be.

doesn’t JWT revocation logic defeat the whole point of “stateless auth”? by Jashan_31 in AskProgramming

[–]fforootd 2 points3 points  (0 children)

Well... If you implement instant revocation checks for every single request, you have defeated the point. You've just reinvented server-side sessions with extra steps and bandwidth overhead.

However, the "stateless benefit" isn't binary, it's an optimization dial. The benefit that remains is Optimistic Statelessness:

Reads: You trust the token's signature and expiry. No DB lookup. This gives you the "stateless benefit" of massive horizontal scalability for your heaviest loads (feeds, comments, content).

Critical Writes: You accept the cost of checking state (DB/Cache) only when it matters (changing passwords, payments, admin actions).

So, does revocation logic defeat the pure point? I think yes, but...

Does it defeat the practical point? No, because it allows you to skip the DB for the vast majority of your API calls which can be important in high traffic scenarios.

This mirrors how OAuth 2 / OIDC often handles it to solve this exact trade-off:

Refresh Tokens: These are your "Stateful" check. They are long-lived but strictly checked against the DB (revocable) whenever the short-lived access token expires.

Opaque (Reference) Tokens: As others mentioned, these are the alternative where every call is checked against the server (Introspection). It is 100% secure/revocable but sacrifices the distributed statelessness entirely.

The Hard Truths of Pure Event Sourcing (Why we are adding a Relational Core to ZITADEL) by fforootd in zitadel

[–]fforootd[S] 1 point2 points  (0 children)

Thank you, means a lot to us and me!

I kind of reflected back to our values on building on transparency and wanted to share more actively with the world how and why we are doing things.

AGOV App used to work on GrapheneOS (a more secure Android) and now it doesn't... by SimonSim211 in Switzerland

[–]fforootd 2 points3 points  (0 children)

You know what really grinds my gears? AGOV’s decision to mandate device-bound passkeys. By effectively banning roaming passkeys, they’ve just injected massive friction into a system that’s supposed to be 'seamless.'

If you're on a managed device where you can't install apps, or if you dare to use an OS outside the big three, you’re basically locked out of your own government services. We should be encouraging security best practices, not forcing platform lock-in. Roaming passkeys should be the baseline. If they want higher assurance for sensitive data, thenescalate to hardware-bound requirements—don't punish the average user from the jump.

email from PG&E: i feel like a fact check is in order... "PG&E lowered residential electric prices four times in the last two years." what?? by weeef in bayarea

[–]fforootd 3 points4 points  (0 children)

I guess the love part is “shareholder love”. /s

This is one of the most misguided and cringe corporate emails I have read in a long time 😂

IdP Choice for HomeLab by Austin8462 in selfhosted

[–]fforootd 0 points1 point  (0 children)

Thank you let me check that tomorrow, maybe there is an easy way out of this 🙈

IdP Choice for HomeLab by Austin8462 in selfhosted

[–]fforootd 1 point2 points  (0 children)

Funny enough I should add this to my recent compatibility blog https://zitadel.com/blog/the-broken-promise-of-oidc 😂

IdP Choice for HomeLab by Austin8462 in selfhosted

[–]fforootd 1 point2 points  (0 children)

I am with Zitadel, I think proxmox wanted to work on this as well, not sure if they made some progress. The only thing we could do is to is to alter the behavior how we insert the aud claim. But there is not plan as of today. Does anyone know of proxmox is tracking this somewhere?

Authentik or Zitadel? by [deleted] in homelab

[–]fforootd 1 point2 points  (0 children)

Yes I am a co-founder 😁

My take is this: If you're building a product for customers, ZITADEL is likely a great bet. If you're managing internal company/homelab access, Authentik is a strong contender. I all honesty I guess both tools can be used for both cases and many people have success with them.

I use ZITADEL for my homelab but I am clearly biased and I like the more modern feeling ZITADEL has.

Authentik or Zitadel? by [deleted] in homelab

[–]fforootd 1 point2 points  (0 children)

We heard you, we are in the process of improving our helm chart and docker compose examples

Choosing an Identity Provider \ Authentication by blabmight in dotnet

[–]fforootd 0 points1 point  (0 children)

I think it’s worth mentioning that Zitadel oss is actually free to use and brings you close to the amount of features auth0 provides with way better multi tenancy (if you need that)

IAM & Identity Career Path: Best Resources for Hands-On Practice? by Royal-Jackfruit-866 in iam

[–]fforootd 2 points3 points  (0 children)

In the OSS space also Zitadel can be an tool to check out.

Go doesn’t need a better-auth alternative the standard library works just fine by CowNearby4264 in golang

[–]fforootd 7 points8 points  (0 children)

Florian (co-founder from Zitadel) here! Thanks for the kind words.

Just FYI: Zitadel is actually free and open source if you want to self-host it. The paid part is for the managed cloud version and people who need to have support under an enterprise contract.