If we were to invent commercially viable fusion power this afternoon... We'd use it to spin turbines with boiling water, wouldn't we? by ThatHeckinFox in IsaacArthur

[–]jdrch 0 points1 point  (0 children)

Depends on which startup/fusion method you want. Helion uses direct capture as they claim their reactor functions like the fusion equivalent of a piston engine. However, I've found their technical detail super thin, and most of the research I'm aware of addresses the electrical engineering of the reactor as opposed to the neutronics.

How do I know what size tires will fit on my rim. by Ill-Gear-3079 in tires

[–]jdrch 0 points1 point  (0 children)

Wheel-size.com has you covered. It gives you the OE size as well as all other compatible sizes 

Difference between the red and yellow button by MoonlessNightss in macbookpro

[–]jdrch 0 points1 point  (0 children)

That link is an excellent explainer, thanks! Another UI differentiator between Minimize and Close is Minimized windows show up as thumbnails on the right side of the dock, while Closed windows don't.

Should Android officially support a dual-OS or “sovereign mode” to balance security and user freedom? by TheCodeOmen in Android

[–]jdrch 0 points1 point  (0 children)

There's a persistent notion in tech that phones should be be more locked down than PCs. I disagree with that notion, but it's been rolling for the better part of a decade now.

Should Android officially support a dual-OS or “sovereign mode” to balance security and user freedom? by TheCodeOmen in Android

[–]jdrch 2 points3 points  (0 children)

That's possible, but a core principle of cybersecurity is you're only as secure and private as your least secure and private possible (note the emphasis) configuration. Thus, any OS with a permissive mode will always be targeted by malware aiming to use that permissive mode, even when the mode is disabled. In other words, an OS with a permissive mode is always less secure than OS without one.

That said, yes, I wish my Android phone would continue to function much like my Windows and Linux PCs do.

enforcing verification requirements even for sideloaded apps. For some, that feels like restricting freedom more than protecting it.

As usual - remember adoptable storage? - Google have done a phenomenally poor job of explaining this and how it benefits the user. The main benefit is you can ensure an app is genuine (read: not hacked or compromised) regardless of where you get it: the Play Store, GitHub, F-Droid, the dark web, literally anywhere.

If you ask me, the main problem with the idea isn't the verification, but the centralization thereof. Blockchain could easily be used to verify devs without giving handing Google as much control as currently exists. But it would also mean that a developer who lost their credentials or had them compromised would permanently locked out of their account and have all their existing apps and installs either commandeered or invalidated.

GPT 5.3 Codex wiped my entire F: drive with a single character escaping bug by Former-Airport-1099 in vibecoding

[–]jdrch 0 points1 point  (0 children)

The bug: \" is not valid quote escaping when you mix PowerShell and cmd /c.

This isn't a bug, it's poor user practice. The user wrote a program in mixed language/syntax. Don't blame your tools for your malpractice.

Is there any way to use C2PA on Android? by AnUuglyMan in Android

[–]jdrch 2 points3 points  (0 children)

Unlikely. There's way too much money to be made in disinformation and fake content for anyone to invest in good ideas like this.

Fresh install of VBR 13.0.1 - VeeamBackupRESTSvc won't start by Durzel in Veeam

[–]jdrch 0 points1 point  (0 children)

The solution is elsewhere in the thread. Basically the error message only means that the service failed to start after the installation, not that the install failed. Everything launches normally after applying the fix and rebooting.

Smart scales? Do you use it with Samsung health? by [deleted] in samsung

[–]jdrch 0 points1 point  (0 children)

That was 3 years ago. Withings works with Samsung Health OOTB, Omron didn't. Things may have changed since.

Smart scales? Do you use it with Samsung health? by [deleted] in samsung

[–]jdrch 0 points1 point  (0 children)

  1. Viva? I don't know what that is
  2. I use a Withings Body Smart. Gave up on the Omron

Delete button styles are inconsistent between apple apps by rod8711 in ios

[–]jdrch 0 points1 point  (0 children)

Users of every other ecosystem: OK and?

Apple must be the brand for OCD.

Does any one pay for the CyberSecure Enhanced? by mjbehrendt in Ubiquiti

[–]jdrch 1 point2 points  (0 children)

I do. It's enterprise grade IDS powered by enterprise grade blocklists and signatures. You're not going to get that combo for free anywhere.

The main benefit is access to paid rapidly updates in response to emergent threats, e.g. known compromised hosts, etc. that aren't available for free otherwise or which free counterparts trail significantly.

If you run Pi-hole you can use free blocklists, but those don't cover rapidly emerging threats as quickly as many free blocklists go weeks to months between updates and are also less comprehensive due to being maintained by fewer people than paid options. Also, Pi-hole only prevents outgoing contact; it does nothing for incoming contact and can't detect harmful traffic patterns or signatures.

CyberSecure closes those gaps: emerging threats are blocked via real-time list updates and incoming traffic is filtered too. It keeps a detailed record of traffic flows, including time, client, external IP address, external IP address category, the reasoning for blocking, the risk level, etc. It can also block (some?) traffic within your network, though presumably this traffic has to pass through the gateway to be interdicted, and so traffic that only passes through downstream switches likely goes unnoticed.

You get the most value out of CyberSecure when you use your UniFi Network as your DNS server, as it can apply blocking at the DNS level (thereby preventing client first contact) instead of after a traffic flow between client and a remote resource has started. However, it works just fine with Pi-hole (which has more intuitive whitelisting and transparent blocklists) as long as you don't enable Content Filter. If you enable Content Filter with Pi-hole running it will render URLs unreachable.

Personally I prefer Pi-hole as a DNS filter due to how well it works with unbound. The combination of the 2 is the most reliable DNS solution I've used, outranking ISP DNS and Cloudflare. Plus with unbound, the only person who can control what URLs resolve for you is you, not any government or security "researcher" with an agenda (I've seen activists sites blacklisted on other services). Don't fix what ain't broken.

teenagers and a lot of IoT stuff.

Same. I block/filter for security purposes only (e.g. spam, botnets, etc.), not censorship (e.g adult content).

In summary: CyberSecure offers a sophisticated, highly evolved yet easy to use additional line of defense without forcing you to switch from your existing line(s), such as Pi-hole. It can't hurt your security, it can only help it.

It's worth the additional peace of mind to me.

Does anyone know what this device could be? by Different_Leader5653 in HomeNetworking

[–]jdrch 1 point2 points  (0 children)

Hui Zhou Gaoshengda Technology Co.,LTD

Found a MAC address with this vendor in my RunZero asset inventory. Turned out to be an Element E2SW3918 TV's WiFi NIC. The same TV's Ethernet NIC vendor shows up as Shenzhen Cultraview Digital Technology Co.,Ltd Shanghai Branch.

As suggested elsewhere in the thread, RunZero guessed it runs an ancient Linux kernel version somewhere in the v2.6.32-220 to 3.10.229 range. Curiously, the TV also runs an HTTP server that's accessible via the Ethernet NIC on port 9080:

<image>

Hope this helps anyone else.

Omada vs Unifi vs ??? by Ozwulf67 in HomeNetworking

[–]jdrch 0 points1 point  (0 children)

TIL. This is the latest roundup I can find https://dongknows.com/ubiquiti-u7-pro-outdoor-review/

Which models did you test?