

I just used a bot to read it: https://web.archive.org/web/20250901133211/https://cheapskatesguide.org/articles/debian-netinstall-waf.html


I just used a bot to read it: https://web.archive.org/web/20250901133211/https://cheapskatesguide.org/articles/debian-netinstall-waf.html
It shouldn’t be because you’re not actually the owner of the IP address. If any user could get a cert, they could impersonate any other.
They’re ‘shortlived’ 7 day certs, verified using a HTTP challenge. It doesn’t matter who owns the IP, it’s just a matter of who holds the IP.
You can setup a Forgejo Action that deploys the site using Cloudflare Wrangler. Codeberg uses Forgejo, and GitLab CI/CD should work too.
If Wrangler is too hard I think there’s a webhook thing, but I’m not too sure.


Fun fact: IP version 5 is actually reserved for the Internet Streaming Protocol.


Uhh, this might be true for WebRTC, except not much uses WebRTC other than for realtime streaming/calling. Jellyfin for example is just an mp4 stream over http; and http(s) will only use the IP in the DNS record. I’d like to see a packet capture if you are certain something is switching IP.
Yeah, YunoHost explains why http://localhost:8536/ wouldn’t be working. If cloudflared and Lemmy are in separate containers you have to put an actual IP in, since localhost points to the container itself.
How are you accessing it without Cloudflare? How do you know that Lemmy is actually listening?
What’s the URL you using to access it without Cloudflare?
Edit: Also that curl tells me it’s not listening on that IP/port.
Can you access it without Cloudflare?
Does curl http://localhost:8536/ work?
You are using cloudflared right? Because normal (non-cloudflared) Cloudflare doesn’t support port 8536.


With dynamic DNS? Yeah it always has, as long as you can host a http server.
With a dynamic IP? It should do, the certs are only valid for 6 days for that reason.


You can host a page with an iframe, but you can’t directly change the DNS record to point to something that isn’t GitHub.


help now actually opens the help utility on Python 3.13!


Perhaps there was an easier lighter-weight way of doing this?
Yeah, SSH tunneling. What I would do (and have done in the past) is something like:
ssh -L 8080:192.168.0.1:80 myserver
That will forward port 8080 on your host to port 80 on 192.168.0.1, so you can access your router’s web UI with http://localhost:8080/ in your own web browser.
You can also setup full tunneling with SSH, but that requires messing around with SOCKS and I usually can’t be bothered.
Ahh sorry, I thought you meant you plugged it into the input side. If that’s the case then are you running anything that measures CPU usage? I run the TIG stack, it might be able to give you some hits. Also back to my original point which is already unlikely, if it’s a modified sinewave UPS, it can confuse some measuring devices while it’s on battery.
It’s weird to do this daily, but it’s possible that the UPS is doing a self test, which would drain the battery a little and the load is from charging it back up.


The symbol they defined out is not the equals symbol but rather U+2550, so the for loop is fine.


Before other people start commenting ‘yeah obviously’, it’s their April Fools video, it’s pretty funny.
You have to be on the March update, then go to Developer options -> Linux environment, and enable it. Then ‘Terminal’ will appear in your apps drawer.


Running Windows is officially supported by Apple, yes most guides use bootcamp to set it up, but you should be able to create an install drive like a normal PC and boot from it by holding Option/Alt as you press the power button. Mac’s usually just use EFI like any modern PC under the hood.
Cloudflare usually blocks ‘unknown’ bots, which are basically bots that aren’t search crawlers. Also I’ve got Cloudflare setup to challenge requests for .zip, .tar.gz, or .bundle files, so that it doesn’t affect anyone unless they download from their browser.
There’s also probably a way to configure something similar in Anubis, if you don’t like a middleman snooping your requests.