• 0 Posts
  • 30 Comments
Joined 1 year ago
cake
Cake day: June 5th, 2023

help-circle
  • notfromhere@lemmy.onetoFediverse@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    9 months ago

    I want categories of blocklists that I can turn on, e.g. uncheck languages I don’t know, uncheck religion, uncheck politics, etc.

    I want to be able to group together all posts that were posted by the same user with the same content to different committees. I want to view that as a single post not 6 or however many they spam posted it to.

    I want to be able to view same community spanning different server instances as a single community if I so choose, maybe some way to combine them and auto-add new communities with same name as they pop up ok other instances. Posting to it should give option of which server to post to, or all of them?






  • There is a US gov weather API that I believe tells the time for sunrise and sunset, so conceivably it could be done based on time that is adjusted based on the API call. Could also take into account weather conditions. I think a light sensor would help the best although I think two sensors would be ideal (one inside) because perceived brightness can be different even when illuminance is the same outside vs inside, but maybe not enough to matter in this case.




  • How do you have your auth working? Is it basic user/password managed on Nextcloud (external database connected?), is it external auth against something like Okta, or is it user/pass that you define from docker-compose?

    If via docker-compose then a restart would clear anything an attacker would have done and it would reload from the docker-compose process I think? I’m not too familiar with the specifics on that as I’m not a security researcher, but generally some attacks are resident in memory only and a restart can clear them only for it to crop up again later either due to a running process that was set to rerun an exploit or someone monitoring your system externally and retrying the exploit remotely again.

    Or it could just be some bug in Nextcloud or unique to your environment. Personally I’m only hosting things that are internally accessible via VPN anymore. Tailscale makes that super easy these days.