ishigami_san 1 week ago • 100%
Gnus, aerc, neomutt
ishigami_san 2 weeks ago • 100%
I initially thought it looked like one :D
ishigami_san 2 weeks ago • 100%
1.25 kg of Lavazza beans (at USD ~21, converted) for a single person per month, brewed ~20g (in V60) for 1-3 times per day
ishigami_san 9 months ago • 66%
Definitely more Guix, esp. as now Guix is available to NixOS
ishigami_san 9 months ago • 100%
More NixOS!!!!
ishigami_san 2 years ago • 100%
Is your username homage to The Condor Trilogy ? :D
ishigami_san 2 years ago • 100%
Lemmy guess? :D
ishigami_san 3 years ago • 100%
ghci> φ = (1 + sqrt 5) / 2
ghci> ψ = 1 - φ
ghci> fib n = (φ ** n - ψ ** n) / (sqrt 5)
ishigami_san 3 years ago • 100%
Feel free to message me on one of those platforms, if they're your thing. Otherwise, you can stalk me on Lemmy to know more :P
EDIT: Just realized there is no contact information in the post, sorry!. I'll DM you in few after work.
ishigami_san 3 years ago • 100%
There's XEP-0368 with which one can directly specify direct TLS endpoints, and with ALPN multiple protocols can be multiplexed over single port, e.g. using nginx's ngx_stream_ssl_preread_module
. XEP-0368
is at least supported by Conversations, and Dino.
ishigami_san 3 years ago • 75%
Everyone should get a platform to spread their views/propaganda :)
ishigami_san 3 years ago • 100%
happy-in-dependence day!
ishigami_san 3 years ago • 100%
With user joined to ~30 rooms with ~200 users (average), and none of them is of the order of Matrix HQ, following is the ps aux
output (sixth column is RSS, physical memory in use in KiBs)
on a 4G RAM VPS (2 cores), which also hosts XMPP, gitea, fossil-scm, et. al. services. I used to run it all by itself on 2G RAM VPS, but consolidated ~2 months ago:
postgres 29897 0.0 3.7 191284 153736 - Ss 2Jul21 28:15.26 postgres: synapse synapse 127.0.0.1(5828) (postgres)
postgres 37308 0.0 3.7 191284 153264 - Ss 2Jul21 27:54.09 postgres: synapse synapse 127.0.0.1(16807) (postgres)
synapse 45418 0.0 9.0 1246748 375220 - Ss 2Jul21 2264:01.80 /usr/local/bin/python3.8 -m synapse.app.homeserver --daemonize -c /usr/local/etc/matrix-synapse/homeserver.yaml
postgres 45433 0.0 3.7 191284 153096 - Ss 2Jul21 28:21.45 postgres: synapse synapse 127.0.0.1(12404) (postgres)
postgres 46529 0.0 3.7 191284 153644 - Ss 2Jul21 28:06.31 postgres: synapse synapse 127.0.0.1(31560) (postgres)
postgres 47450 0.0 3.7 191284 153972 - Ss 2Jul21 28:16.65 postgres: synapse synapse 127.0.0.1(30342) (postgres)
postgres 47929 0.0 3.7 191284 152948 - Ss 2Jul21 28:20.01 postgres: synapse synapse 127.0.0.1(8337) (postgres)
postgres 48024 0.0 3.7 196404 153296 - Ss 2Jul21 28:22.18 postgres: synapse synapse 127.0.0.1(43996) (postgres)
postgres 54977 0.0 3.7 191284 153656 - Ss 2Jul21 28:16.74 postgres: synapse synapse 127.0.0.1(8192) (postgres)
postgres 55034 0.0 3.7 191284 153468 - Ss 2Jul21 28:20.01 postgres: synapse synapse 127.0.0.1(48984) (postgres)
postgres 74852 0.0 3.7 191284 153328 - Ss 2Jul21 28:10.76 postgres: synapse synapse 127.0.0.1(44007) (postgres)
Disk Usage (media) is 1.6G, and load average is ~0.33
It can be tuned further, but didn't spend time on it so far. Although 2 years ago, I could not run it on 2G RAM VPS. Federation traffic kept DoSing the server, once you join any room. Lately, situation has improved a lot.
ishigami_san 3 years ago • 100%
The room does not live on one server in particular. So, if server A is blocked, then one can still participate in the same room through a different server B.
ishigami_san 3 years ago • 100%
Anyway. hopefully the dendrite server can solve this problem, hosting that hog of server is costly.
Lately Synapse has been pretty light on resources, and performant, and being actively developed reference implementation has its perks. Hopefully Dendrite, Conduit, et. al. will catch up, but Matrix in general is not as lightweight as XMPP, due to former's focus on being able to evade censorship
ishigami_san 3 years ago • 100%
Sorry, I was not around much, and I just saw this. I'll reach out to you in few hours (after work!).
Thanks!
ishigami_san 3 years ago • 100%
Thanks, seems like I missed the FAQ.
ishigami_san 3 years ago • 100%
In .IN seems like current rate of infections is ~39,000
ishigami_san 3 years ago • 100%
Is it like a self-hosted Signal fork? Or just another walled garden that doesn't require using phone numbers?
ishigami_san 3 years ago • 100%
I wonder how their date format originated.
ishigami_san 3 years ago • 100%
There's also innernet
ishigami_san 3 years ago • 100%
Pretty good news. I missed Shutter's annotation features ever since I migrated to Wayland.
ishigami_san 3 years ago • 100%
or to XMPP MUCs (or maybe MIX when it matures in couple of years). Self-hosted, federated, and environment friendly (aka lighter on resources :)).
I'm running my own XMPP server, and Matrix homeserver for couple of years now. And all of my contacts on those networks are all from the FOSS communities I participate in, so they are not quite the friends, as in can't call them when I'm having a crisis in life, although I'm sure (or so I hope) they'll help when I'm having a crisis with my host. :P I'm passionate about veganism, free software, cinema, online privacy, and reading the books which I buy on impulse :P. In my non-work (work as a sysadmin) time, I contribute to FOSS. In my non-computer time, I watch movies, cook food, read the books (mostly: fiction, philosophy) which I accumulated. I'm currently reading Seventeen by Hideo Yokoyama, practice Japanese Kanji characters, and vocabulary, and also learning to sketch. As a fallback option, I go to sleep. In terms of personality, I'm liberal, atheist, loner, and not on any centralized social networks. If you're awake in day time of UTC+5.5 zone, and are interested in chatting on XMPP, Matrix, or any other FOSS decentralized platform, then feel free to message me. Also MBTI type is INTP-T. よろしくお願いします P.S. this is my first time posting here, let's hope it posts fine :D
ishigami_san 3 years ago • 100%
For more flexibility, you can try with OS's support for that, e.g. Linux network namespaces, or setfib(1)
in FreeBSD. AFAIK, there is nothing in Wireguard to do that other than what's possible with routing.
ishigami_san 3 years ago • 100%
You can adjust what traffic you wish to send over wireguard by adjusting allowed-ips
peer attribute (assuming you're using wg-quick
), e.g. if you only wish to send your lemmy.ml
traffic over wireguard tunnel, then get the IP address(es) associated with lemmy.ml
DNS name, and add them to allowed-ips
attribute of your wireguard peer (in your local configuration), while removing the default route from there. With this reconfiguration tunnel, you will now have route(s) to lemmy.ml
going over wireguard while rest of the traffic going via the default route. You can keep appending more routes to allowed-ips
over time, and reloading tunnel configuration.
HTH
ishigami_san 3 years ago • 50%
I think by being flexible so as to use proprietary software, while contributing to free software is some what similar to:
"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Benjamin Franklin, 1759
ishigami_san 3 years ago • 100%
Stoic way!