

Ducks? That’s quackery.


Ducks? That’s quackery.


Congrats on the cat box cleaning!
There’s also Zitadel: https://zitadel.com/


The same way that pigs are food and dogs are not. Cognitive dissonance.


May be spam. No other sites seem to be carrying this story besides this one that does not appear to a news outlet and is infested with VPN ads.


Snorting tea, coffee and broccoli would be less popular too.


Years ago there was a voice to text transcription service sold as automated that worked by people listening to your voicemails and typing them out.
For bookmarking: https://raindrop.io/
But it’s not self-hosted and I’m not sure it supports offline reading.


It isn’t hard when every works perfectly but there is a tremendous amount of complexity in some of these apps and a huge range of quality, documentation and required env vars and mounts.
And so, so many ways for things to break.


You still have manage upgrades due security vulns in all the features you are ignoring.


Yes. DMZ on router 1 exposes router 2 IP to internet.


No, this is all happening in the browser, there are no other image manipulation tools being called.


I just tested the new release. Consider defaulting PNGs to convert to JPEGs unless they have a PNG-specific feature like transparency. Lots of screenshots are initially PNGs, but not because they need any PNG-specific features. Consider: In a test screenshot, it compressed 3.4% with the default 80% setting and PNG->PNG, but for PNG->JPG, it compressed 84.6%. 


MCP sounds like a standardized way for AI clients to connect to data sources, the Model Context Protocol.
https://www.anthropic.com/news/model-context-protocol
It sounds like it may compete some with Google’s A2A protocol, which is for AI agent to agent communication.
Both share the same goal of making services easier for AI to consume.


Do you have a source to cite for the literal 99%?


The top-rated answer to this question on the Security StackExhange is “not really”. https://security.stackexchange.com/questions/189726/does-it-improve-security-to-use-obscure-port-numbers
On Serverfault, the top answer is that random SSH ports provide “no serious defense” https://serverfault.com/questions/316516/does-changing-default-port-number-actually-increase-security
Or the answer here, highlighting that scanners check a whole range ports and all the pitfalls of changing the port. Concluding: “Often times it is simply easier to just configure your firewall to only allow access to 22 from specific hosts, as opposed to the whole Internet.” https://security.stackexchange.com/questions/32308/should-i-change-the-default-ssh-port-on-linux-servers


Using a nonstandard port doesn’t get you much, especially popular nonstandard ports like 2222.
I used that port once and just as much junk traffic and ultimately regretted bothering.


I’m glad to have some competition for the Frost Oven Squoosh, which is being lightly maintained. I opened some issues in the Mazanoke issue tracker for some features to consider.
One feature I started on for that project but got stuck on was implementing a STDIN / STDOUT CLI workflow.
https://github.com/frostoven/Squoosh-with-CLI/issues/10
As I said there, the goal was a workflow where I take a screenshot, annotate it, optimize it, copy it and paste it into my blog… without creating any intermediate temp files.
At least on Linux, all the the steps of the pipeline are solved, except for a CLI image compressor that could accept an image STDIN and produce a compressed image on STDOUT.


Sounds like an oversight. Consider filing a bug with them.
Part of the app resides on the GitHub infrastructure, where GitHub stores, processes and displays results. So their costs are not zero.
But GitHub could take a “tax the rich” approach to pricing by charging enterprise customers more for self-hostingand leave it free for others.
A lot of open source is funded like that— most funding for a project comes from a very few companies and everything else uses it free or for very low donations or costs.