It sounds like most, if not all, come from upstream projects.
It sounds like most, if not all, come from upstream projects.
I love the idea, but I don’t believe the timeline.
I started using restic for backups.
Pro:
Con:
What if I like ellipses…
No. As a general rule with all software, you purchase a license to use the software, not the actual software itself. That being said, GOG and Itch.io can’t yank games that you’ve already downloaded. I don’t know if Steam does or not, but it probably can.
Yes. I’ve used it to batch convert PNG and jpg to webp.
Check out mogrify
. I think it’s installed standard with ImageMagick, and it does wildcard conversions.
Anything Zigbee or Z-Wave.
A third option is KeePassXC. You can set TOTP seeds for entries there.
Do you have a write-up or anything if someone wanted to start building their own?
For organizing and searching the files, I’m using paperless-ngx. It’s worked pretty well for these and for scanned documents.
My issue is getting the PDFs without having to spend time every month manually downloading them.
All solutions that integrate with banking sites I’ve ever encountered were nothing more but ugly hacks, IMHO.
Yup. That’s basically what FileThis provided. A maintained set of ugly hacks to pull the files for you automatically :D.
Sounds like a great design direction to me. I’m excited to see how it turns out.
Honestly, I figured it was one of those things people didn’t talk about because it was useless.
I assumed that was something everyone could do 🤯
The only option I can think of is some sort of privacy-preserving cryptocurrency or physically mailing cash. Every other method I can think of would have your real name attached to it.
It took some digging, but here’s a link to the actual paper: https://www.pnas.org/doi/10.1073/pnas.2304318120
Yeah, I’m wondering the same. Maybe it’s helpful for containerized apps or something?
Anyone else have any insight on this?
Restic using resticprofile to configure and schedule backup runs.
I think they did say that in the older thread. But for proper security, you shouldn’t have to trust them. You should have build tools that will re-fetch everything to create an identical build. That gives a clear chain of custody, which proves that morning has been tampered with.