





A naive answer:
Replace “Lemmy” with a “Nazi manufactured gun”.
A less naive answer:
Consider various meanings “use” takes in your question and decide accordingly.


First, Omarchy doesn’t need funding or partners. It’s backed by a Nazi multimillionaire.
Second, the whole apolitical argument is bullshit. Everything is political. Support for a distro that doesn’t really need support by nature of being a child of a Nazi multimillionaire is a support for that Nazi multimillionaire.
“We didn’t support them because of that” means nothing. The support still sends a message. Just like artist loses control over interpretation of their art the moment they release it, people lose control over interpretation of their actions the moment they act. Does it sound fair? Maybe not, but it’s how reality works.


It did solve my impostor syndrome though. Turns out a bunch of people I saw to be my betters were faking it all along.


I’d probably add that for something like nextcloud granted scopes can be an „orthogonal”–for the lack of a better word–subset of requested scopes.
The set of requestable scopes has to be defined by the system itself, not its specific configuration. E.g. „files:manage”, „talk:manage”, „mail:read” are all general capabilities the system offers.
However, as a user I can have a local configuration that adds granularity to the grants I issue. E.g.: „files:manage in specific folders” or „mail:read for specific domains or groups only” are user trust statements that fit into the capability matrix but add an additional and preferably invisible layer of access control.
It’s a fairly rare feature in the wild and is a potential UX pitfall, but it can be useful as an advanced option on the grant page, or as a separate access control for issued grants.


https://oauth.net/articles/authentication/
That aside, why is nextcloud asking for scopes from remote API in the diagram? What is drawn on the diagram has little to do with OAuth scopes, but rather looks like an attempt to wrap ACL repository access into a new vocabulary.
Scopes issued by the OAuth authorization server can be hidden entirely. The issuer doesn’t hold any obligation to share them with authorized party since they are dedicated for internal use and can be propagated via invisible or opaque means.
I really can’t figure out what’s going on with that diagram.


Yeah, had to dive in myself.
The answer is no, they can’t. You need to pass /dev/kvm and /dev/net/tun in a composefile for a reason.
There’s no „windows in docker”, but rather „handy windows vm orchestrator with nice UI in a container”. A bit of a mouthful.
My viewing history can legally drink in US in a year. What do you mean „guess”?


Googling at least until fairly recently meant „I consulted an index of Internet”. It is a means to get to the bit of information.
Asking ChatGPT is like asking a well-behaved parrot in the library and believing every word it says instead of reading the actual book the librarian would point you towards.


Live action at that
Similar approach can be used to establish VPN tunnel with no encryption (ssh already provides that), routing everything but your ssh connection through it.
It will be wasteful, but it will work.


It’s not about business optimization, it’s about not having to defer to someone’s knowledge from the position of power.
AI bubble makes so much sense when you start looking at it this way.


Gl.iNet is a great value router, but if you want to do anything really interesting, it won’t do.
I have Slate AX chugging along, and have been eyeing teklager boxes to do actual routing, with slate as an access point.
Same weird non-sequiturs chain that foobar2000 author uses.
They could’ve honestly said “I don’t wanna”, and that would be the end of it.
There are penalties. They require proof of intent, however. So there are no penalties.


Identification != Authentication
As obvious as this sounds, I’ve learned over the years that most people don’t understand what it means exactly.
USA is a dominant superpower though.


Please correct me if I’m wrong, but doesn’t this allow one to represent virtually any resource as a mail inbox/outbox with access through a generic mail app?
I’m working with a specialized healthcare company right now, and this looks like a way to represent patient treatments data as an intuitive timeline of messages. With a local offline cache in case of outages. Security of local workstations is a weak point of course, but when is it not…