Yeah you can’t, tor is a completely different protocol and the only way to use tor with a wireguard client is with a server in the middle that routes the internal wireguard traffic into tor.
Yeah you can’t, tor is a completely different protocol and the only way to use tor with a wireguard client is with a server in the middle that routes the internal wireguard traffic into tor.
I run wireguard and Android with chrome cause firefox doesn’t support pwa. Did you add it to your home screen?
Edit: Also I run release V2
It just works™?
Silverbullet supports working offline as a pwa, just click install on the website and you get a shortcut to the web app that you can use online and offline, open it when your online again to sync your changes to the other devices.
Depends on distro, snapshotting and if it’s a immutable distro.
Though Windows users should be worrying more, they don’t have backups and have silently activated bitlocker but ignorance of that is bliss.
Mac user don’t have to worry in my experience.
Can recommend, works offline and online with PWA support and stores everything in Markdown files for easy migration if you want to change your frontend.
Did you follow the guide?
https://docs.searxng.org/admin/installation-docker.html#installation-container
Nah i don’t. I can hope though and the backdoor is a threat not just for consumers but also companies.
I hope more follow, would be funny if “all chat apps have to include a back door” leads to “there are no official chat apps”
It is expected, the users inside the container are “real” users. They just get offset inside the container and some mapping is applied:
Root inside the container is mapped outside to the user running the container, everything that has the owner “root” inside the container can be read from outside the container as your user.
Everything that is saved as non-root inside the container gets mapped to the first subuid in /etc/subuids for your user + the uid inside the container.
You can change this mapping such that, for example, user 1000 inside the container gets mapped to your user outside the container.
An example:
You have a postgres database inside a container with a volume for the database files. The postgres process inside the container doesn’t run as root but instead runs as uid 100 as such it also saves its files with that user.
If you look at the volume outside the container you will get a permission denied error because it is owned by user 100100 (subuids starts at 100000 and usid inside container is 100).
To fix: Either run your inner processes as root, this can often be done using environment variables and has almost no security impact or add --userns keep-id:uid=100,gid=100 to the cmdline to make uid 100 inside the container map to your user instead of root (this creates a new image automatically and takes a while on the first run)
I though that was the point of surveys?
deleted by creator
Theoretically, google could keep that workaround in the code, yes.
Practically it will be gone in 3…2…1…
I’m sorry to say but problem solving and computer skills are left at the door.
Maybe
Wouldn’t people use tissues and cause pipe blockage in the long run?
You could even say they have the stediest vitals of them all.
I don’t like Source-available software, especially when they’ve changed from a more open license to this.
To add to this, “Open WebUI” needs to be included, as is and without modifications in all derivations. The term is also trade marked and as such, cannot be distributed without the trade mark owners approval…
https://trademarks.ipo.gov.uk/ipo-tmcase/page/Results/2/WO0000001844530
epic boobs, brah
WELCOME