• 0 Posts
  • 70 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle













  • I have an anecdote that says the opposite. I got the same fridge, washer, and dryer from LG when we moved in our house 10 years ago and have had no problems with any one of them. My wife hates that we got a model with the freezer as a drawer on the bottom and would have preferred a side by side but no problems with anything breaking.

    Our Bosch dishwasher on the other hand had a gasket start leaking during the pandemic and it took the repair people 4 or 5 months to get a replacement in. I think they were redesigning a faulty part at the same time as all the supply chain issues so we had a really bad time with that. It was only a couple years old at the time and has worked ever since.


  • Side note. Don’t use hardware acceleration with TDARR. You will get much better encodes with software encoding, which is great for archival and saving storage.

    Use hardware acceleration with Jellyfin for transcoding code on the fly for a client that needs it.

    If you know what your client specs are, you can use TDARR to reencode everything to what they need and then you won’t have to transcode anything with Jellyfin.


  • You have a point that it will be hard to explain this to everyone on why it is better.

    From my understanding, when you use a password manager, the user will enter a pw into it that they remember and the vault will unlock. Then when they go to log into a website, a different, longer, and impossible to remember password will be sent to the site at login. (Assuming they are using the manager well). A week later when they go to log in again, the same long password will be delivered.

    The problem is that if a bad actor gets involved, whether it is the website is attacked or they send the user a phishing url or something and the password from the manager is exposed, it will have to be changed. That scammer can now log into that website as the user whenever they want, and possibly any other website that user used the same password for. Hopefully they didn’t if they are using a manager.

    With passkeys, a user will log into their manager with a password they remember, but when they go to log into a website, a different token will be sent, based on their key, every time. So if a scammer is listening at the router they still can’t log in again because it has expired.

    It is still not a perfect thing, I would imagine that phishing sites could still get a scammer in, who could possibly do bad things or change the login credentials but it is still much more secure than sending a password to the site for the user.