Sunny

joined 2 years ago
[–] Sunny@slrpnk.net 4 points 2 days ago (1 children)

Might want to check out Village Story too, believe its a bit more mature in age, as in the game has been out for longer.

[–] Sunny@slrpnk.net 3 points 3 weeks ago

Decided to start paying for Qobuz amd its been a great time so far! Audio quality is top notch, and their focus on exploring individuals/bands albums are very good. Id recommend giving the service a go, they also pay artists a much better share compared to Spotify..

[–] Sunny@slrpnk.net 8 points 3 weeks ago

Lets make Black flag the most pirated game ever 🌊

[–] Sunny@slrpnk.net 3 points 3 weeks ago

Really stoked about this one!

[–] Sunny@slrpnk.net 6 points 4 weeks ago

Wow same here, had actually forgotten it used to be called WefWef until you mentioned it.

[–] Sunny@slrpnk.net 9 points 1 month ago

But its kinda taken....

[–] Sunny@slrpnk.net 5 points 1 month ago

Ah yeah of course 😅

[–] Sunny@slrpnk.net 0 points 1 month ago (2 children)

Wowzie wish i could build this!

[–] Sunny@slrpnk.net 12 points 1 month ago

This is actually funded by Mozilla, not Thunderbird donations.

[–] Sunny@slrpnk.net 2 points 1 month ago

Damn thanks for the update, been meaning to check it out too lately. Hoping to combine ot with sunshine/moonlight setup to TV.

[–] Sunny@slrpnk.net 17 points 1 month ago (22 children)

Omg take my money!! 💸💸💸💸

Seriously loosing whatever faith i had left in Mozilla... I want to love them so badly, but this just hurts.

 

I am tired boss...

 

Been looking a few different places but not finding a full copy of all the episodes. Figured id ask here consdering there are a few likeminded folks here.

Thanks in advance

 

cross-posted from: https://slrpnk.net/post/35084396

Hej lemmings!

Quick question for you all: do you stick with the same distro across your PC, laptop, and server, or do you pick different ones based on the device and what you're doing?

For me, I've been mixing and matching depending on the use case, but I'm starting to think it'd be nice to just have one distro (or at least one family like Fedora or Debian) running everywhere. That way I wouldn't get confused about default settings or constantly have to look up flags for different package managers.

Right now my setup is:

  • Gaming rig: CachyOS
  • Laptop: AuroraOS
  • NAS: Unraid
  • Various project servers: DietPi, Debian, Alpine etc..

I feel like NixOS might be the only distro that could realistically handle all these use cases, but I'm a bit scared of the learning curve and the maintenance work it'd take to migrate everything over.

Am I the only one who feels like having "one distro to rule them all" would be nice? How do you guys handle your setups? All ears! 😊

 

Hej lemmings! (Hoping this is relevant enough for the selfhosted commjnity)

Quick question for you all: do you stick with the same distro across your PC, laptop, and server, or do you pick different ones based on the device and what you're doing?

For me, I've been mixing and matching depending on the use case, but I'm starting to think it'd be nice to just have one distro (or at least one family like Fedora or Debian) running everywhere. That way I wouldn't get confused about default settings or constantly have to look up flags for different package managers.

Right now my setup is:

  • Gaming rig: CachyOS
  • Laptop: AuroraOS
  • NAS: Unraid
  • Various project servers: DietPi, Debian, Alpine etc..

I feel like NixOS might be the only distro that could realistically handle all these use cases, but I'm a bit scared of the learning curve and the maintenance work it'd take to migrate everything over.

Am I the only one who feels like having "one distro to rule them all" would be nice? How do you guys handle your setups? All ears! 😊

 

This is a necessary Reddit repost - stay safe folks!

source

Huntarr (afaik) was an attempt to replace the standard arr* apps, such as sonarr, radarr and prowlarr.


Today, after raising security concerns in a post on r/huntarr regarding the lack of development standards in what looks like a 100% vibe-coded project, I was banned. This made my spidey senses tingle, so I decided to do a security review of the codebase. What I found was... not good. TLDR: If you have Huntarr exposed on your stack, anyone can pull your API keys for Sonarr, Radarr, Prowlarr, and every other connected app without logging in, gaining full control over your media stack. The process

I did a security review of Huntarr.io (v9.4.2) and found critical auth bypass vulnerabilities. I'm posting this here because Huntarr sits on top of (and is now trying to replace them as well!) Sonarr, Radarr, Prowlarr, and other *arr apps that have years of security hardening behind them. If you install Huntarr, you're adding an app with zero authentication on its most sensitive endpoints, and that punches a hole through whatever network security you've set up for the rest of your stack.

The worst one: POST /api/settings/general requires no login, no session, no API key. Nothing. Anyone who can reach your Huntarr instance can rewrite your entire configuration and the response comes back with every setting for every integrated application in cleartext. Not just Huntarr's own proxy credentials - the response includes API keys and instance URLs for Sonarr, Radarr, Prowlarr, Lidarr, Readarr, Whisparr, and every other connected app. One curl command and an attacker has direct API access to your entire media stack:

curl -X POST http://your-huntarr:9705/api/settings/general \
  -H "Content-Type: application/json" \
  -d '{"proxy_enabled": true}'

Full config dump with passwords and API keys for every connected application. If your instance is internet-facing - and it often is, Huntarr incorporates features like Requestarr designed for external access - anyone on the internet can pull your credentials without logging in.

Other findings (21 total across critical/high/medium):

  • Unauthenticated 2FA enrollment on the owner account (Critical, proven in CI): POST /api/user/2fa/setup with no session returned the actual TOTP secret and QR code for the owner account. An attacker generates a code, calls /api/user/2fa/verify, enrolls their own authenticator. Full account takeover, no password needed.

  • Unauthenticated setup clear enables full account takeover (Critical, proven in CI): POST /api/setup/clear requires no auth. Returns 200 "Setup progress cleared." An attacker re-arms the setup flow, creates a new owner account, replaces the legitimate owner entirely.curl -X POST http://your-huntarr:9705/api/settings/general
    -H "Content-Type: application/json"
    -d '{"proxy_enabled": true}'

  • Unauthenticated recovery key generation (Critical, proven in CI): POST /auth/recovery-key/generate with {"setup_mode": true} reaches business logic with no auth check (returns 400, not 401/403). The endpoint is unauthenticated.

  • Full cross-app credential exposure (Critical, proven in CI): Writing a single setting returns configuration for 10+ integrated apps. One call, your entire stack's API keys.

  • Unauthenticated Plex account unlink - anyone can disconnect your Plex from Huntarr

  • Auth bypass on Plex account linking via client-controlled setup_mode flag - the server skips session checks if you send {"setup_mode": true}

  • Zip Slip arbitrary file write (High): zipfile.extractall() on user-uploaded ZIPs without filename sanitization. The container runs as root.

  • Path traversal in backup restore/delete (High): backup_id from user input goes straight into filesystem paths. shutil.rmtree() makes it a directory deletion primitive.

  • local_access_bypass trusts X-Forwarded-For headers, which are trivially spoofable - combine with the unauth settings write and you get full access to protected endpoints

How I found this: Basic code review and standard automated tools (bandit, pip-audit). The kind of stuff any maintainer should be running. The auth bypass isn't a subtle bug - auth.py has an explicit whitelist that skips auth for /api/settings/general. It's just not there.

About the maintainer and the codebase:

The maintainer says they have "a series of steering documents I generated that does cybersecurity checks and provides additional hardening" and "Note I also work in cybersecurity." They say they've put in "120+ hours in the last 4 weeks" using "steering documents to advise along the way from cybersecurity, to hardening, and standards". If that's true, it's not showing in the code.

If you work in cybersecurity, you should know not to whitelist your most sensitive endpoint as unauthenticated. You should know that returning TOTP secrets to unauthenticated callers is account takeover. You should know zipfile.extractall() on untrusted input is textbook Zip Slip. This is introductory stuff. The "cybersecurity steering documents" aren't catching what a basic security scan flags in seconds.

Look at the commit history: dozens of commits with messages like "Update", "update", "Patch", "change", "Bug Patch" - hundreds of changed files in commits separated by a few minutes. No PR process, no code review, no second pair of eyes - just raw trunk-based development where 50 features get pushed in a day with zero review. Normal OSS projects are slower for a reason: multiple people look at changes before they go in. Huntarr has none of that.

When called out on this, the maintainer said budget constraints: "With a limited budget, you can only go so far unless you want to spend $1000+. I allot $40 a month in the heaviest of tasks." That's just not true - you can use AI-assisted development 8 hours a day for $20/month. The real problem isn't the budget. It's that the maintainer doesn't understand the security architecture they're building and doesn't understand the tools they're using to build it. You can't guide an AI to implement auth if you don't recognize what's wrong when it doesn't.

They also censor security reports and ban people who raise concerns. A user posted security concerns on r/huntarr and it was removed by the moderator - the maintainer controls the subreddit. I was banned from r/huntarr after pointing out these issues in this thread where the maintainer was claiming to work in cybersecurity (which they now deleted).

One more thing - the project's README has a "Support - Building My Daughter's Future" section soliciting donations. That's a red flag for me. You're asking people to fund your development while shipping code with 21 unpatched security vulnerabilities, no code review process, and banning people who point out the problems, while doing an appeal to emotion about your daughter. If you need money, that's fine - but you should be transparent about what you're spending it on and you should be shipping code that doesn't put your users at risk.

Proof repo with automated CI: https://github.com/rfsbraz/huntarr-security-review

Docker Compose setup that pulls the published Huntarr image and runs a Python script proving each vulnerability. GitHub Actions runs it on every push - check the workflow results yourself or run it locally with docker compose up -d && python3 scripts/prove_vulns.py.

For what it's worth, and to prove I'm not an AI hater, the prove_vulns script itself was vibe coded - I identified the vulnerabilities through code review, wrote up the repro steps, and had AI generate the proof script.

Full security review (21 findings): https://github.com/rfsbraz/huntarr-security-review/blob/main/Huntarr.io_SECURITY_REVIEW.md

What happens next: The maintainer will most likely prompt these problems away - feed the findings to an AI and ship a patch. But fixing 21 specific findings doesn't fix the process that created them. No code review, no PR process, no automated testing, no one who understands security reviewing what ships. The next batch of features will have the next batch of vulnerabilities. This is only the start. If the community doesn't push for better coding standards, controlled development, and a sensible roadmap, people will keep running code that nobody has reviewed.

If you're running Huntarr, keep it off any network you don't fully trust until this is sorted. The *arr apps it wraps have their own API key auth - Huntarr bypasses that entirely.

Please let others know about this. If you have a Huntarr instance, share this with your community. If you know someone who runs one, share it with them. The more people know about the risks, the more pressure there will be on the maintainer to fix them and improve their development process.

Edit: Looks like r/huntarr went private and the repo got deleted or privated https://github.com/plexguide/Huntarr.io . I'm sorry for everyone that donated to this guy's "Daughter College Fund".

Edit 2: Thanks for all the love on the comments, I'll do my best to reach out to everyone I can. People asking me for help on security reviews, believe me when I say I did little more than the basics - the project was terrible.

 

Recommend putting in your vote on the next Ubuntu wallpapers (requires an Ubuntu account). There are plenty of good ones this year!

 

Yeah that's right. For a whopping one time purchase of 250$, you get a lifetime license for a @linux.com domain as an email alias/forwarding only. You cannot send emails from this. You can contact support to check if the alias you want is available too.

Imagine this on your CV. It is the ultimate flex.

 

What is Snikket?

Snikket is a messaging app with a focus on privacy and ease of use.

To support your privacy, Snikket is fundamentally different to other messaging apps that you may be familiar with.

Most popular messaging apps are developed by large businesses who provide the service for free in exchange for gathering data about you and showing you ads. In addition, all your messages travel through internet servers operated by them.

Instead of a single large corporation controlling everything, Snikket is decentralized. It is built on a network of smaller independent providers. Everybody is able to choose a Snikket provider that they can trust and yet still communicate with anyone else in the network.

 

Minus 15 degrees celsius 🫶

 

~ The URL is punycode, before anyone im comments suggest this is a shady link 🙃

A rather interesting article shedding light on how the famous Y Combinator’s Hacker News platform is steering its content away from users of they want to.

The full article here:

The Mysterious Forces Steering Views on Hacker News

18 December 2025 at 11:06 by marius@xn--gckvb8fzb.com (Marius)

JP. マリウス

I was initially torn about whether to publish this story, as I don’t have a clear or constructive recommendation on how to resolve the issue. I also didn’t want to come across as a paranoid conspiracy theorist – birds aren’t real, by the way. However, after repeatedly witnessing firsthand how Y Combinator’s Hacker News platform influences the spread of information and, consequently, opinions within the tech scene, I believe this topic deserves to be discussed, even if only briefly.

I approached this subject rationally, aiming to explain certain metrics I observed in my log files. I began exploring the Hacker News algorithms, along with related posts by other authors and, naturally, the comment sections of those discussions. Although I hadn’t previously delved into the topic, the deeper I went, the more I realized it wasn’t just a case of me being overly paranoid or seeing ghosts. It became increasingly clear that some form of censorship, whether through subtle slowing or outright blocking, does seem to be a recurring issue on the Hacker News platform. By censorship, I don’t mean the removal of deceptive or harmful content, but rather the suppression of factual material that happens to be critical of, let’s say, friends of Y Combinator.

I began writing this post after noticing unusual behavior when another one of my articles was shared on Hacker News. It triggered an immediate spike in traffic, which then dropped off abruptly for no apparent reason. While the post in question appeared to resonate with many readers, it rapidly fell from the top ranks of the Hacker News front page to the second, then third, and within minutes to the fourth page.

The decline was so sudden that even the very people whose product my post was criticizing, and who understandably weren’t pleased with it, stepped in to dispute any claims of censorship. Nevertheless, the data from my analytics clearly shows a traffic chart in a shape that couldn’t be further from being organic, leading to the assumption that the post was demoted from the front page both sharply and deliberately.

Note: The Element CEO’s comment reads:

neither YC nor any YC-intermediary is an investor in NV

This statement, however, doesn’t appear to be factually true. Protocol Labs, who is the lead investor of the Series B funding round of Element (New Vector), was initially founded as part of the Y Combinator S14 program.

This means that Y Combinator invested money into Protocol Labs, who in turn is a lead investor in New Vector, the company behind Element. One could argue that there is in fact an interest by Y Combinator, or at the very least by their friends over at Protocol Labs to protect Element from negative publicity – if you can even call my post that.

Similarly, I analyzed gigabytes of log files and traffic behavior for another post of mine that gathered some attention on news.ycombinator.com just recently. In this case, however, the censorship became more evident, even to the casual reader on Hacker News. If you’re looking at the post today, though, you might not fully understand the comments, as the post is clearly no longer flagged.

This critical deep dive into a specific project by a well-known tech figure took off within minutes of being shared on Hacker News. My analytics immediately alerted me to a surge in traffic, which is when I first noticed. The post reached the Top 5 list (on X) on Hacker News’ front page within minutes, accumulating over 40 upvotes in a short period. Then, abruptly, the traffic came to a complete stop when the post was suddenly flagged by Hacker News for no apparent reason.

Even though the post was flagged and essentially became invisible on the platform, community interest remained so high that the post went from about 50 upvotes to over 100, all while still being effectively censored. It wasn’t until several hours later (amid puzzled comments from the HN community and others) that Hacker News seemingly decided to silently unflag the post, as if nothing had ever happened and the post simply didn’t gain a lot of traction. And it worked:

The post had dropped from the visible ranks and wasn’t going to return. Hacker News had effectively stopped it at just the right the moment, when it could have gained serious traction, as it was scrutinizing a project tied to a prominent and influential tech figure.

While the post was picked up by Lobsters and spread further, attracting many views and, more importantly, thoughtful responses, its reach didn’t come close to matching the influence of what seems to be the most powerful tech aggregator on the internet.

Tl;dr

Hacker News is neither unbiased nor free from censorship. While it generally remains hands-off with neutral content, the moment a post that’s critical or even just slightly negative towards projects or companies affiliated with Y Combinator (either directly or indirectly) gains traction, the platform’s moderation team will seemingly step in to significantly limit its reach.

Unfortunately, I don’t believe there’s anything the community can do about this, as Hacker News has maintained its position as a leading tech news institution for years, with little competition on the horizon. As search engines continue their decline and are increasingly replaced by similarly censored LLMs, the discoverability of tech content, especially slightly more critical pieces, is likely to become a significant challenge in the future. My only advice is to keep in mind that, whenever you find yourself browsing Hacker News, you’re seeing a curated view of the current tech landscape that won’t necessarily represent the full picture.

 

So recently been spending time configuring my selfhosted services with notifications usint ntfy. I've added ntfy to report status on containers and my system using Beszel. However, only 12 out of my 44 containers seem to have healthcheck "enabled" or built in as a feature. So im now wondering what is considered best practice for monitoring the uptime/health of my containers. I am already using uptimekuma, with the "docker container" option for each of my containers i deem necessary to monitor, i do not monitor all 44 of them 😅

So I'm left with these questions;

  1. How do you notify yourself about the status of a container?
  2. Is there a "quick" way to know if a container has healthcheck as a feature.
  3. Does healthcheck feature simply depend on the developer of each app, or the person building the container?
  4. Is it better to simply monitor the http(s) request to each service? (I believe this in my case would make Caddy a single point of failure for this kind of monitor).

Thanks for any input!

view more: next ›