• 7 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle
rss




  • The simple answer is yes.
    It’s possible to encode or tunnel anything over any protocol.

    The next question is why isn’t it done more?

    1. http has basically become the defacto internet protocol for all media content. This has resulted in a lot of other protocols from becoming blocked due lack of support or due to firewall rules.
    2. efficiency. http (and all the other protocols it runs atop) have become highly optimized for doing what it does. To layer something like http over another protocol, would certainly be possible but it would likely be slower, less responsive and lack a lot of the niceties that make http work as well as it does.

    For the above reasons it’s actually more common to see other protocols run on top of http. This is especially common to prevent blocking and censorship by making the traffic look like normal http traffic when it may actually be private messaging apps, file transfers, VPN, etc.





  • I think we’re saying the same thing?

    You have your end grain slab laid on a table in front of you. From left to right divide cut it into parallel pieces (width of these is up to you 2" or 3" is probably fine). With them all laid on the table on their original pattern, rotate or flip alternating slices. Glue it up.


  • The bigger the wood the more movement it will have. End grain boards like you describe often have their pieces oriented in opposing directions to manage the warping due to expansion and contraction. Plus the more pieces the more glue jointing holding it together.

    To provide more stability, you could cut a series of slices and flip every other one such that the curve of the grain is alternating.






  • The addAddress call may just be configuring the local side of the VPN. It’s hard to know without looking at the rest of the code.
    The general workflow when establishing a VPN connection is:

    • open a socket to the destination VPN service (ProtonVPN, or whatever suspect service).
    • configure parameters such as DNS, split tunneling, and which networks to route over the VPN (generally everything from your local system, except the VPN connection itself).
    • update the local routing so traffic starts flowing over the VPN.

    addAddress may just be part of the configuration. A very cursory search suggests that OpenVPN may be being used as the underlying VPN implementation framework (not uncommon).



  • Lemmy is distributed across different instances. Instances can “federate” with each other, which means they share content and users with each other. “Defederating” means to remove that content sharing with the other instance.
    As an example, let’s say that Instance-X contains unregulated hate speech on it. Other instances can remove federation from Instance-X so their community posts no longer get shared to/from them.