• 90 Posts
  • 290 Comments
Joined 3 years ago
cake
Cake day: July 9th, 2023

help-circle
  • chaospatternstoSelfhostedForgejo v15.0 is available
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 day ago

    15.0 adds support for OIDC tokens being handed to Actions workflows compatible with GitHub Actions. I was excited to upgrade because I wanted to continue doing cosign Docker image signing, but then I found out that the Cosign transparency log doesn’t support Forgejo. Looks like I need an alternative.

    My next biggest problem is the Actions workflow itself. I setup Docker in Docker, but turns out there’s a bit of work in preparing the runners to be on par with what I used on GitHub.

    Otherwise, I’ve found Forgejo to be quite good and almost all my private repos are moved over.




















  • I use the HA Voice Preview in two different rooms and got rid of my Alexa Dots. I’ve been trying both speech-to-phrase and whisper with medium.en running on the GPU for STT, tried llama3.2 and granite4 for the LLM with local command handling

    I’ve been trying to get it working better, but it’s been a struggle. The wake word responds to me, but not my girlfriend’s voice. I try setting timers, and it says done, but never triggers the timer.

    I’d love to improve operating performance of my assistant, but want to know what options work well for others. I’ve been experimenting with an intermediary STT proxy to send it to both whisper and speech-to-phrase to see which one has more confidence.



  • I’d love for my HA Voice Preview to be sufficient to replace my Alexa/Google devices. I even unplugged my Alexa devices. However, it’s been rough going for me. It never responds to my girlfriend speaking the wake word and doesn’t set timers. There’s a number of knobs that define how well it works including the physical hardware (there’s obviously the Voice Preview, but also some community made versions with better mics,) wake word model, conservation LLM model and the speech to text model (whisper vs speech to phrase). If it works well for you, can you share your configuration you’re using?







  • I thought this was using SDKs embedded in apps and advertising platforms. This is a different threat model. You need to block ads and prefer using websites instead of apps which have more access to device info like the advertising ID.

    If you’ve got an Android, go to Settings, search for ads, and find the advertising ID and delete the ID. It’s a stable identifier that can be used to identify your phone.

    Switch to more private browsers like Firefox for Mobile and install uBlock Origin.

    EDIT: I’m not saying this will protect you against IMSI catchers or tower based drag nets. In addition to not bringing your phone, when you do go home you need an entirely different set of tools to protect yourself.




  • You’re describing what agile should be, but Agile™ is the variant you get in toxic companies where they say they are agile, but it’s just a mechanism to micromanage developers with bad managers asking why you’re not burning down enough points or why you haven’t met the estimated date you thought before you realized there was more technical debt than a bankrupt business.

    Maybe you’ve avoided it but I’ve seen it first hand.




  • I use it to play music from Jellyfin to my Sonos speakers. It won’t fix a Jellyfin library that has bad data, but it can pull in music from multiple different sources and push to different players.

    It works well enough. Some issues where songs get interrupted, but I think that’s issue with the Music Assistant/Sonos integration.



  • I developed my own scraping system using browser automation frameworks. I also developed a secure storage mechanism to keep my data protected.

    Yeah there is some security, but ultimately if they expose it to me via a username and password, I can use that same information to scrape it. Its helpful that I know my own credentials and have access to all 2FA mechanisms and am not brute forcing lots of logins so it looks normal.

    Some providers protect it their websites with bot detection systems which are hard to bypass, but I’ve closed accounts with places that made it too difficult to do the analysis I need to do.