• 3 Posts
  • 455 Comments
Joined 9 months ago
cake
Cake day: February 14th, 2025

help-circle
  • This is really just a guess but… I think “agent” in this context means a personalised AI.

    Training gen AI models requires huge amounts of resources. Its not practical to train an AI for your personal use.

    Creating an agent is something like, taking an existing model, asking it to keep your entire browser history in mind while you ask it to do your homework.

    IMO its actually one of the big limitations of gen AI, but somehow the word is supposed to mean the opposite. As in, the current approach has reached a dead end requiring exponentially more resources for less and less improvement. So because we can’t make a model that just knows or learns everything, we have to make agents that know lots about specific things.


  • I’ve never used tailscale but use wireguard extensively.

    There’s not much of a learning curve for you as the administrator. You have to discard some misconceptions you might bring from other VPNs but really after 30 minutes of looking at configs you’ll get it.

    I use wireguard for my small team of 5 people to access self hosted services. You install wireguard, load the config, and then it just works.

    The trick, if it can be called that, is using public dns for private services.

    On your server, suppose you have service-a service-b and service-c in containers with ip addresses in the 10.0.2.0/24 range. Then you’d have a reverse proxy like traefik at 10.0.2.1. You’d also create a wireguard container with an IP in that same 10.0.2.0/24 range, and configure it’s wireguard adapter to be 10.0.12.1 or soomething so you have “2” for the containers and “12” for the wireguard clients.

    Then in wireguard configurations you direct all traffic for 10.0.2.0/24 through the tunnel but everything else just uses their devices normal internet connection.

    Finally create a public dns record pointing to the reverse proxy like *.mydomain.com > 10.0.12.1

    now whatever.mydomain.com will resolve to your reverse proxy but is still only available to devices connected to the wireguard container on your server.












  • While it doesn’t surprise me in the slightest that Andrew would want to do this but it does surprise me that his handlers allowed him to do it so brazenly.

    Even not-particularly-wealthy people can go to a resort / brothel in South East Asia and see 40 prostitutes in a few days if that’s their desire. Everyone involved would very happily turn a blind eye.

    However, doing it on a state visit is essentially the production and provision of kompromat.

    It’s interesting that the bangkok post has chosen to publish this now.

    Thailand has strict Lèse-majesté laws prohibiting any negative commentary about royalty. I wonder if that applied to foreign royalty and if so, whether it no longer applies now that Andy is no longer a “Prince”.





  • services:
      qbittorrent:
        image: lscr.io/linuxserver/qbittorrent
        container_name: qbittorrent
        environment:
          - PUID=888
          - PGID=888
          - TZ=Australia/Perth
          - WEBUI_PORT=8080
        volumes:
          - ./config:/config
          - /srv/downloads:/downloads
        restart: unless-stopped
        network_mode: "container:wg_out"
    

    this is my compose.yml for a qbittorrent instance.

    the part you’re interested in is the final line. There’s another container with the wireguard instance called “wg_out”. This network mode attaches this qbittorrent container to that wireguard container’s network stack.



  • I’d seen gluetun mentioned but didn’t know what it was for until a moment ago.

    I’ve heard of tailscale and at least know what that does but never used it.

    I personally have a mullvad subscription. I have a container connected to that with wireguard, and then for services I want to use that VPN I just configure them to use the network stack from that container.

    I’m not suggesting that my way is the best but it’s worked well for several years now.