

Yeah, autocorrect got me on my phone — fixed now 👍
Trans
Just a individual living life and enjoying it, love life whilst it lasts


Yeah, autocorrect got me on my phone — fixed now 👍


Do not go gentle into that good night.


If you point Traefik’s forwardAuth at the internal service (e.g. http://<tinyauth-ip>:3000/api/auth/traefik), TinyAuth doesn’t see the correct X-Forwarded-* headers or original host, so it won’t return the auth headers properly.
if you switch to using the public URL instead, the headers should start working — but only once using the full endpoint:
https://tinyauth.domain.tld/api/auth/traefik
Not just the root URL.
That way:
Also worth double-checking that your header names match exactly (e.g. Remote-Groups vs Remote-Group).
So in short: don’t call TinyAuth directly by IP, go through the domain + correct path.
I run a modest Lemmy instance (lemmy.blehiscool.com). It’s not on the scale of lemmy.world or anything, but it’s been around long enough that I’ve had to deal with some real growth and scaling issues. I’ll try to focus on what actually matters in practice rather than theory.
I’m running everything via Docker Compose on a single VPS (22GB RAM, 8 vCPU). That includes Postgres, Pictrs, and the Lemmy services.
This setup is great right up until it suddenly isn’t.
The main scaling issue I hit was federation backlog. At one point, the queue started piling up badly, and the fix was increasing federation worker threads (I’m currently at 128).
If you run into this, check your lemmy_federate logs—if you see:
“Waiting for X workers”
that’s your early warning sign.
Once your infrastructure is stable, the technical side becomes pretty low-effort.
The real time sink is moderation and community management. Easily 90% of the work.
On the technical side, my setup is pretty straightforward:
pg_dump + VPS-level backupsBackups are boring right up until they aren’t. Test your restores. Seriously.
The main gaps I’ve run into:
Pictrs storage growth Images from federated content add up fast. Keep an eye on disk usage.
Postgres tuning As tables grow, default configs start to fall behind.
Federation queue visibility There’s no great built-in “at a glance” view—you end up relying on logs.
Nothing fancy, just consistent habits:
Daily (quick check):
Weekly:
Monthly:
As needed:
If I were starting over:
Happy to answer specifics if you’re planning a setup—there’s a lot of small gotchas that only show up once you’ve been running things for a while.
A more neutral way to put it is that libertarianism and anarchism both value individual freedom, but differ on the role of the state.
Libertarians generally want a minimal state (for things like courts, police, national defense), while anarchists want to eliminate the state entirely.
There are also different kinds of anarchists—some are anti-capitalist, while others (like anarcho-capitalists) overlap more with libertarian ideas.


Not to mention the owner of simplex is a horrible person.


Something I’ve been thinking about: independent security projects often face pressure once corporate partnerships or funding enter the picture.
Does GrapheneOS have any structural safeguards to ensure development priorities remain community-driven if hardware vendors become more involved?
I’m not assuming there’s a problem — just interested in how projects like this avoid the “venture capital influence” problem that has affected other open source initiatives.



Me too.


America to every other country: https://youtu.be/esslNGOMNAU?t=43
CounterSocial blocks entire IP ranges and most VPN/datacenter networks as part of its anti-abuse policy. It’s not really decentralised, so if you’re blocked at the network level there’s usually no workaround unless they manually allow you.


Originally ‘woke’ meant being aware of social injustice, especially racism. Over time it evolved to become associated with broader progressive politics more broadly, now it’s used to either insult or compliment depending on who is speaking.
Great idea — I was worried my computer wasn’t reporting enough about me.