Don’t worry, Gildan and the Canadian Army are already on it!
First off you should realize that the registrar’s and domain name servers don’t have to be the same. Feel free to use any registrar (ex: namecheap, gandi, etc) and host the domain name server anywhere else.
Secondly, if you want a good API for dynamic updates, I’d recommend looking for something that supports nsupdate
, which is bind’s built-in update mechanism. It’s supported almost everywhere, including by let’s encrypt clients like Lego.
When we rolled into Baghdad, we did it using open source. - Major General Nicholas Justice
Can’t believe no one has mentioned Inovelli yet. Developed with the community, with OTA support in Z2M, they are absolutely fantastic and incredibly flexible!
https://inovelli.com/ blue series
Where is the crypto documented? I’m immediately dubious of messengers that do not provide LENGTHY documentation about the crypto. Did you roll your own? Are you using libraries? Which ones? Etc… It’s not s good start to see that you have the self signed certs hard-coded in the repo…
So you support apartheid, you just draw the line at too many dead children?
College loans are not dischargeable in bankruptcy. Simple as that.
America doesn’t want war with Iran.
That’s the funniest shit I’ve heard all week!
America has been saber rattling at Iran since the assassination of Mosadegh.
They propped up Sadam Hussein to fight a bloody proxy war against them, and then turned on him when he demanded reparations.
There’s your problem, you think the US disapproves of bombing the Iranian embassy. They don’t, they just won’t do it themselves. Bases are one thing, but Israel has, continues, and will provide plausible deniability for some truly disgusting actions.
It goes both ways. Israel as always been a proxy for doing the US’ dirty business in the region.
POV: you’re on the 900 level at Cerro Gordo
You don’t like Add-ons?
First, I would caution against exposing services to the internet. It would be far better to leave everything behind a VPN that only you or trusted peers can access.
Past that you can use tools like OSSEC, Snort, and fail2ban.
The hostname is also sent out, so generic hostnames or a hostname randomizer at boot is also useful.