Php proxy prox

ProxySocks5

2021.11.30 01:06 ProxySocks5 ProxySocks5

Residential or Data-center - SOCKS5 Proxy - HTTP(s) Proxy - ShadowSocks - VPN Wireguard - Rotating HTTP(S) Proxy https://proxysocks5.com
[link]


2024.03.13 22:06 xshopx Proxy and VPN

Proxy, VPN, Residential Proxy, Virgin Proxy, Proxies, Proxy Server, Proxy List, Proxy Lists, Best Proxy, RDP, Best VPN, Cloud, Computing, Cloud Computing, Security, Cyber Security, Hacking, IT Security, Information Security
[link]


2022.11.05 17:57 friendlyBrandon1 Proxy_Coin

[link]


2024.05.13 02:03 cuddlypuppylover39 iPhone 13 Randomly Rebooting 12+ Times a Day... (iDevice Analyzer & Panic Log)

For about the past month my iPhone 13 has been randomly restarting... At first it wasn't that alarming (1 or 2 resets a day) but then it shot up to double digits a day and became pretty annoying (can't see notifications or use flashlight or camera without entering passcode and waiting for everything to boot up again .etc).
I started by going to the Apple Store and they ran their diagnostics on it. They essentially told me the hardware (from at least what they detected) seems completely fine and that my Phone's warranty ran out so there's not much they could really do. They just suggested I do a full wipe of my phone or upgrade to a new phone (which I do not want to do because I got this phone only a little over a year ago)
I ran iDevice Analyzer on it and got back the following possible reasons:
NAND, CPU Open Line(s), Crystal, Interposer
Searching online, I couldn't found much on what these meant or how to fix it aside from like one reddit post from a long time ago. Does anyone have any interpretations of these problems or any idea on how to maybe fix it?
I'll paste the first chunk of one of my most recent panic logs below as well:
{"bug_type":"210","timestamp":"2024-05-12 02:20:34.00 -0700","os_version":"iPhone OS 17.4.1 (21E236)","roots_installed":0,"incident_id":"EF71A412-71B4-454E-94B5-2B0F87F4E351"}
{
"build" : "iPhone OS 17.4.1 (21E236)",
"product" : "iPhone14,5",
"socId" : "8110",
"socRevision" : "11",
"incident" : "EF71A412-71B4-454E-94B5-2B0F87F4E351",
"crashReporterKey" : "72448e7657e5df7bc776650bcc23f455db8ec2db",
"kernel" : "Darwin Kernel Version 23.4.0: Fri Mar 8 23:31:19 PST 2024; root:xnu-10063.102.14~67\/RELEASE_ARM64_T8110",
"date" : "2024-05-12 02:20:34.86 -0700",
"panicString" : "panic(cpu 3 caller 0xfffffff04483eae8): AOP DATA ABORT pc=0x000000000110baec Exception class=0x25 (Data Abort taken without a change in Exception level), IL=1, iss=0x6 far=000000000000000000 - main(5) OUTBOX3 not ready - \nuser handlers:\nEiger::probe=0 [e4 30 1] conn=0\n\nMoly invalid smp cnt:0, int \nRTKit: RTKit-2419.102.1.debug - Client: iphone14aop:AppleSPUFirmwareBuilder-515.100.32~7989\n!UUID: 762abda2-2b35-3ada-bd31-2c10ecaae9c9\nTime: 0x00000017fd680744\n\nFaulting task stack frame:\nWrong frame size for ARMv8. Got 840 bytes, expected 828\n pc=0x000000000110baec Exception class=0x25 (Data Abort taken without a change in Exception level), IL=1, iss=0x6 far=000000000000000000\n r00=000000000000000000 r01=0x00000000011c8b50 r02=0xffffffffef010e40 r03=0x0000000000000001\n r04=0x000000001000001d r05=0x0000000000000020 r06=0x0000000020504f41 r07=0x00000000f533cf91\n r08=0x0000000000000001 r09=0x000000000117ce00 r10=0x000000000117ce00 r11=0x00000000011c7648\n r12=0x00000000000014f0 r13=0x00000000011c7648 r14=0x00000000011c8aec r15=0x47c20d24bf800000\n r16=0x0000000000000030 r17=0x3b5f0000011891d8 r18=000000000000000000 r19=0x0000000000000033\n r20=000000000000000000 r21=0x0000000000004074 r22=000000000000000000 r23=0x00000000011cfe60\n r24=0x00000000011ce400 r25=0x00000000011c8afc r26=0x00000000011c8aec r27=0x0000000000000068\n r28=0xffffffffef010da0 r29=0xffffffffef010eb0\n sp=0xffffffffef010da0 lr=0x000000000101606c pc=0x000000000110baec psr=0x60000004\n psr=0x60000004 cpacr=0x300000 fpsr=0x000010 fpcr=00000000\n\nFaulting task 5 Call Stack: 0x000000000110baec 0x00000000010151f0 0x0000000001015324 0x000000000110510c 0x00000000010ebde8\nRTKit Task List:\n name pri stack use status resource warning\n 0 audio 017 2944\/4096 SEMWAIT 0x1219c00 \n 0x00000000010eb264 0x00000000010ec7dc 0x0000000001105098 0x00000000010ebde8\n\n 1 rtk_ep_work 057 864\/2048 SEMWAIT 0x117eb00 \n 0x00000000010eb264 0x00000000010ec7dc 0x0000000001105098 0x00000000010ebde8\n\n 2 power 000 1328\/2048 RUNNABLE 0x11a12c0 \n 0x00000000010eb264 0x0000000001103e48 0x0000000001103b34 0x00000000010ebde8\n\n 3 os_log_wl 013 784\/4096 SEMWAIT 0x114bf40 \n 0x00000000010eb264 0x00000000010ec7dc 0x0000000001105098 0x00000000010ebde8\n\n 4 log_flush 015 912\/4096 SEMWAIT 0x117b2a0 \n 0x00000000010eb264 0x00000000010ec7dc 0x0000000001109f10 0x00000000010ebde8\n\n 5 main 015 3952\/8192 RUNNABLE 0 [Faulting task]\n\n 6 tracekit_wl 013 592\/2048 SEMWAIT 0x114a740 \n 0x00000000010e71a4 0x00000000010ec7dc 0x0000000001105098 0x00000000010ebde8\n\n 7 pearl 020 1856\/4096 SEMWAIT 0xffffffffef030f40 \n 0x00000000010eb264 0x00000000010ec7dc 0x0000000001105098 0x00000000010ebde8\n\n 8 prox 014 3696\/4096 SEMWAIT 0x1242600 \n 0x00000000010eb264 0x00000000010ec7dc 0x0000000001105098 0x00000000010ebde8\n\n 9 voicetrigger 013 496\/6144 SEMWAIT 0x1188720 \n 0x00000000010eb264 0x00000000010ec7dc 0x00000000010ecfe8 0x0000000001077900 0x00000000010778d4 0x00000000010ebde8\n\n10 cma 011 6432\/12288 SEMWAIT 0x115a020 \n 0x00000000010eb264 0x00000000010ec7dc 0x0000000001105098 0x00000000010ebde8\n\n\nChinook ASC Async error info: \nl2c_err_sts 0x5000fbfc00000000, l2c_err_adr 000000000000000000, l2c_err_inf 000000000000000000\nlsu_err_sts 000000000000000000, fed_err_sts 000000000000000000, mmu_err_sts 000000000000000000\ndpc_err_sts 000000000000000000\n\nMailbox (0): (0)\n Inbox AKF_KIC_INBOX_CTRL = 0x0002dd01, AKF_KIC_MAILBOX_SET = 0x11111101\n Outbox AKF_AP_OUTBOX_CTRL = 0x00020001, AKF_AP_MAILBOX_SET = 0x00000000\n\n dir endpoint timestamp msg\n ==== ============ ================== ==================\n [TX] user07 0x00000017fd586c00 0x0085000000000005\n [RX] management 0x00000017fd66d538 0x00b0000000000020\n [TX] management 0x00000017fd66dc0c 0x00b0000000000020\n [RX] user14 0x00000017fd67a02c 0x00a3000000000000\n [RX] user27 0x00000017fd67a34c 0x00a3000000000000\n [RX] user01 0x00000017fd67a828 0x00a3000000000000\n [RX] user18 0x00000017fd67acb4 0x00a3000000000000\n [RX] user04 0x00000017fd67b33c 0x00a3000000000000\n [RX] user19 0x00000017fd67baa4 0x00a3000000000000\n [RX] user05 0x00000017fd67c098 0x00a3000000000000\n [RX] user24 0x00000017fd67c41c 0x00a3000000000000\n [RX] user17 0x00000017fd67c7dc 0x00a3000000000000\n [RX] user10 0x00000017fd67cb38 0x00a3000000000000\n [RX] user23 0x00000017fd67d0e4 0x00a3000000000000\n [RX] user25 0x00000017fd67d444 0x00a3000000000000\n [RX] user11 0x00000017fd67d768 0x00a3000000000000\n [RX] user07 0x00000017fd67d934 0x00a3000000000000\n [RX] user08 0x00000017fd67d9d4 0x00a3000000000000\n [RX] user03 0x00000017fd67dce4 0x00a3000000000000\n [RX] user22 0x00000017fd67e2dc 0x00a3000000000000\n [RX] user28 0x00000017fd67e4a4 0x00a3000000000000\n [RX] user26 0x00000017fd67e8f4 0x00a3000000000000\n [RX] user02 0x00000017fd67eb70 0x00a3000000000000\n [RX] user20 0x00000017fd67ef54 0x00a3000000000000\n [RX] user31 0x00000017fd67f1ec 0x00a3000000000000\n [RX] user16 0x00000017fd67f504 0x00a3000000000000\n [RX] user29 0x00000017fd67f67c 0x00a3000000000000\n [RX] user06 0x00000017fd67f714 0x00a3000000000000\n [RX] user13 0x00000017fd67f8a8 0x00a3000000000000\n [RX] user09 0x00000017fd67fcd8 0x00a3000000000000\n [RX] user12 0x00000017fd67fe64 0x00a3000000000000\n [RX] user21 0x00000017fd67ffd0 0x00a3000000000000\nSMB Registers: 0x119b898\n smsta: 0x08110118\n mcnt : 0x00000000\n xfsta: 0x00000000\n imask: 0x04a00040\nSMB Registers: 0x119b958\n smsta: 0x08110118\n mcnt : 0x00000000\n xfsta: 0x00000000\n imask: 0x04a00040\nSMB Registers: 0x119ba18\n smsta: 0x08110118\n mcnt : 0x00000000\n xfsta: 0x00000000\n imask: 0x04a00040\nFound SCM Data: spi0\nFound SCM Data: spi1\nFound SCM Data: i2cm0\nFound SCM Data: i2cm1\nFound SCM Data: i2cm2\nMailbox (3): (2)\n Inbox AKF_KIC_INBOX_CTRL = 0x00020001, AKF_KIC_MAILBOX_SET = 0x11111101\n Outbox AKF_AP_OUTBOX_CTRL = 0x00000000, AKF_AP_MAILBOX_SET = 0x00000000\nOUTBOX not ready \n\n dir endpoint timestamp msg\n ==== ============ ================== ==================\n [RX] user01 0x0000000eea088ca8 0x0085000000000000\n [RX] user01 0x0000000eea0ed2cc 0x0085000000000000\n [RX] user01 0x0000000eea150664 0x0085000000000000\n [RX] user01 0x0000000eea1b46c8 0x0085000000000000\n [RX] user01 0x0000000eea2119f0 0x0085000000000000\n [RX] user01 0x0000000eea2728dc 0x0085000000000000\n [RX] user01 0x0000000eea2d4ddc 0x0085000000000000\n [RX] user01 0x0000000eea3320a4 0x0085000000000000\n [RX] user01 0x0000000eea393278 0x0085000000000000\n [RX] user01 0x0000000eea3f23c0 0x0085000000000000\n [RX] user01 0x0000000eea8889d4 0x0085000000000000\n [RX] user01 0x0000000eeb1adde4 0x0085000000000000\n [RX] user01 0x0000000eeb20fb70 0x0085000000000000\n [RX] user01 0x0000000eeb2712d4 0x0085000000000000\n [RX] user01 0x0000000eeb396400 0x0085000000000000\n [RX] user01 0x0000000eeca7b92c 0x0085000000000000\nMailbox (6): (4)\n Inbox AKF_KIC_INBOX_CTRL = 0x00020001, AKF_KIC_MAILBOX_SET = 0x11111101\n Outbox AKF_AP_OUTBOX_CTRL = 0x00020001, AP instance uninitialized\n\n\n dir endpoint timestamp msg\n ==== ============ ================== ==================\n [TX] user01 0x0000000c73836a4c 0x0085000000000000\n [TX] user01 0x0000000c76b2e778 0x0085000000000000\n [TX] user01 0x0000000c7ca0e834 0x0085000000000000\n [TX] user01 0x0000000c8c976aec 0x0085000000000000\n [TX] user01 0x0000000c92f62b2c 0x0085000000000000\n [TX] user01 0x0000000cca9e3530 0x0085000000000000\n [TX] user01 0x0000000ccf2a7c78 0x0085000000000000\n [TX] user01 0x0000000cfe24c2b0 0x0085000000000000\n [TX] user01 0x0000000d040d9cd4 0x0085000000000000\n [TX] user01 0x0000000de7b429d4 0x0085000000000000\n [TX] user01 0x0000000dec44648c 0x0085000000000000\n [TX] user01 0x0000000e8c60ef58 0x0085000000000000\n [TX] user01 0x0000000e91d6f2f0 0x0085000000000000\n [TX] user01 0x0000000ee8116b24 0x0085000000000000\n [TX] user01 0x0000000ef5408c84 0x0085000000000000\n [TX] user01 0x00000017fd5855a0 0x0085000000000000\nSleep Count: 1397140\nWake Count: 1388740\nDuty Cycle: 13\n\nuser handlers:\nEiger::probe=0 [e4 30 1] conn=0\n\nMoly invalid smp cnt:0, int val:42ae\n\nMoly invalid smp cnt:0, int val:42ae\n\nPrAS Comp = stat [0, 0], dbg [0, 430238, 36741, 0, 36741, 0, 1, 11302, 2] \n\n\n\nRTBuddy(AP): Debug info:\n_iopStatus = 0x8\n_powerStateChangeLocked = false\nMailbox Status:\nIDLE_STATUS: 0x00000028\nINBOX0_CTRL: 0x0002dd01\nOUTBOX0_CTRL: 0x00021101\nAP->IOP Mailbox Log:\nTimestamp Dir Message\n0x0000000ad1bb7454 [RX] 0x0085000000000000 0x0010780000000026\n0x0000000ad1bb8224 [TX] 0x00a4000000000000 0x0000000000000039\n0x0000000ad1bb85c4 [RX] Interrupt\n0x0000000ad1bb8640 [RX] 0x0087000000000000 0x0010890000000039\n0x0000000ad1bb894c [RX] Interrupt\n0x0000000ad1bb89cc [RX] 0x0085000000000000 0x00109a0000000026\n0x0000000ad1bb9590 [RX] Interrupt\n0x0000000ad1bb960c [RX] 0x0085000000000000 0x0010ab0000000026\n0x0000000ad1bb9a24 [TX] 0x00a4000000000000 0x0000000000000030\n0x0000000ad1bb9c40 [TX] 0x00a4000000000000 0x0000000000000027\n0x0000000ad1bba078 [RX] Interrupt\n0x0000000ad1bba0f0 [RX] 0x0085000000000000 0x0010bc0000000026\n0x0000000ad1bba460 [RX] Interrupt\n0x0000000ad1bba484 [RX] 0x0087000000000000 0x0010cd0000000030\n0x0000000ad1bba5ec [RX] Interrupt\n0x0000000ad1bba658 [RX] 0x0087000000000000 0x0010de0000000027\n0x0000000ad1bba70c [TX] 0x00a4000000000000 0x0000000000000020\n0x0000000ad1bbabcc [RX] Interrupt\n0x0000000ad1bbac48 [RX] 0x0087000000000000 0x0010ef0000000020\n0x0000000ad1bbb59c [RX] Interrupt\n0x0000000ad1bbb610 [RX] 0x0085000000000000 0x0010f00000000026\n0x0000000ad1bbbecc [TX] 0x00a4000000000000 0x0000000000000025\n0x0000000ad1bbc9a8 [RX] Interrupt\n0x0000000ad1bbcab8 [RX] 0x0087000000000000 0x0010010000000025\n0x0000000ad1bbce18 [TX] 0x00a4000000000000 0x0000000000000022\n0x0000000ad1bbd208 [RX] Interrupt\n0x0000000ad1bbd350 [RX] 0x0085000000000000 0x0010120000000026\n0x0000000ad1bbdc70 [RX] Interrupt\n0x0000000ad1bbdce8 [RX] 0x0087000000000000 0x0010230000000022\n0x0000000ad1bbdf20 [TX] 0x00a4000000000000 0x0000000000000035\n0x0000000ad1bbe3f0 [RX] Interrupt\n0x0000000ad1bbe410 [RX] 0x0087000000000000 0x0010340000000035\n0x0000000ad1bbe4b8 [TX] 0x00a4000000000000 0x0000000000000026\n0x0000000ad1bbe890 [RX] Interrupt\n0x0000000ad1bbe9ac [RX] 0x0087000000000000 0x0010450000000026\n0x0000000ad1bbefb4 [TX] 0x00a4000000000000 0x0000000000000037\n0x0000000ad1bbfe30 [RX] Interrupt\n0x0000000ad1bbfeb0 [RX] 0x0087000000000000 0x0010010000000037\n0x0000000ad1bc3398 [TX] 0x00a4000000000000 0x0000000000000038\n0x0000000ad1bc3e60 [RX] Interrupt\n0x0000000ad1bc3efc [RX] 0x0087000000000000 0x0010010000000038\n0x0000000ad1bc41f0 [TX] 0x00a4000000000000 0x000000000000003e\n0x0000000ad1bc482c [RX] Interrupt\n0x0000000ad1bc48cc [RX] 0x0087000000000000 0x001012000000003e\n0x0000000ad1bc6344 [TX] 0x00a4000000000000 0x000000000000003c\n0x0000000ad1bc6db8 [RX] Interrupt\n0x0000000ad1bc6e2c [RX] 0x0087000000000000 0x001001000000003c\n0x0000000ad1bccdec [TX] 0x00a4000000000000 0x0000000000000028\n0x0000000ad1bcdd38 [RX] Interrupt\n0x0000000ad1bcddd4 [RX] 0x0087000000000000 0x0010010000000028\n0x0000000ad1bce314 [TX] 0x00b0000000000201 000000000000000000\n0x0000000ad1bcebe4 [RX] Interrupt\n0x0000000ad1bcec98 [RX] 0x00b0000000000201 0x0010120000000000\n0x0000000ad1e0389c [TX] Interrupt\n0x0000000ad1e039a8 [TX] 0x00b0000000000020 000000000000000000\n0x0000000ad1e039ac [RX] Interrupt\n0x0000000ad1e03a54 [RX] 0x0085000000000005 0x0010010000000026\n0x0000000ad1e042fc [RX] Interrupt\n0x0000000ad1e04410 [RX] 0x00b0000000000020 0x0010120000000000\n0x0000000ad1e102f4 [TX] 0x00a3000000000000 0x000000000000002d\n0x0000000ad1e10960 [TX] 0x00a3000000000000 0x000000000000003a\n0x0000000ad1e10e4c [TX] 0x00a3000000000000 0x0000000000000020\n0x0000000ad1e11300 [TX] 0x00a3000000000000 0x0000000000000031\n0x0000000ad1e11984 [TX] 0x00a3000000000000 0x0000000000000023\n0x0000000ad1e120ec [TX] 0x00a3000000000000 0x0000000000000032\n0x0000000ad1e126e4 [TX] 0x00a3000000000000 0x0000000000000024\n0x0000000ad1e12a6c [TX] 0x00a3000000000000 0x0000000000000037\n0x0000000ad1e12e2c [TX] 0x00a3000000000000 0x0000000000000030\n0x0000000ad1e1318c [TX] 0x00a3000000000000 0x0000000000000029\n0x0000000ad1e13730 [TX] 0x00a3000000000000 0x0000000000000036\n0x0000000ad1e13a8c [TX] 0x00a3000000000000 0x0000000000000038\n0x0000000ad1e13db4 [TX] 0x00a3000000000000 0x000000000000002a\n0x0000000ad1e13e84 [TX] Interrupt\n0x0000000ad1e13f80 [TX] 0x00a3000000000000 0x0000000000000026\n0x0000000ad1e1402c [TX] 0x00a3000000000000 0x0000000000000027\n0x0000000ad1e1432c [TX] 0x00a3000000000000 0x0000000000000022\n0x0000000ad1e14924 [TX] 0x00a3000000000000 0x0000000000000035\n0x0000000ad1e14ae8 [TX] 0x00a3000000000000 0x000000000000003b\n0x0000000ad1e14f38 [TX] 0x00a3000000000000 0x0000000000000039\n0x0000000ad1e151c0 [TX] 0x00a3000000000000 0x0000000000000021\n0x0000000ad1e15594 [TX] 0x00a3000000000000 0x0000000000000033\n0x0000000ad1e15834 [TX] 0x00a3000000000000 0x000000000000003e\n0x0000000ad1e15b48 [TX] 0x00a3000000000000 0x000000000000002f\n0x0000000ad1e15cd0 [TX] 0x00a3000000000000 0x000000000000003c\n0x0000000ad1e15d78 [TX] 0x00a3000000000000 0x0000000000000025\n0x0000000ad1e15efc [TX] 0x00a3000000000000 0x000000000000002c\n0x0000000ad1e16318 [TX] 0x00a3000000000000 0x0000000000000028\n0x0000000ad1e164b4 [TX] 0x00a3000000000000 0x000000000000002b\n0x0000000ad1e1661c [TX] 0x00a3000000000000 0x0000000000000034\n0x0000000ad1e1d7fc [RX] Interrupt\n0x0000000ad1e1d880 [RX] 0x0010400000048000 0x0010010000000001\n0x0000000ad1bb16b4 [RX] 0x0087000000000000 0x0010ab0000000024\n0x0000000ad1bb1948 [TX] 0x00a4000000000000 0x000000000000002c\n0x0000000ad1bb209c [TX] 0x00a4000000000000 0x000000000000002a\n0x0000000ad1bb20b8 [TX] 0x00a4000000000000 0x000000000000003b\n0x0000000ad1bb2174 [TX] 0x00a4000000000000 0x0000000000000031\n0x0000000ad1bb2440 [RX] Interrupt\n0x0000000ad1bb24c8 [RX] 0x0087000000000000 0x0010bc000000002c\n0x0000000ad1bb2664 [RX] Interrupt\n0x0000000ad1bb26f4 [RX] 0x0087000000000000 0x0010cd000000002a\n0x0000000ad1bb27c8 [RX] Interrupt\n0x0000000ad1bb2870 [RX] 0x0087000000000000 0x0010de0000000031\n0x0000000ad1bb2af4 [RX] Interrupt\n0x0000000ad1bb2b6c [RX] 0x0087000000000000 0x0010ef000000003b\n0x0000000ad1bb3314 [TX] 0x00a4000000000000 0x000000000000002b\n0x0000000ad1bb33cc [TX] 0x00a4000000000000 0x000000000000002f\n0x0000000ad1bb3840 [RX] Interrupt\n0x0000000ad1bb38f8 [RX] 0x0087000000000000 0x0010f0000000002b\n0x0000000ad1bb3a58 [RX] Interrupt\n0x0000000ad1bb3acc [RX] 0x0087000000000000 0x001001000000002f\n0x0000000ad1bb3e10 [TX] 0x00a4000000000000 0x0000000000000033\n0x0000000ad1bb425c [RX] Interrupt\n0x0000000ad1bb42d4 [RX] 0x0087000000000000 0x0010120000000033\n0x0000000ad1bb4624 [TX] 0x00a4000000000000 0x0000000000000032\n0x0000000ad1bb4b50 [RX] Interrupt\n0x0000000ad1bb4be4 [TX] 0x00a4000000000000 0x0000000000000023\n0x0000000ad1bb4bf0 [RX] 0x0087000000000000 0x0010230000000032\n0x0000000ad1bb5044 [RX] Interrupt\n0x0000000ad1bb50ec [RX] 0x0087000000000000 0x0010340000000023\n0x0000000ad1bb5394 [TX] 0x00a4000000000000 0x0000000000000021\n0x0000000ad1bb575c [RX] Interrupt\n0x0000000ad1bb57e4 [TX] 0x00a4000000000000 0x0000000000000034\n0x0000000ad1bb57f8 [RX] 0x0087000000000000 0x0010450000000021\n0x0000000ad1bb5a94 [RX] Interrupt\n0x0000000ad1bb5ab0 [RX] 0x0087000000000000 0x0010560000000034\n0x0000000ad1bb6894 [RX] Interrupt\n0x0000000ad1bb6908 [RX] 0x0085000000000000 0x0010670000000026\n0x0000000ad1bb73d4 [RX] Interrupt\n\nDebugger message: panic\nMemory ID: 0xff\nOS release type: User\nOS version: 21E236\nKernel version: Darwin Kernel Version 23.4.0: Fri Mar 8 23:31:19 PST 2024; root:xnu-10063.102.14~67\/RELEASE_ARM64_T8110\nFileset Kernelcache UUID: C9A613E1AD603469931D7C4F3C4D9305\nKernel UUID: 3F715130-4277-3E54-BE34-D1019A869CE2\nBoot session UUID: EF71A412-71B4-454E-94B5-2B0F87F4E351\niBoot version: iBoot-10151.102.2\nsecure boot?: YES\nroots installed: 0\nPaniclog version: 14\nDebug Header address: 0xfffffff021a05000\nDebug Header entry count: 3\nTXM load address: 0xfffffff0319a4000\nTXM UUID: 90FED2B4-3E34-3D02-9C9F-56BC642EE852\nDebug Header kernelcache load address: 0xfffffff0419a4000\nDebug Header kernelcache UUID: C9A613E1-AD60-3469-931D-7C4F3C4D9305\nSPTM load address: 0xfffffff0219a4000\nSPTM UUID: 3F91F0C9-F270-3C3B-B2AC-12EBCBB4412F\nKernelCache slide: 0x000000003a9a0000\nKernelCache base: 0xfffffff0419a4000\nKernel slide: 0x000000003a9a8000\nKernel text base: 0xfffffff0419ac000\nKernel text exec slide: 0x000000003b6e4000\nKernel text exec base: 0xfffffff0426e8000\nmach_absolute_time: 0xad40dd045\nEpoch Time: sec usec\n Boot : 0x6640790b 0x0004d4ad\n Sleep : 0x6640896f 0x000db7ed\n Wake : 0x664089c8 0x000a6fb7\n Calendar: 0x664089ca 0x0003391c\n\nZone info:\n Zone map: 0xffffffe0d0d78000 - 0xffffffe6d0d78000\n . VM : 0xffffffe0d0d78000 - 0xffffffe1b73dc000\n . RO : 0xffffffe1b8000000 - 0xffffffe206000000\n . GEN0 : 0xffffffe206000000 - 0xffffffe2ec084000\n . GEN1 : 0xffffffe2ec084000 - 0xffffffe3d2108000\n . GEN2 : 0xffffffe3d2108000 - 0xffffffe4b8190000\n . GEN3 : 0xffffffe4b8190000 - 0xffffffe59e218000\n . DATA : 0xffffffe59e218000 - 0xffffffe6d0d78000\n Metadata: 0xffffffdd2cb20000 - 0xffffffdd2e320000\n Bitmaps : 0xffffffdd2e320000 - 0xffffffdd2ed70000\n Extra : 0 - 0\n\nCORE 0 recently retired instr at 0xfffffff04286687c\nCORE 1 recently retired instr at 0xfffffff04286687c\nCORE 2 recently retired instr at 0xfffffff04286687c\nCORE 3 recently retired instr at 0xfffffff042865384\nCORE 4 recently retired instr at 0xfffffff04286687c\nCORE 5 recently retired instr at 0xfffffff04286687c\nTPIDRx_ELy = {1: 0xffffffe59dc2b260 0: 0x0000000000000003 0ro: 0x0000000000000000 }\nCORE 0: PC=0xfffffff0426ec824, LR=0x0000000000000000, FP=0x0000000000000000\nCORE 1: PC=0xfffffff0426ec824, LR=0x0000000000000000, FP=0x0000000000000000\nCORE 2: PC=0xfffffff042cbce5c, LR=0xfffffff042cbccc0, FP=0xffffffe063087c70\nCORE 3 is the one that panicked. Check the full backtrace for details.\nCORE 4: PC=0xfffffff042756d64, LR=0xfffffff042756d64, FP=0xffffffe063327ef0\nCORE 5: PC=0xfffffff042756d64, LR=0xfffffff042756d64, FP=0xffffffe063543ef0\nCompressor Info: 34% of compressed pages limit (OK) and 15% of segments limit (OK) with 2 swapfiles and OK swap space\nPanicked task 0xffffffe3d20743c0: 0 pages, 537 threads: pid 0: kernel_task\nPanicked thread: 0xffffffe59dc2b260, backtrace: 0xffffffe0634db810, tid: 1037\n\t\t lr: 0xfffffff0427245dc fp: 0xffffffe0634db890\n\t\t lr: 0xfffffff04285f5fc fp: 0xffffffe0634db900\n\t\t lr: 0xfffffff04285ddd0 fp: 0xffffffe0634db9e0\n\t\t lr: 0xfffffff0426ec748 fp: 0xffffffe0634db9f0\n\t\t lr: 0xfffffff0426ec6f0 fp: 0xffffffe0634dbdc0\n\t\t lr: 0xfffffff042e25ca0 fp: 0xffffffe0634dbde0\n\t\t lr: 0xfffffff04483eae8 fp: 0xffffffe0634dbe70\n\t\t lr: 0xfffffff044500a04 fp: 0xffffffe0634dbea0\n\t\t lr: 0xfffffff042d42c08 fp: 0xffffffe0634dbee0\n\t\t lr: 0xfffffff042d43520 fp: 0xffffffe0634dbf20\n\t\t lr: 0xfffffff0426ed024 fp: 0x0000000000000000\n Kernel Extensions in backtrace:\n com.apple.driver.IOSlaveProcessor(1.0)[9755DB6C-8931-3284-98CA-D54AE67D0FCF]@0xfffffff0444ff8d0->0xfffffff0445011f3\n com.apple.driver.RTBuddy(1.0)[BD55EBF5-58CD-304B-BEF9-7258C2428655]@0xfffffff04481a180->0xfffffff04485a1f3\n dependency: com.apple.driver.AppleA7IOP(1.0.2)[2FF168ED-7A80-37B5-B3C5-0615C8A37F82]@0xfffffff042f19b00->0xfffffff042f1f9bb\n dependency: com.apple.driver.AppleARMPlatform(1.0.2)[E523EAE1-2680-3F5D-A65E-9D7B7DCE5E38]@0xfffffff042f9bc80->0xfffffff042fedec3\n dependency: com.apple.driver.IOSlaveProcessor(1)[9755DB6C-8931-3284-98CA-D54AE67D0FCF]@0xfffffff0444ff8d0->0xfffffff0445011f3\n dependency: com.apple.iokit.CoreAnalyticsFamily(1)[5F80DCCF-E505-3A6B-9765-465117EB92D3]@0xfffffff043e39e90->0xfffffff043e4183b\n dependency: com.apple.iokit.IOReportFamily(47)[059EBEBD-F1B4-3056-BB74-C72111F2E453]@0xfffffff044498990->0xfffffff04449b7a7\n dependency: com.apple.kec.corecrypto(14.0)[6F0ADEB3-6F4E-340A-A8B7-B934314CE848]@0xfffffff0449dff80->0xfffffff044a3113b\n\nlast started kext at 507807801: com.apple.driver.AppleMultitouchDriver\t7140.17 (addr 0xfffffff041da0510, size 23287)\nloaded kexts:\ncom.apple.iokit.IOAccessoryPortUSB\t1.0.0\ncom.apple.driver.AppleIDAMInterface\t1\ncom.apple.driver.AppleUSBDeviceMux\t1.0.0d1\ncom.apple.driver.AppleUSBMike\t1.0.0d1\ncom.apple.driver.AppleUSBEthernetDevice\t7.0\ncom.apple.driver.AppleUSBDeviceNCM\t5.0.0\ncom.apple.driver.AppleProxDriver\t31.7\ncom.apple.driver.AOPTouchKext\t312\ncom.apple.driver.AppleAOPAD5860\t740.41\ncom.apple.driver.AppleAOPHaptics\t740.41\ncom.apple.driver.AppleEmbeddedLightSensor\t1.0.0d1\ncom.apple.driver.AppleALSColorSensor\t1.0.0d1\ncom.apple.driver.AppleAOPVoiceTrigger\t340.42\ncom.apple.driver.AppleHapticsSupportNVM\t8.11\ncom.apple.driver.AppleBasebandPCIMAVPDP\t1\ncom.apple.driver.AppleIDV\t6.406\ncom.apple.driver.AppleSmartIO2\t1\ncom.apple.driver.ApplePMP\t1\ncom.apple.driver.AppleEmbeddedTouchEEPROM\t1\ncom.apple.driver.AppleProResHW\t350.47.0\ncom.apple.driver.ApplePMPFirmware\t1\ncom.apple.AGXG14P\t280.3.9\ncom.apple.nke.l2tp\t1.9\ncom.apple.filesystems.tmpfs\t1\ncom.apple.driver.AppleSMCWirelessCharger\t1.0.1\ncom.apple.filesystems.lifs\t1\ncom.apple.filesystems.apfs\t2236.102.1\ncom.apple.IOTextEncryptionFamily\t1.0.0\ncom.apple.filesystems.hfs.kext\t650.0.2\ncom.apple.AppleFSCompression.AppleFSCompressionTypeZlib\t1.0.0\ncom.apple.driver.AppleHapticsSupportLEAP\t8.11\ncom.apple.driver.AudioDMAController-T8110\t340.58\ncom.apple.driver.AppleJPEGDriver\t6.6.2\ncom.apple.driver.AppleGenericMultitouch\t23\ncom.apple.driver.AppleCS42L77Audio\t740.41\ncom.apple.driver.AppleCS35L27Amp\t740.41\ncom.apple.driver.AppleFAN53740\t1\ncom.apple.driver.AppleParrot\t1\ncom.apple.driver.AppleAVE2\t760.23.1\ncom.apple.driver.AppleEmbeddedAudioResourceManager\t740.41\ncom.apple.driver.AppleT8030SOCTuner\t1\ncom.apple.driver.AppleT8110CLPC\t1\ncom.apple.driver.AppleBluetoothModule\t1\ncom.apple.driver.AppleAVD\t740.5\ncom.apple.driver.AppleMobileDispH14P-DCP\t140.0\ncom.apple.driver.AppleS5L8940XI2C\t1.0.0d2\ncom.apple.driver.AppleSPIMC\t1\ncom.apple.driver.AppleSamsungSerial\t1.0.0d1\ncom.apple.driver.AppleSerialShim\t1\ncom.apple.driver.AppleT8110DART\t1\ncom.apple.driver.AppleS8000AES\t1\ncom.apple.driver.AppleEventLogHandler\t1\ncom.apple.driver.AppleS5L8920XPWM\t1.0.0d1\ncom.apple.driver.AppleS8000DWI\t1.0.0d1\ncom.apple.driver.AppleS5L8960XNCO\t1\ncom.apple.driver.AppleT8110PMGR\t1\ncom.apple.driver.AppleInterruptControllerV2\t1.0.0d1\ncom.apple.driver.AppleT8110\t1\ncom.apple.driver.AppleM68Buttons\t1.0.0d1\ncom.apple.iokit.IOUserEthernet\t1.0.1\ncom.apple.driver.IOAudioCodecs\t1.0.0\ncom.apple.driver.AppleTemperatureSensor\t1.0.0d1\ncom.apple.driver.AppleDiskImages2\t276.100.16\ncom.apple.driver.ASIOKit\t11.77\ncom.apple.security.sandbox\t300.0\ncom.apple.driver.AppleMultitouchDriver\t7140.17\ncom.apple.driver.AppleUSBDeviceAudioController\t640.12\ncom.apple.driver.AppleUSBAudio\t640.12\ncom.apple.driver.usb.networking\t5.0.0\ncom.apple.driver.ApplePearlSEPDriver\t1\ncom.apple.iokit.IOBiometricFamily\t1\ncom.apple.iokit.AppleSEPGenericTransfer\t1\ncom.apple.plugin.IOgPTPPlugin\t1240.15\ncom.apple.driver.AppleAOPAudio\t340.4\ncom.apple.driver.AppleSPUSphere\t1\ncom.apple.driver.AppleSPURose\t1\ncom.apple.driver.AppleBasebandPCIMAVControl\t1\ncom.apple.driver.AppleBasebandPCI\t1\ncom.apple.iokit.IOMIPIFamily\t1\ncom.apple.AGXFirmwareKextG14PRTBuddy\t1\ncom.apple.AGXFirmwareKextRTBuddy64\t280.3.9\ncom.apple.driver.AppleConvergedIPCOLYBTControl\t1\ncom.apple.driver.AppleConvergedPCI\t1\ncom.apple.driver.AppleH11ANEInterface\t7.400.0\ncom.apple.driver.DCPAVFamilyProxy\t1\ncom.apple.iokit.IOGPUFamily\t93.40.3\ncom.apple.nke.ppp\t1.9\ncom.apple.driver.AppleC26Charger\t1.0.1\ncom.apple.driver.AppleAstrisGpioProbe\t1.0.1\ncom.apple.driver.AppleDiagnosticDataAccessReadOnly\t1.0.0\ncom.apple.driver.AppleBSDKextStarter\t3\ncom.apple.driver.usb.AppleUSBHostPacketFilter\t1.0\ncom.apple.driver.AppleHIDTransportSPI\t7140.3\ncom.apple.driver.AppleHIDTransportFIFO\t7140.3\ncom.apple.driver.AppleHIDTransport\t7140.3\ncom.apple.driver.AppleSPU\t1\ncom.apple.driver.AppleInputDeviceSupport\t7140.3\ncom.apple.driver.AppleSmartBatteryManagerEmbedded\t1\ncom.apple.driver.AppleAuthCP\t1.0.0\ncom.apple.iokit.IOMikeyBusFamily\t1.0.0\ncom.apple.driver.AppleCSEmbeddedAudio\t740.41\ncom.apple.iokit.IONVMeFamily\t2.1.0\ncom.apple.driver.AppleNANDConfigAccess\t1.0.0\ncom.apple.driver.AppleEmbeddedAudio\t740.41\ncom.apple.iokit.AppleARMIISAudio\t340.16\ncom.apple.driver.IISAudioIsolatedStreamECProxy\t340.16\ncom.apple.driver.ExclavesAudioKext\t1\ncom.apple.driver.AppleTriStar\t1.0.0\ncom.apple.driver.AppleMobileApNonce\t1\ncom.apple.driver.AppleMCA2-T8110\t840.3\ncom.apple.driver.AppleT8110PCIe\t1\ncom.apple.driver.AppleEmbeddedAudioLibs\t340.8\ncom.apple.driver.AppleOLYHAL\t1\ncom.apple.driver.AppleH13CameraInterface\t8.410.0\ncom.apple.driver.AppleH10PearlCameraInterface\t20.402.0\ncom.apple.driver.ApplePPMCPMS\t3.0\ncom.apple.driver.AppleBluetoothDebug\t1\ncom.apple.driver.AppleBluetoothDebugService\t1\ncom.apple.iokit.IOMobileGraphicsFamily-DCP\t343.0.0\ncom.apple.driver.AppleDCP\t1\ncom.apple.driver.AppleFirmwareKit\t1\ncom.apple.driver.AppleFirmwareUpdateKext\t1\ncom.apple.iokit.IOMobileGraphicsFamily\t343.0.0\ncom.apple.driver.AppleM2ScalerCSCDriver\t265.0.0\ncom.apple.driver.AppleUSBXDCIARM\t1.0\ncom.apple.driver.AppleUSBXDCI\t1.0\ncom.apple.iokit.IOUSBDeviceFamily\t2.0.0\ncom.apple.driver.usb.AppleSynopsysUSBXHCI\t1\ncom.apple.driver.usb.AppleUSBXHCI\t1.2\ncom.apple.driver.AppleEmbeddedUSBHost\t1\ncom.apple.driver.usb.AppleUSBHub\t1.2\ncom.apple.driver.usb.AppleUSBHostCompositeDevice\t1.2\ncom.apple.driver.AppleT8101TypeCPhy\t1\ncom.apple.driver.AppleTypeCPhy\t1\ncom.apple.iokit.IOPortFamily\t1.0\ncom.apple.driver.AppleStockholmControl\t1.0.0\ncom.apple.driver.ApplePhoneBTM\t1.0.1\ncom.apple.driver.IOHIDPowerSource\t1\ncom.apple.driver.AppleCallbackPowerSource\t1\ncom.apple.driver.AppleSPMIPMU\t1.0.1\ncom.apple.driver.AppleDialogPMU\t1.0.1\ncom.apple.driver.AppleSPMI\t1.0.1\ncom.apple.driver.AppleDockChannel\t1\ncom.apple.driver.AppleSART\t1\ncom.apple.driver.AppleA7IOP-ASCWrap-v4\t1.0.2\ncom.apple.driver.AppleGPIOICController\t1.0.2\ncom.apple.driver.AppleARMWatchdogTimer\t1\ncom.apple.driver.AppleFireStormErrorHandler\t1\ncom.apple.driver.AppleBasebandM20\t1.0.0d1\ncom.apple.driver.AppleMultiFunctionManager\t1\ncom.apple.driver.corecapture\t1.0.4\ncom.apple.driver.AppleEmbeddedPCIE\t1\ncom.apple.iokit.IOUSBMassStorageDriver\t245\ncom.apple.iokit.IOSCSIArchitectureModelFamily\t495\ncom.apple.iokit.IOPCIFamily\t2.9\ncom.apple.iokit.IOUSBHostFamily\t1.2\ncom.apple.driver.AppleUSBHostMergeProperties\t1.2\ncom.apple.driver.usb.AppleUSBCommon\t1.0\ncom.apple.iokit.IOTimeSyncFamily\t1240.15\ncom.apple.driver.DiskImages\t493.0.0\ncom.apple.driver.AppleSMC\t3.1.9\ncom.apple.driver.RTBuddy\t1.0.0\ncom.apple.driver.AppleEmbeddedTempSensor\t1.0.0\ncom.apple.driver.AppleARMPMU\t1.0\ncom.apple.iokit.IOAccessoryManager\t1.0.0\ncom.apple.iokit.IOHIDFamily\t2.0.0\ncom.apple.driver.AppleOnboardSerial\t1.0\ncom.apple.iokit.IOSerialFamily\t11\ncom.apple.driver.AppleSEPKeyStore\t2\ncom.apple.driver.AppleEffaceableStorage\t1.0\ncom.apple.driver.AppleSEPCredentialManager\t1.0\ncom.apple.driver.AppleLockdownMode\t1\ncom.apple.driver.AppleIPAppender\t1.0\ncom.apple.iokit.IOSkywalkFamily\t1.0\ncom.apple.driver.mDNSOffloadUserClient-Embedded\t1.0.1b8\ncom.apple.iokit.IONetworkingFamily\t3.4\ncom.apple.AUC\t1.0\ncom.apple.iokit.IOSurface\t352.41.7\ncom.apple.iokit.IOAVFamily\t1.0.0\ncom.apple.iokit.IOHDCPFamily\t1.0.0\ncom.apple.iokit.IOCECFamily\t1\ncom.apple.iokit.IOAudio2Family\t1.0\ncom.apple.driver.AppleIISController\t340.1\ncom.apple.driver.AppleAudioClockLibs\t340.8\ncom.apple.driver.AppleSSE\t1.0\ncom.apple.driver.AppleSEPManager\t1.0.1\ncom.apple.driver.IODARTFamily\t1\ncom.apple.driver.AppleA7IOP\t1.0.2\ncom.apple.driver.IOSlaveProcessor\t1\ncom.apple.driver.FairPlayIOKit\t71.10.0\ncom.apple.kext.AppleMatch\t1.0.0d1\ncom.apple.driver.AppleMobileFileIntegrity\t1.0.5\ncom.apple.iokit.CoreAnalyticsFamily\t1\ncom.apple.driver.ApplePMGR\t1\ncom.apple.driver.AppleARMPlatform\t1.0.2\ncom.apple.iokit.IOStorageFamily\t2.1\ncom.apple.iokit.IOSlowAdaptiveClockingFamily\t1.0.0\ncom.apple.iokit.IOReportFamily\t47\ncom.apple.security.AppleImage4\t6.3.0\ncom.apple.kext.CoreTrust\t1\ncom.apple.iokit.IOCryptoAcceleratorFamily\t1.0.1\ncom.apple.kec.pthread\t1\ncom.apple.kec.Libm\t1\ncom.apple.kec.Compression\t1.0\ncom.apple.kec.corecrypto\t14.0\n\n",
"panicFlags" : "0x802",
"bug_type" : "210",
"otherString" : "\n** Stackshot Succeeded ** Bytes Traced 323993 (Uncompressed 805312) **\n",
"utilizationMetricPanicRegionSizeInBytes" : "835528",
"utilizationMetricUsedSizeInBytes" : "353999",
"utilizationMetricPercentUsed" : "42",
"utilizationMetricPanicLogLengthInBytes" : "29765",
"utilizationMetricStackshotLengthInBytes" : "323993",
"utilizationMetricOtherLogLengthInBytes" : "72",
"repairStatus" : "1",
"memoryStatus" : {"compressorSize":28253,"compressions":505891,"decompressions":339926,"busyBufferCount":0,"memoryPressureDetails":{"pagesWanted":0,"pagesReclaimed":0},"pageSize":16384,"memoryPressure":false,"memoryPages":{"active":70403,"throttled":0,"fileBacked":51622,"wired":49991,"purgeable":2083,"inactive":70063,"free":2331,"speculative":347}},
"processByPid" : {
"0" : {"timesThrottled":0,"pageIns":0,"rawFlags":"0x20800001","timesDidThrottle":0,"procname":"kernel_task","jetsamCoalition":3,"copyOnWriteFaults":0,"pageFaults":3966,"threadById":{"885":{"continuation":[1,6665380],"userTime":6.2500000000000005e-07,"systemTime":3.5410000000000001e-06,"id":885,"basePriority":81,"name":"AppleDCPLinkServiceSoC","user_usec":0,"schedPriority":81,"system_usec":3,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926673995]},"330":{"userTime":0.029772707999999998,"systemTime":0.104515125,"name":"RTBuddy(DCP)","id":330,"basePriority":81,"user_usec":29772,"system_usec":104515,"schedPriority":81,"kernelFrames":[[1,431460],[1,424660],[1,6665716],[1,20516]],"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926637707]},"919":{"continuation":[1,6665380],"userTime":0.00047958300000000001,"systemTime":0.00364125,"id":919,"basePriority":81,"name":"DCPEndpoint9","user_usec":479,"schedPriority":81,"system_usec":3641,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926659195]},"996":{"continuation":[1,6665380],"userTime":0,"systemTime":5.1660000000000002e-06,"id":996,"basePriority":81,"name":"AppleCS42L77Audio","user_usec":0,"schedPriority":81,"system_usec":5,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926606139]},"552":{"continuation":[1,2253800],"userTime":2.425e-05,"systemTime":0.00040704100000000002,"id":552,"basePriority":81,"user_usec":24,"system_usec":407,"schedPriority":81,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[0,2910216]},"1505":{"continuation":[12,591032],"userTime":0.40804804099999997,"systemTime":1.5374997500000001,"id":1505,"basePriority":31,"name":"apfs_purgatory_cleaner","user_usec":408048,"schedPriority":31,"system_usec":1537499,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620822071556371]},"886":{"continuation":[1,6665380],"userTime":0,"systemTime":3.5829999999999998e-06,"id":886,"basePriority":81,"name":"AppleDCPLinkServiceSoC","user_usec":0,"schedPriority":81,"system_usec":3,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926667595]},"775":{"continuation":[1,6665380],"userTime":0,"systemTime":3.2499999999999998e-06,"id":775,"basePriority":81,"user_usec":0,"system_usec":3,"schedPriority":81,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926661995]},"809":{"continuation":[1,6665380],"userTime":0,"systemTime":1.75e-06,"id":809,"basePriority":81,"user_usec":0,"system_usec":1,"schedPriority":81,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926662395]},"553":{"continuation":[1,6665380],"userTime":6.4165999999999995e-05,"systemTime":0.0049028329999999997,"id":553,"basePriority":81,"name":"AudioDMAController","user_usec":64,"schedPriority":81,"system_usec":4902,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926637867]},"332":{"continuation":[1,6665380],"userTime":8.0375000000000002e-05,"systemTime":0.0028022910000000002,"id":332,"basePriority":81,"name":"ApplePMGRNub","user_usec":80,"schedPriority":81,"system_usec":2802,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926657131]},"665":{"continuation":[1,6665380],"userTime":0.037647666000000003,"systemTime":1.2464859580000001,"id":665,"basePriority":81,"name":"IOSurfaceRoot","user_usec":37647,"schedPriority":81,"system_usec":1246485,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926660555]},"554":{"continuation":[1,6665380],"userTime":0.047117290999999999,"systemTime":0.33297645799999998,"id":554,"basePriority":81,"name":"AppleM2ScalerCSCDriver","user_usec":47117,"schedPriority":81,"system_usec":332976,"state":["TH_WAIT","TH_UNINT"],"waitEvent":[2,10794620825926634587]},"110":{"continuation":[1,468488],"userTime":0.00046845799999999999,"systemTime":0.00085895800000000005,"id":110,"bas
submitted by cuddlypuppylover39 to mobilerepair [link] [comments]


2024.05.13 01:22 kenjitamurako X2GoHTMLClient Caddyfile

Original Nginx: https://wiki.x2go.org/doku.php/wiki:advanced:x2gohtmlclient
So I spent this weekend porting the Nginx configuration sample from the X2GoHTMLClient documentation to Caddy and it looks to be fully functional. However, I'm not sure if it's a Caddy, Firefox, or X2Go issue but there were some keys on my standard US keyboard that would not register key press events when used with Firefox.
The "-" next to 0 gave no input and "=" next to backspace was mapped to the "/" key. This issue wasn't present in Chrome and if it matters my setup was Xubuntu 24.04 installed to the Ayaneo AM01.
Caddy and FCGIWrap were installed as systemd services so additional changes to folder permissions and the systemd configuration files were needed for this to work. The folders/files had chmod caddy:caddy done to them, the systemd configurations had the usegroup updated to caddy, and the fcgiwrap.socket configuration had WorkingDirectory set to /varun/caddy/.
Another change I made for myself was add some javascript to the Index.html file to resize the canvas to 90% of window.innerHeight and window.innerWidth. The Index.html distributed with the demo client is hardcoded at 1280x920.
``` caddy.sample.cc { tls /etc/ssl/caddy/domain.cert.pem /etc/ssl/caddy/private.key.pem root * /vawww/html
header /assets/* { Strict-Transport-Security "max-age=31536000" Content-Security-Policy "default-src 'self' 'unsafe-inline' data: blob: ws: wss:; script-src 'self' 'unsafe-inline'" Feature-Policy "vibrate 'none' ; microphone 'none' ; camera 'none' ; gyroscope 'none' ; magnetometer 'none' ; geolocation 'none' ; midi 'self' ; notifications 'self' ; push 'self' ; sync-xhr 'self'" Referrer-Policy "same-origin" X-Content-Type-Options "nosniff" X-Frame-Options "SAMEORIGIN" } @cgi path *.cgi handle @cgi { reverse_proxy unix//varun/caddy/fcgiwrap.socket { transport fastcgi { split .cgi } } } # capture port instructed by x2gorpc.cgi @x2gows_matcher { path_regexp portmatch \/x2gows\/(.*)$ } handle @x2gows_matcher { # requires specifying subdomain as using localhost can give SSL error reverse_proxy caddy.sample.cc:{re.portmatch.1} { transport http { tls } } } handle { file_server } 
}
```
Disclaimer: I had no experience with setting up web servers before doing this.
submitted by kenjitamurako to caddyserver [link] [comments]


2024.05.12 10:09 Miserable-Force-6806 uaap tix

hello po, baka lang mag nakakaalam pag po ba sa smtix bumili ng uaap tix for game two, valid/applicable pa rin po ba siya for both games (men's and women's) tulad nung sa ipea?
submitted by Miserable-Force-6806 to Tomasino [link] [comments]


2024.05.11 03:48 Hanuman9 Wordpress Admin in Docker Redirecting to Root Ignoring WP_HOME

I deployed Wordpress+OpenLiteSpeed within Docker. NGINX server is doing a proxy_pass to the docker servers.
Blog is deployed at mydomain.com/blog, and the blog works fine. EXCEPT after logging in, the admin panel redirects back to the root. Admin panel is unusable since all links are wrong.
wp-config.php contains this
define('WP_HOME', 'https://mydomain.com/blog'); define('WP_SITEURL', 'https://mydomain.com/blog'); 
Database options table contains the same URLs.
I tried removing .htaccess in WordPress, that doesn't fix it.
I'm suspecting nginx configuration to be responsible.
location /blog/ { proxy_pass http://127.0.0.1:5080/; } 
This results in blog returning 404.
location /blog/ { proxy_pass http://127.0.0.1:5080/; proxy_set_header Host $host; } 
This results in /blog/wp-admin immediately redirecting to /wp-admin
location /blog/ { proxy_pass http://127.0.0.1:5080/; proxy_set_header Host $host; proxy_set_header X-Forwarded-Proto $scheme; } 
Now the website is pretty usable! Except the admin pages redirect to the root but everything else works.
Spent so much time stuck on every little details along the way... almost there. What am I missing here?
I'm able to view the various admin pages by copying the link and manually adding /blog/. The link settings in General and Permalink both look good.
Removing the plugins folder also doesn't help.
submitted by Hanuman9 to nginx [link] [comments]


2024.05.10 17:01 LxWulf Firewall Rules, Port-Forwarding, HA-Proxy and ACME

Hello Folks,
I installed and setup HA-Proxy with the following guide, which so far makes sense to me, as much as I did understand from the description.
But I can't get any certificate. I use a domain provider which is not listed in the DNS-01 challenge drop-down menu. So I use the HTTP-01 challenge type.
Of course, I use the staging channel of Let's Encrypt for testing. Nonetheless, I can't get any certificate, despite I allowed the port 80 and 443 on WAN.
IN IPv4 TCP * * WAN adress internet_ports * * 
On this stage I have the HA-Proxy configured but not activated because from the guide above and also many other guides it should be possible to get a certificate.
So far, my situation. The very strange thing which came occur is when I port forward 80 as example, which is needed for ACME respectively Lets Encrypt, it works. When I close port 80 on WAN side, it does not despite I port forward it. I'm sure I missed something, respectively misunderstood it, but what? I hope you guys can light up my way in the right direction.
For more or missed information, just ask, I will deliver them.
Edit:
Just wanted to mention what that speech about “working” meant, it meant that this website here gave me the green light for working to create a certificate for the server.
In the ACME client on the OPNsense, however, a timeout error still appears.
submitted by LxWulf to opnsense [link] [comments]


2024.05.10 15:39 Doomcow500 Nginx reverse proxy and freshrss

I have Freshrss and NGINX proxy manager running on an Ubuntu server which I am trying to get able to work on the open internet. Freshrss works and is setup when accessing through the local network, but when I try and access it through the reverse proxied domain I get the error ‘The web server seems to be incorrectly configured for cookies required for PHP sessions’. I think this is due to X-forward prefixes, but I do not know how to do this in nginx proxy manager. Any help would be greatly appreciated :)
submitted by Doomcow500 to selfhosted [link] [comments]


2024.05.10 13:11 Yaga_034 F-logで撮影したものをコンポジットする際のカラースペースについて

F-logで撮影したものをコンポジットする際のカラースペースについて
投稿失礼します。
F-logで撮影したものをNukeでコンポジットする際Input TransformにF-logがないのですが、ここはACESのrec2020にすればいいのでしょうか?
また、この動画をコンポジットしたとしてカラグレをDavinci resolveで行いたいときはwritenodeのoutputもrec2020で書き出しでいいのでしょうか?
カラースペースについてはまだまだ勉強不足です、アドバイスいただけると幸いです。
https://preview.redd.it/jvh9j8sv0lzc1.png?width=2559&format=png&auto=webp&s=b5a2f03b8ea2d2be7c741916ac8d23d9f927321c
https://preview.redd.it/kgb1f6uv0lzc1.png?width=2561&format=png&auto=webp&s=60014922889ca86e63e461642d74421ccdb20637
submitted by Yaga_034 to FoundryNukeJapan [link] [comments]


2024.05.09 22:08 Longjumping-Ad-6775 At 25:00 in Akasaka Episode 4

Tbs has teamed up with Gagaoolala to bring us our next JBL.

Where to Watch ╰┈➤Gagaoolala Episode 4

Extras Youtube Playlist
https://preview.redd.it/0ggw45wcjgzc1.jpg?width=928&format=pjpg&auto=webp&s=6ef80d002f909a06d8ee6464bb99be6bc5c2f8aa

🎬Story 🎥

Adapted from the ongoing 5-volume manga series 25時、赤坂で (25 Ji, Akasaka de) by 夏野寛子 (Natsuno Hiroko). It started in 2018 and is serialized in OnBlue.

https://preview.redd.it/ugy0mtbfjgzc1.jpg?width=6912&format=pjpg&auto=webp&s=f1bdd805965d241f20eb12606031d392a8b2302e
When Shirasaki, an underdog stage actor, gets cast in a gay drama series, he is surprised to learn that he will be working with Hayama, his charming clubmate from university who is now a popular actor. During production, Shirasaki realizes that he will need some inspiration and goes to find some where the local gay people hang out. What he didn't expect was to meet Hayama there, which eventually leads to a drunken kiss. He soon finds himself confused and conflicted about his feelings as he struggles to keep his emotions contained on-screen…(Source: Gagaoolala)
Teaser 🎞 Trailer

🎬Cast and Crew 🎥


https://preview.redd.it/jgpvl4fgjgzc1.jpg?width=300&format=pjpg&auto=webp&s=96a3984161429fb4e22f0dba91a3e11c6fbaa02d
Niihara Taisuke as Shirasaki Yuki🎭IG🎭X🎭
(Supporting roles in Eternal Yesterday, Sempai This Cannot be Love, and The Gods' Favorites)

https://preview.redd.it/v8ri10wijgzc1.jpg?width=300&format=pjpg&auto=webp&s=171e31d87afdb1762004673e871f63a5a34b8008
(A variety of roles including Kamen Rider)

https://preview.redd.it/tbug7ruljgzc1.jpg?width=300&format=pjpg&auto=webp&s=853c53ba4681f784a69d15357427b9e84ea93c32
KissXKissXKiss Shower {Fever Kiss} & {Ageless Kiss} KissXKissXKiss Melting Night {Nursing Kiss} {Secret Kiss} and A Man Who Defies the World of BL

KissXKissXKiss {Atelier Kiss} {Growth Kiss}, Minato's Coin Laundry Season 1

🎬Music 🎥

Opening 赫赫(Kakkaku) by 鯨木(KUJIRAGI) 🎧Youtube 🎧Youtube music 🎧Spotify 🎧Apple
Closing 東京ナイトロンリー by Mel

🎬General Info 🎥

🎬Goods 🎥


https://preview.redd.it/bsryd1ypjgzc1.jpg?width=481&format=pjpg&auto=webp&s=3c960f8f39fbcabb13b25e7bcdc0927ef6acb6a0
https://www.manga10.com/ip/686
We have goods up for the series at Manga 10. There isn't much for the drama yet but there is a bunch for the manga. As always you will need a proxy service to order unless you are in Japan.
submitted by Longjumping-Ad-6775 to BLJapan [link] [comments]


2024.05.09 20:07 _chobit ⊹ Welcome and FAQ ⊹

⊹ Welcome and FAQ ⊹
Welcome to SuperDollfie!
Before posting, please read our RULES and the FAQ below:
What is a Super Dollfie?
A Super Dollfie is a resin ball jointed doll (BJD) created by VOLKS, a Japanese company that also creates hobby products such as garage kits. You can read more about them on the VOLKS USA Store, Wiki page, and Den of Angels!
What are the different sizes of Super Dollfie?
Please note: MSD = SDM
This is an older image with a bit of outdated information, but it is the best example I could find for the full line of Super Dollfie sizes in comparison to one another.
Measurements
Tiny Size Mini Size Standard Size Tall Size
YoMidi SDM SD SD16
YoSD SDC SD13 SD17
DSD SDGr SDGou
What kinds of Super Dollfie are there? Why are some easier to purchase than others?
Standard Model: Certain sculpts are available for purchase any time in the VOLKS stores. Each sculpt has a run for a certain length of time, then are discontinued as new sculpts are added. Standard Models are a full set and come with eyes, the standard face up (makeup), a random wig, the standard outfit that is pictured, and box/paperwork.
Limited Model: Typically event specific, lottery based, and/or limited store runs. Come as a full set with everything exactly as pictured (limited outfit, wig, eyes, faceup (makeup), etc. Sometimes the limited outfits and accessories can be purchased separately from VOLKS, but sometimes they are exclusive only along with the doll.
One-Off: aka "one-of-a-kind" Super Dollfie. They include everything pictured with them, including a unique outfit not available for purchase. Each face up (makeup) is done by and signed by a revered VOLKS face up artist. Lottery only.
Coordinate Model: Similar to a One-Off and Limited Model, they have a unique face up but include clothing that is available to purchase on the website. Everything photographed is what's included with a Coordinate Model. Typically lottery only.
Full Choice System: A one of a kind custom Super Dollfie where every part is picked by the customer, including the sculpt, body type, resin color, face up (makeup), hands/feet style, etc. Takes a few months from ordering to receive. Exclusive to Japan only and the USA during limited timed FCS openings.
Where can I buy a Super Dollfie and accessories?
You can purchase an official Super Dollfie as well as clothing and supplies online from VOLKS Japan (ships internationally, multi-lingual) and VOLKS USA (ships to US, Canada, and Mexico) or in person at their stores in Japan and California, USA. There are also many other places to shop for clothing, accessories, and even places to buy Super Dollfie secondhand. Den of Angels has a wonderful Shopping Resource List and there are community based Facebook Groups, Discords, and sale/auction platforms. Please be careful when buying secondhand, use discretion, and verify what you are buying is an official Super Dollfie and not a recast (counterfeit).
What is the Full Choice System? / How do I buy a custom Super Dollfie?
There are multiple locations that offer customers the option to order a custom Super Dollfie. You can do this through VOLKS USA (in person and online) when they have openings (follow their News for updates), in Japan at Tenshi no Sato, and Tenshi no Sumika, and Tenshi no Mado (a Japanese shipping address is required, so international customers need to use a Proxy Service to order unless they will be in Japan during the months it will take to receive the order.)
What is a Dollfie Dream?
Similar to the Super Dollfie, Dollfie Dream are also made by VOLKS but they are made of vinyl and have different measurements/proportions. While this group does not include Dollfie Dream for discussion, you can on BJD and the Doll Dreaming Forum!
submitted by _chobit to superdollfie [link] [comments]


2024.05.09 15:15 petiepablo How to get slack alerts with arpwatch

Hi guys -
I got tired of the email alerts from arpwatch, and as most of my automation is using slack, I decided to figure out how to setup slack alerts with arpwatch.
Note: To do this, you'll need to be comfortable ssh'ing into your pfsense box and navigating via shell.
That said, its not too hard now that I've figured it out:
1 - ssh into box
2 - cd /uslocal/arpwatch (should be the same on your box)
3 - cp ./sendmail_proxy.php ./OLD_sendmail_proxy.php (backup in case something goes wrong)
4 - echo -n > ./sendmail_proxy.php && nano ./sendmail_proxy.php (may need to install nano??? pkg install nano)
5 - paste this code into sendmail
6 - enter you slack token, channel name, alert name, etc into the fields in caps within the code
7 - DONE!
One other thing I forgot to mention in the steps is that within the PHP code, I silenced "flip flop" as I was getting a LOT of those.
I'm not 100% sure about this, but if the device reboots, you may have to do this again. You could always setup a cron @reboot to copy sendmail_proxy.php from, lets say, /root/ to /uslocal/arpwatch/
In any case, I thought you guys would appreciate this, enjoy!!
submitted by petiepablo to PFSENSE [link] [comments]


2024.05.09 03:48 fullPlaid A recent sociological meta-study of gynecological research looking into the efficacy of doubling feminine napkins and the feminist implications.

The recent sociological meta-study examines the feminist implications within gynecological research, focusing on the efficacy of using double layers of feminine napkins during heavy menstrual flows. Data drawn from 17 studies indicates a significant increase in efficacy, with a 95% confidence interval showing a 12-18% improvement in user-reported satisfaction. Furthermore, the research contextualizes these findings within feminist frameworks, analyzing the social and personal autonomy impacts through the lens of 23 different feminist theorists. The meta-analysis reveals a confidence interval of 88-95% in alignment with predominant feminist theories supporting enhanced personal care options. Overall, the study advocates for broader societal discussions and policy considerations to support these findings, emphasizing the necessity for informed choices in women's health products. Most importantly, the study concludes that online posts about feminism, menstruation, and the use of boring language has a lower risk of non-feminist readers.
Source: Double Napkin Feminism
[[ FOR FEMINIST EYES ONLY ]]

Back of the Envelope (BOTE) Model:

Bear or Man in the Woods

-------------------------------------------------

Abstract

-------------------------------------------------
This thought experiment explores the comparative safety of being in the woods with either a bear or a man, using a theoretical model to evaluate the likelihood of harm in each scenario. Drawing on data from bear behavior studies and US victimization statistics, the model calculates the rate of incidents per opportunity for violence, aiming to determine which scenario poses less risk. The results aim to illuminate broader social issues regarding safety and perceived threats in isolated environments. WIthin the assumptions of the model, the hypothesis that being in the woods with a bear is an order of magnitude (10 times) safer than being in the woods with a random man. There is some indications that a bear could be greater two order (100+ times) safer than a man in the woods.
-------------------------------------------------

Preface

-------------------------------------------------

Notes on the Purpose of the Thought Experiment:

The results of the model and the model itself are at worst irrelevant to the point of the thought experiment: "As a woman, would you rather be in the woods with a bear or a man?" The apparent controversy surrounds someone choosing a bear over a man. Here, the actual dangers posed by the bear are the least significant aspect of the broader discussion.
Women are subjected to emotional, psychological, and physical abuse by men at an alarming rate. Yes, men are also victims of other men's brutality, but that is not the topic of this discussion. Raising concerns about the Amazon Rainforest doesn't mean dismissing other forests.
To put the choice into emotional context, consider the following dialogue from the movie, Good Will Hunting:
 INT. SEAN'S OFFICE -- DAY SEAN (after a pause) My dad used to make us walk down to the park and collect the sticks he was going to beat us with. Actually the worst of the beatings were between me and my brother. We would practice on each other trying to find sticks that would break. WILL He used to just put a belt, a stick and a wrench on the kitchen table and say "choose." INT. WILL'S CHILDHOOD APARTMENT -- FLASHBACK A large, callused hand sets down a wrench next to a stick. CUT BACK TO: INT. SEAN'S OFFICE -- DAY SEAN Gotta go with the belt there... WILL I used to go with the wrench. SEAN The wrench, why? WILL Cause fuck him, that's why. A long quiet moment. 

Notes on Bears:

Being in National Parks that have a meaningful bear population is exceptionally safe thanks to the nature of bear behavior, park management, and the highly recommended and highly effective bear spray. Pepper spray for defensive purposes against human offenders is also highly recommended for that matter.

Notes on Modeling:

Although models can have substantial utility in describing aspects of reality, all models have limitations. Generally speaking, nearly anything can be described as a model if it is in some way representative of something real within the boundaries set by assumptions. Assumptions are inescapable.
Everything that has ever been or will ever be expressed carries assumptions intrinsically. However, the explanatory power or fitness of a model can have a strong inverse proportionality to the minimal-ness of assumptions in many instances. In other words, fewer assumptions can correlate with a stronger model.
With a well-defined model, the truthfulness of the model is inarguable within its assumptions. This is not to be confused with its ability to describe every aspect or entirety of reality OR its utility within that reality.

Notes on the Modeler:

Background includes applied mathematics (BSc); computational theory (MSc and PhD Candidate); subject matter expert in logistics, mobile infrastructure, and communications.
-------------------------------------------------

Hypotheses

-------------------------------------------------

[Null Hypothesis]:

A woman in the woods with an average bear may or may not be safer than being in the woods with an average man.
[BEAR ATTACK RATE] [?] [MAN ATTACK RATE]

[Alternative Hypothesis]:

A woman in the woods with an average bear is significantly safer than being in the woods with an average man.
[BEAR ATTACK RATE] < [MAN ATTACK RATE]
-------------------------------------------------

Model Elements

-------------------------------------------------

US Victimization Stats

Note: The total number of female victim incidents according to the weighted data from the BJS NCVS is greater than four times the total number of victims from the BJS NCVS report. The difference is self-explanatory (as the number of victim incidents is greater than or equal to the number of victims), but worth a mention to avoid confusion.
BJS NCVS Data

2022 Weighted Tabulations:

US Population Stats

US Census: U.S. and World Population Clock
US Census: Population per year and per sex

2022 Population Statistics

  • Total US population: 334,130,076
  • Total female population (age 12+): 145,714,126
  • Total male population (age 12+): 141,169,957

Social Interaction Stats

Number and Type of Social Interactions:

Social Interactions Study
At the individual level, participants reported, on average, 2.4 social interactions at each momentary assessment (that is, approximately 12 social interactions per day).
In terms of partner type, participants reported that 45% of their most recent social interactions were with one or more family members, 25% were with friends and 30% were with peripheral relationship partners.
  • Average number of interactions per day: 12
  • Family interactions: 45%
  • Friend interactions: 25%
  • Peripheral interactions: 30%

Nature Stats

Bear Olfactory

NPS: Yosemite NP: Bear Sense of Smell
Bears are commonly thought to have the keenest sense of smell in the animal kingdom.
[I]t's difficult to measure just how far a black bear can smell, a range of a few miles isn't unrealistic. With 300 to 500 bears roaming Yosemite at any given time, it's more than likely that at least one of them are smelling you at all times.
NPS: Brown Bears
[Brown bears] have an especially good sense of smell and under the right conditions may be able to detect odors more than a mile away.
  • Lower bound of bear olfactory radius: 1 mile

Bear Incidents

Global Bear Study
According to https://worldanimalfoundation.org/ (accessed on 18 February 2024), globally, the average number of annual bear attacks on humans is 39.6, of which 11.4 and 18.2 attacks occur in North America and Europe annually.
  • Average incidents per year in North America: 11.4

Great Smoky Mountain National Park (GRSM)

NPS: GRSM: Bear Stats
Bears inhabit all elevations of the park. Though populations are variable, biologists estimate that roughly 1,900 bears live in the park. This equals a population density of approximately two bears per square mile.
NPS: Stats)
Park Rank Recreation Visits % of Total
Great Smoky Mountains NP 1 12,937,633 14.59%
Grand Canyon NP 2 4,732,101 5.34%
Zion NP 3 4,692,417 5.29%
Rocky Mountain NP 4 4,300,424 4.85%
Acadia NP 5 3,970,260 4.48%
Yosemite NP 6 3,667,550 4.14%
Yellowstone NP 7 3,290,242 3.71%
Joshua Tree NP 8 3,058,294 3.45%
Cuyahoga Valley NP 9 2,913,312 3.29%
Glacier NP 10 2,908,458 3.28%
  • Bear population density in Great Smoky Mountain NP: 2 bears per square mile
  • Recreational visits: 12,937,633 visits per year
-------------------------------------------------

Method

-------------------------------------------------

Context

The evaluation of hypotheses uses generous bounds that favor male human offenders (MHO) to demonstrate the exceptionally passive and avoidant nature of bears at a distance (all interactions where the bear does not suddenly realize a human in close proximity). If a model element is accurate and reliable, the actual value is used instead of selecting a bound. Technically, the actual value is itself a bound—the difference is simply that no additional choices are made regarding that model element.
Note: The determination of hypotheses differs from statistical hypothesis testing due to the nature of BOTE Modeling. In this instance, if the results indicate that the MHO bounded approximations are lower than bear bounded approximations, it does not prove that bears are less safe than MHO.
The reason is due to the structure of bound choices, which in this case favor MHO and are unfavorable to bears. Favorability is not as a moral judgement but as a model device used to strengthen the Alternative Hypothesis if determined to be true within the model assumptions.

Method Description

MHO Incidents and Opportunities of Violence:

The variable stranger is used as a proxy for the average man in the thought experiment because sampling out of the entire US population of men, the probability of randomly selecting someone you know is virtually zero. Meaning that the scenario of being in the woods with a random man is effectively being in the woods with a stranger.
In the Social Interactions Study, the variable called "peripheral relationship partners" (hereon: peripheral) includes acquaintance, coworker, stranger, roommate, classmate, therapist, healthcare provider, or other person. The sub-category of stranger is one of many others—some of which most likely have a much higher frequency, such as acquaintance, coworker, and classmate.
The number of stranger interactions cannot be greater than the number of peripheral interactions. Therefore, the peripheral percentage is used as a bound for the number of stranger interactions, which is then applied to the daily average of interactions.
This social interactions variable is then applied to the US population (from US Census) to approximate national values. Combined with the victimization statistics (from BJS) to compute the bound for the number of MHO Opportunities of Violence and the number of incidents in relation to those opportunities.
To address the critique that high-density city centers somehow modify the overall rate because it would supposedly increase the number of possible interactions relative to the number of incidents. On face value, this appears to be a valid critique; however, when considering basic facts, logic, and probability theory, it can be dismissed:
  • The ratio of men to women is roughly even.
  • Even if the ratio of men to women was not even, the likelihood that city center ratios being drastically unrepresentative of the national ratio is exceptionally low.
  • If there were any difference, it is additionally unlikely that it would be greater than an order of magnitude.
With underlying probabilities of a man being an attacker and an attacker attacking in any opportunity does not modify the outcome of incidents. Consider the following basic analysis:
  • p_attacker := probability of a man being an attacker
  • p_attacking := probability of an attacker attacking
Simplified instance of 1 woman (n_women_1 = 1) around multiple men (n_men >> 1):
  • n_attackers = n_men * p_attacker
  • n_attackings = n_attackers * p_attacking
  • n_attackings = n_men * p_attacker * p_attacking
  • n_attacks_per_woman = n_attackings / n_women_1
When considering n_women around n_men, where n_women = n_men:
  • n_attackings remains the same but n_attackings_per_woman changes.
  • n_attacks_per_woman = n_attackings / n_women
  • n_attacks_per_woman = (n_men * p_attacker * p_attacking) / n_women
Since n_women = n_men, it doesn't matter how many women and men there are—to include the minimal one man and one woman.
If we consider the existence of some unknown probability of a man being an attacker and an unknown probability, this would not be altered by the increase in density (according to crude modeling, of course).

Bear Incidents and Opportunities of Violence:

The Great Smoky Mountains National Park (GRSM) has the highest number of recreational visits per year of any national park in the United States. However, GRSM's total is significantly lower than the total number of recreational visits per year across all US national parks. The GRSM total is used as a proxy for the US total to represent the number of times individuals are in proximity to a bear. The GRSM bear density is also used.
  • The reason the GRSM total is used as a favorable bound is because the actual count of being in the proximity of bears across the US is strictly less than that of GRSM. The lower the count of being in the proximity of bears is inversely proportional to the rate of bear incidents. In other words, as the count goes down, the rate goes up.
  • The total count of being in the proximity of a bear per year in all US national parks could be as large as six times higher when considering hours of recreation as a proxy.
  • The total annual recreational visits to US national parks with bear populations are over twice (close to three times) that of GRSM when tabulating Yellowstone NP, Great Smoky Mountain NP, Yosemite NP, Glacier NP, Grand Teton NP, and Shenandoah NP.
  • The bear density from GRSM is used as opposed to other national parks as a matter of consistency. Its favorability is neutral but does not introduce additional complexity to the formulation of bounds.
Experts on wildlife and specialists of bear populations estimate the sense of smell range of species of bears to be in the tens of miles (20 miles, even perhaps 40 miles). There is high confidence that bear sense of smell range is greater than a one-mile radius. The lower bound chosen is a one-mile radius.
  • The reason this bound was chosen was because the sense of smell of bears is their strongest sense in the wild. This sense-radius is used to create a bound where bears become aware of human presence.
  • For simplicity, the area covered by this one-mile radius is reduced to one square mile—instead of roughly three square miles. This simplicity is a favorable bound for MHO by a factor of three.
  • Using the statistics of the total 'out of vehicle' visits per year and bear statistics (bear population density and sense-range), a bound for the number of 'Bear Opportunities of Violence' and the number of incidents in relation to those opportunities is calculated.
The scientific estimation for total incidents of bear violence against humans per year in North America is used as a proxy for the US.
  • This bound is favorable to MHO, since the US total is at most equal to the estimation, but most likely less. This proxy does not significantly change the size of actual values considering the US population, tourism, and number of national parks. The actual estimation for the US may very well be near the North American estimation, but on average across years, it is strictly less.
Note: An exact equivalence is practically unknowable, because of (i) the social dynamic differences between bear-human and human-human interactions, (ii) the ethical/moral violations that are unavoidable in performing any such experiments. Analysis can only be done with assumptions. Without them, there is no analysis of hypothetical decisions, such as in this instance.

Summary

[MAN ATTACK RATE]

Elements:
  • [interactions] := total social interactions per day per person
  • [portion peripheral interactions] := portion of peripheral interactions per day per person
  • [total US population] := total population in US 2022
  • [total female population (12+)] := total female (age 12+) population in US 2022
  • [total female victim incidents] := total female (12+) victim incidents in US 2022
  • [total female victim incidents of males] := total female (12+) victim incidents of male offenders in US 2022
Computed Values:
  • [portion stranger interactions] := portion of stranger interactions per day
  • [stranger interactions] := total stranger interactions per day per person
  • [male stranger interactions] := total male stranger interactions per day per person
  • [total female interactions with male strangers] := total female interactions with male strangers in US 2022
  • [total male opportunities of violence against females] := total number of opportunities males have had for violence against females in US 2022
  • [total incidents of male violence against females] := total number of incidents of male violence against females in US 2022
  • [portion of incidents per opportunity of male violence against females] := portion of incidents per opportunity of male violence against females in US 2022
Formulas:
  • [portion stranger interactions] ≅ [portion peripheral interactions]
  • [male stranger interactions] ≅ [portion stranger interactions]
  • [PRT STR INT] := [portion stranger interactions]
  • [FEM POP 12] := [total female population (12+)]
  • [DAYS] := days per year
  • [TOT FEM INT W MA STR] := [total female interactions with male strangers]
  • [TOT FEM INT W MA STR] = [PRT STR INT] x [FEM POP 12] x [DAYS]
  • [TOT MA OPR VIO AGN FEM] := [total male opportunities of violence against females]
  • [TOT MA OPR VIO AGN FEM] ≅ [TOT FEM INT W MA STR]
  • [TOT MA VIO AGN FEM] := [total incidents of male violence against females]
  • [PRT VIO PER OPR] := [portion of incidents per opportunity of male violence against females]
  • [PRT VIO PER OPR] = [TOT MA VIO AGN FEM] x [PRT VIO PER OPR]-1
  • [MAN ATTACK RATE] ≅ [PRT VIO PER OPR]

[BEAR ATTACK RATE]

Elements: - [bear sense radius] := lower bound radius of bear sense of smell - [GRSM bear density] := proxy for bear density in US national parks - [total GRSM recreational visits] := total recreational visits to GRSM NP in 2022 - [total incidents] := estimated average North American incidents of bear violence against humans
Computed Values: - [bear sense area] := area around a bear within its sense of smell range - [bear density] := national park bear density in US 2022 - [total recreational visits] := total recreational visits to US national parks in 2022 - [total mileage] := number of miles hiked through US national parks through square miles of bear density - [total opportunities] := total number of opportunities of bear violence against humans in the US 2022 - [portion of incidents per opportunity of bear violence against humans] := portion of incidents per opportunity of bear violence against humans in US 2022
Formulas: - [bear sense area] ≅ [bear sense radius]2 - [bear density] ≅ [GRSM bear density] - [total recreational visits] ≅ [total GRSM recreational visits] - [TOT MIL] := [total mileage] - [TOT REC VIS] := [total recreational visits] - [TOT OPR] := [total opportunities] - [BER DNS] := [bear density] - [TOT INC] := [total incidents] - [POR VIO AGN HUM] := [portion of incidents per opportunity of bear violence against humans] - [BEAR ATTACK RATE] ≅ [POR VIO AGN HUM]
-------------------------------------------------

Result

-------------------------------------------------
According to the Rate of Incidents per Opportunity:
[MAN ATTACK RATE]: 6.86 x 10-6
[BEAR ATTACK RATE]: 4.41 x 10-7
It follows that:
[BEAR ATTACK RATE] < [MAN ATTACK RATE]
Therefore:
[Alternative Hypothesis]: Confirmed
-------------------------------------------------

Discussion

-------------------------------------------------
Since the Alternative Hypothesis is confirmed, a woman in the woods with an average bear is significantly safer than being in the woods with an average man—within the bounds of the model assumptions.
Despite the favorable bounds for male human offenders, the bounds indicate that an average bear is at least an order of magnitude safer than an average man. Considering the factors of favorability being in the 20s, in reality, a bear may be two orders of magnitude safer than an average man (two orders of magnitude in scientific notation is a factor of 100).
Although an offense rate of 6.86 x 10-6 (slightly less than 1 in 100,000) opportunities may seem to be a negligible number, the annual offense rate is on the scale of 1 in 100 when considering the number of stranger interactions on the scale of thousands per year.
A more complex model, which could capture the behavior of bears, could indicate an even greater disparity in safety. A reason for this speculation is a study of bear behavior found that in 169 approaches of bears (as close as 50 meters), none of them "displayed any aggressive behavior towards the observers, and none of the observers reported feeling threatened during any of the approaches.".
-------------------------------------------------

Conclusion

-------------------------------------------------
The results of this model suggest that the relative safety of being in the woods with a bear compared to a man supports the Alternative Hypothesis. It underscores the potential safety a bear presents in comparison to human threats under the specific conditions studied. This conclusion is drawn within the strict boundaries and assumptions of the model, highlighting the need for careful consideration of context when interpreting model outcomes.
submitted by fullPlaid to Feminism [link] [comments]


2024.05.08 16:06 Mundane-Mountain8943 UAAP S86 Volleyball Finals

will they sell tix pa kaya online? inis naman yung 1:1 rule, mapapa-scalper nalang talaga 😪
submitted by Mundane-Mountain8943 to Tomasino [link] [comments]


2024.05.08 15:36 borkode Losing my mind over reverse proxies

I tried Traefik before which I didnt understand the documentation at all and then tried npm, however I kept on getting a 502 error. I then switched to caddy and setup a caddy file to point to my nextcloud docker instance however I still get 502 errors, I'm not exactly sure whats going on. I have opened up port 443 udp/tcp and 80 tcp on my firewall so it couldn't be a firewall issue, if anyone could help me I'd really appreciate it.
The compose file for caddy is:
services: caddy: image: caddy:latest restart: unless-stopped ports: - "80:80" - "443:443" - "443:443/udp" volumes: - ./Caddyfile:/etc/caddy/Caddyfile - ./site:/srv - caddy_data:/data - caddy_config:/config volumes: caddy_data: caddy_config: networks: default: name: floo_network external: true 
And my caddy file is:
https://cloud.myactualdomain.com:443 { reverse_proxy localhost:11000 } 
My docker compose file for next cloud is:
services: nextcloud-aio-mastercontainer: image: nextcloud/all-in-one:latest init: true restart: always container_name: nextcloud-aio-mastercontainer # This line is not allowed to be changed as otherwise AIO will not work correctly volumes: - nextcloud_aio_mastercontainer:/mnt/docker-aio-config # This line is not allowed to be changed as otherwise the built-in backup solution will not work - /varun/docker.sock:/varun/docker.sock:ro # May be changed on macOS, Windows or docker rootless. See the applicable documentation. If adjusting, don't forget to also set 'WATCHTOWER_DOCKER_SOCKET_PATH'! ports: - 8080:8080 environment: # Is needed when using any of the options below # AIO_DISABLE_BACKUP_SECTION: false # Setting this to true allows to hide the backup section in the AIO interface. See https://github.com/nextcloud/all-in-one#how-to-disable-the-backup-section APACHE_PORT: 11000 # Is needed when running behind a web server or reverse proxy (like Apache, Nginx, Cloudflare Tunnel and else). See https://github.com/nextcloud/all-in-one/blob/main/reverse-proxy.md APACHE_IP_BINDING: 127.0.0.1 # Should be set when running behind a web server or reverse proxy (like Apache, Nginx, Cloudflare Tunnel and else) that is running on the same host. See https://github.com/nextcl> # BORG_RETENTION_POLICY: --keep-within=7d --keep-weekly=4 --keep-monthly=6 # Allows to adjust borgs retention policy. See https://github.com/nextcloud/all-in-one#how-to-adjust-borgs-retention-policy # COLLABORA_SECCOMP_DISABLED: false # Setting this to true allows to disable Collabora's Seccomp feature. See https://github.com/nextcloud/all-in-one#how-to-disable-collaboras-seccomp-feature # NEXTCLOUD_DATADIR: /mnt/ncdata # Allows to set the host directory for Nextcloud's datadir. ⚠️⚠️⚠️ Warning: do not set or adjust this value after the initial Nextcloud installation is done! See https://github.> # NEXTCLOUD_MOUNT: /mnt/ # Allows the Nextcloud container to access the chosen directory on the host. See https://github.com/nextcloud/all-in-one#how-to-allow-the-nextcloud-container-to-access-directories-on> # NEXTCLOUD_UPLOAD_LIMIT: 10G # Can be adjusted if you need more. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-upload-limit-for-nextcloud # NEXTCLOUD_MAX_TIME: 3600 # Can be adjusted if you need more. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-max-execution-time-for-nextcloud # NEXTCLOUD_MEMORY_LIMIT: 512M # Can be adjusted if you need more. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-php-memory-limit-for-nextcloud # NEXTCLOUD_TRUSTED_CACERTS_DIR: /path/to/my/cacerts # CA certificates in this directory will be trusted by the OS of the nexcloud container (Useful e.g. for LDAPS) See See https://github.com/nextcloud/all-i> # NEXTCLOUD_STARTUP_APPS: deck twofactor_totp tasks calendar contacts notes # Allows to modify the Nextcloud apps that are installed on starting AIO the first time. See https://github.com/nextcloud/all-in-on> # NEXTCLOUD_ADDITIONAL_APKS: imagemagick # This allows to add additional packages to the Nextcloud container permanently. Default is imagemagick but can be overwritten by modifying this value. See https://gi> # NEXTCLOUD_ADDITIONAL_PHP_EXTENSIONS: imagick # This allows to add additional php extensions to the Nextcloud container permanently. Default is imagick but can be overwritten by modifying this value. See ht> # NEXTCLOUD_ENABLE_DRI_DEVICE: true # This allows to enable the /dev/dri device in the Nextcloud container. ⚠️⚠️⚠️ Warning: this only works if the '/dev/dri' device is present on the host! If it should not exis> # NEXTCLOUD_KEEP_DISABLED_APPS: false # Setting this to true will keep Nextcloud apps that are disabled in the AIO interface and not uninstall them if they should be installed. See https://github.com/nextclo> # TALK_PORT: 3478 # This allows to adjust the port that the talk container is using. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-talk-port # WATCHTOWER_DOCKER_SOCKET_PATH: /varun/docker.sock # Needs to be specified if the docker socket on the host is not located in the default '/varun/docker.sock'. Otherwise mastercontainer updates will fai> # networks: # Is needed when you want to create the nextcloud-aio network with ipv6-support using this file, see the network config at the bottom of the file # - nextcloud-aio # Is needed when you want to create the nextcloud-aio network with ipv6-support using this file, see the network config at the bottom of the file # security_opt: ["label:disable"] # Is needed when using SELinux # # Optional: Caddy reverse proxy. See https://github.com/nextcloud/all-in-one/blob/main/reverse-proxy.md # # You can find further examples here: https://github.com/nextcloud/all-in-one/discussions/588 # caddy: # image: caddy:alpine # restart: always # container_name: caddy # volumes: # - ./Caddyfile:/etc/caddy/Caddyfile # - ./certs:/certs # - ./config:/config # - ./data:/data # - ./sites:/srv # network_mode: "host" volumes: # If you want to store the data on a different drive, see https://github.com/nextcloud/all-in-one#how-to-store-the-filesinstallation-on-a-separate-drive nextcloud_aio_mastercontainer: name: nextcloud_aio_mastercontainer # This line is not allowed to be changed as otherwise the built-in backup solution will not work # # Optional: If you need ipv6, follow step 1 and 2 of https://github.com/nextcloud/all-in-one/blob/main/docker-ipv6-support.md first and then uncomment the below config in order to activate ipv6 for the internal > # # Please make sure to uncomment also the networking lines of the mastercontainer above in order to actually create the network with docker-compose # networks: # nextcloud-aio: # name: nextcloud-aio # This line is not allowed to be changed as otherwise the created network will not be used by the other containers of AIO # driver: bridge # enable_ipv6: true # ipam: # driver: default # config: # - subnet: fd12:3456:789a:2::/64 # IPv6 subnet to use networks: default: name: floo_network external: true 
Any help would be appreciated.
submitted by borkode to selfhosted [link] [comments]


2024.05.07 18:08 thegameranime Apex Hosting Review - Is Apex Hosting Good?

Apex Hosting Review - Is Apex Hosting Good?
In the ever-expanding world of online gaming, finding a reliable and high-performing server hosting solution is crucial for an exceptional gaming experience. This is especially true for Minecraft, the popular sandbox video game that has captured the hearts and imaginations of millions of players worldwide.
🔥 Unlock the Ultimate Minecraft Experience with Apex Hosting! Click Here to Get Started: "Apex hosting Discount" and Get an Exclusive 25% Discount! 🔥
Enter Apex Hosting, a company that specializes in providing top-notch Minecraft server hosting services. In this comprehensive review, we'll dive deep into the features, performance, and overall value proposition of Apex Hosting, helping you determine if it's the right choice for your Minecraft server needs.
https://preview.redd.it/r4c7960l11zc1.png?width=1920&format=png&auto=webp&s=226c79f9c6e0c490e65154af8d26cf7fbc390589

Features of Apex Hosting

One of the standout features of Apex Hosting is the range of customizable plans and specifications they offer. With 9 different price plans to choose from, each varying predominantly in RAM allocation, you can select the perfect plan that suits your server's requirements and player count. Regardless of the plan you choose, you'll enjoy the following features:
  • Unlimited player slots: No restrictions on the number of players that can join your Minecraft server.
  • Custom control panel: A user-friendly, web-based interface for managing your server with ease.
  • Free subdomain: Each plan includes a free subdomain for easy server access.
  • Automated backups: Regular automated backups to protect your server data and configurations.
  • Free MySQL database: A free MySQL database for storing player data and other information.
  • Unlimited bandwidth: No data transfer limits, ensuring smooth gameplay for all players.
  • Free server transfers: The ability to transfer your server to a different location or plan without any additional fees.
  • 99.9% uptime guarantee: A commitment to keeping your server online and accessible almost all the time.

Pricing and Support

Apex Hosting's pricing structure is competitive and tailored to suit different budgets and requirements. With plans starting at $2.50 per month (billed monthly) for a 512MB proxy or $5.99 for the first month of a basic 2GB RAM package, Apex Hosting offers affordable options for both casual and more demanding Minecraft servers. For those seeking more robust solutions, the EX Series offers plans with up to 16GB of RAM, starting at $53.99 for the first month (with a recurring price of $71.99).
Additionally, Apex Hosting provides flexible billing options, allowing you to choose between monthly or quarterly payments. By opting for the quarterly billing cycle, you can benefit from a 10% discount, further enhancing the value proposition.
7-Day Money-Back Guarantee
To ensure customer satisfaction, Apex Hosting backs all its plans with a 7-day money-back guarantee. While this period may be shorter compared to some other hosts, it still provides a safety net for customers to test the service and ensure it meets their expectations.
24/7 Responsive Customer Support
When it comes to customer support, Apex Hosting delivers with its 24/7 availability. Their knowledgeable and responsive support team is on standby around the clock to assist you through:
  • Support tickets: Submit a detailed request, and receive a prompt response from the support team.
  • Live chat (for registered customers): Engage in real-time conversations with support agents for immediate assistance (available only for registered customers).

Pros and Cons

To help you make an informed decision, let's summarize the key pros and cons of Apex Hosting:
Pros
  • Unlimited storage and bandwidth
  • Responsive and knowledgeable 24/7 customer support
  • Global server locations for low-latency gaming
  • 99.9% uptime guarantee
  • Customizable plans and specifications
  • User-friendly custom control panel with video guides
  • Rapid server deployment
  • Competitive pricing and flexible billing options
  • 7-day money-back guarantee
Cons
  • Limited FAQ and self-help resources
  • Live chat support only available for registered customers

Conclusion

Apex Hosting stands out as an exceptional choice for Minecraft server hosting. With its global data center locations, customizable plans, user-friendly control panel, and 24/7 responsive support, it delivers a top-notch gaming experience. While its self-help resources could be improved, Apex Hosting's robust features, reliable performance, and competitive pricing make it a compelling option for both casual and hardcore Minecraft players alike. If you're seeking a hosting solution that prioritizes performance, reliability, and value, Apex Hosting is definitely worth considering for your Minecraft server needs.
🔥 Unlock the Ultimate Minecraft Experience with Apex Hosting! Click Here to Get Started: "Apex hosting Discount" and Get an Exclusive 25% Discount! 🔥

FAQs

1. How to add mods to Apex Hosting?
Ans:- Adding mods to your Apex Hosting Minecraft server is a straightforward process. Simply log in to your custom control panel, navigate to the "File Manager" section, and upload the desired mod files to the appropriate directory. Apex Hosting's intuitive interface and video guides will walk you through the process step-by-step.
2. How to update a modpack on Apex Hosting?
Ans:- Keeping your Minecraft modpack up-to-date is essential for ensuring compatibility and taking advantage of the latest features. To update a modpack on Apex Hosting, follow these steps:
  1. Log in to your control panel.
  2. Navigate to the "Modpack" section.
  3. Select the modpack you wish to update.
  4. Click the "Update" button.
Apex Hosting will handle the rest, downloading and installing the latest version of your desired modpack.
3. How much does Apex Hosting cost?
Ans:- Apex Hosting offers a range of plans to suit different budgets and requirements. Prices start at $2.50 per month (billed monthly) for a 512MB proxy or $5.99 for the first month of a basic 2GB RAM package. More robust solutions, such as the EX Series with up to 16GB of RAM, start at $53.99 for the first month (with a recurring price of $71.99). Additionally, Apex Hosting provides a 10% discount for those who opt for quarterly billing.
4. How to add plugins to Apex Hosting?
Ans:- Adding plugins to your Apex Hosting Minecraft server is a breeze. Simply follow these steps:
  1. Log in to your control panel.
  2. Navigate to the "Plugins" section.
  3. Click the "Upload Plugin" button.
  4. Select the desired plugin file from your local storage.
  5. Click "Upload" to install the plugin on your server.
Once uploaded, you can configure and manage the plugin settings through the control panel.
5. How to cancel an Apex Hosting server?
Ans:- If you need to cancel your Apex Hosting server, you can do so by following these steps:
  1. Log in to your account on the Apex Hosting website.
  2. Navigate to the "My Services" or "Billing" section.
  3. Locate the server you wish to cancel.
  4. Click the "Cancel" or "Terminate" button.
  5. Follow the prompts to confirm the cancellation.
It's important to note that Apex Hosting offers a 7-day money-back guarantee, so if you're within that period, you may be eligible for a refund.
6. Can I transfer my existing Minecraft server to Apex Hosting?
Ans:- Yes, Apex Hosting allows you to transfer your existing Minecraft server from another host free of charge. Simply reach out to their support team, and they'll guide you through the transfer process.
7. Does Apex Hosting provide automatic backups?
Ans:- Yes, Apex Hosting includes automated backups as part of their hosting plans, ensuring your server data and configurations are regularly backed up and safeguarded against potential issues or data loss.
submitted by thegameranime to u/thegameranime [link] [comments]


2024.05.06 21:23 DragonAI19 very WIP modding discord :)

it ain’t pretty, and the onboarding’s a bit bad, but the Proxy Discord is here! For all your prox needs.
submitted by DragonAI19 to u/DragonAI19 [link] [comments]


2024.05.06 03:38 KiwiNFLFan Integration with Laravel

I want to use Supabase as a filesystem in my Laravel app so I can easily upload files to a storage bucket. I used this package (github.com/quix-labs/laravel-supabase-flysystem) to set it up and added the supabase block to the disks array in config/filesystems.php. However, I can't upload anything to Firebase - the method that actually uploads the file returns this error message: "Unable to write file at location: uploads/RQhhQkjeHerFo5f1OxUgU0LMa40Kulif52tUKzzM.png."
I'm not sure I've set everything up correctly. I have this config: ``` 'supabase' => [ 'driver' => 'supabase', 'key' => env('SUPABASE_SECRET_ACCESS_KEY'), // Use a privileged key; read-only does not work 'bucket' => env('SUPABASE_STORAGE_BUCKET'), 'endpoint' => env('SUPABASE_STORAGE_ENDPOINT'),
 'url' => null, // <- Automatically generated; change here if you are using a proxy 'public' => true, // Default to true 'defaultUrlGeneration' => null, // 'signed' 'public' <- default depends on public 'defaultUrlGenerationOptions' => [ 'download' => false, 'transform' => [], ], 'signedUrlExpires' => 60 * 60 * 24, // 1 day <- default to 1 hour (3600) ], 
`` I'm guessing thebucket` is simply the name of the bucket (e.g. myapp-file-uploads) and the endpoint is the one specified in the storage settings.
The key is the bit I don't understand. I don't know what "Use a privileged key; read-only does not work" means. I've tried the S3 key in the storage settings and the Project API keys in the API settings.
Thanks for any help anyone can provide.
submitted by KiwiNFLFan to Supabase [link] [comments]


2024.05.05 22:12 Legitimate-Aside466 OPR Wiki and permissions

Hi guys, I'm pretty new to the sub. I'm actually a mini designer and noticed I was added to the OPR wiki recently for alternative models. https://wiki.onepagerules.com/index.php/Main_Page There a few mistakes in what my miniatures are 'proxies' for and some of my collection hasn't been added (yet!). I was wondering if an admin for the wiki is here or if anyone knows if it's a self-regulated free-to-edit deal? I'd love correct those mistakes and add a few things, but I don't want to tread on any toes or be disrespectful to the creators/admins. Thanks!
submitted by Legitimate-Aside466 to onepagerules [link] [comments]


2024.05.05 19:46 Known-Hawk-3660 Docker noob - I have some questions

Hi, I've been looking at docker for a long time now but never really started to use it. I like hosting everything locally. But recently my server has become quite complex with different versions of software ect and some technologies I wanna use but they seem to only run out of the box in docker.
So my server is a pretty basic webserver that I use for work and my own projects and also clients. I use Caddy and route all traffic to the correct file/server the rest is all locally installed like sql, PHP, node, ect.
  1. If I can use Caddy should it be installed locally or in a container to use it as a reverse proxy for my containers.
  2. Should SQL and other databases be declared for each project or as a separate container?
  3. If SQL is separate won't this add latency to database calls compared to having it local? Same thing for other requests if all requests have to proxy through Caddy and into a container doesn't that add some latency? This might just be me overthinking and the latency is literally nothing.
  4. How does the Caddy reverse proxy work I've seen a image called caddy-gen that seems to help but I think I'm a bit lost when it comes to the networking part of docker. Should I put every service on a different port and point Caddy to that port and IP (also how do I know or get the container IP to use in caddy)?
If my questions don't make any sense I basically just want to know what's the best structure to work with a large amount of services all on different domains but mostly running the same kind of stack and also connecting to a SQL database.
submitted by Known-Hawk-3660 to docker [link] [comments]


2024.05.05 14:05 AlpineGuy Discussion of the most common homelab network setups (open ports, closed ports, VPNs, let's encrypt, etc.)

Discussion of the most common homelab network setups (open ports, closed ports, VPNs, let's encrypt, etc.)
I am trying to redesign my homelab's networking setup and have a hard time deciding which option to go for.
I have seen around here mainly four different basic layouts that people use. I quickly created some diagrams to illustrate - see below (hope the basic outlines are understandable).
  • Option 1 - putting web services on the open internet - seems to be less and less desired, even though many howtos still describe this
  • Option 2 - having stuff behing a VPN but picking up public certificates from a VPS
  • Option 3 - private CA, private network, private everything
  • Option 4 - everything through tunnels, with the central point being a VPS
  • (Option 5 that I frequently read about here would be tailscale or some other VPN service, but it is technically more or less the same as my Option 4).
Which option do you use and why? Do you see additional pros/cons that I haven't seen? Do you have another setup not mentioned? Do you find any of the options absolutely bad?

https://preview.redd.it/vbguwl0vklyc1.jpg?width=731&format=pjpg&auto=webp&s=aad4d9d82403805e339394bfa13dcdf179877291

submitted by AlpineGuy to homelab [link] [comments]


2024.05.05 06:09 KiwiNFLFan How to use Supabase as Laravel storage?

I want to use Supabase as a filesystem so I can easily upload files to Supabase. I used this package (github.com/quix-labs/laravel-supabase-flysystem) to set it up and added the supabase block to the disks array in config/filesystems.php. However, I can't upload anything to Firebase - the method that actually uploads the file returns this error message: "Unable to write file at location: uploads/RQhhQkjeHerFo5f1OxUgU0LMa40Kulif52tUKzzM.png."
I'm not sure I've set everything up correctly. I have this config:
``` 'supabase' => [ 'driver' => 'supabase', 'key' => env('SUPABASE_SECRET_ACCESS_KEY'), // Use a privileged key; read-only does not work 'bucket' => env('SUPABASE_STORAGE_BUCKET'), 'endpoint' => env('SUPABASE_STORAGE_ENDPOINT'),
 'url' => null, // <- Automatically generated; change here if you are using a proxy 'public' => true, // Default to true 'defaultUrlGeneration' => null, // 'signed' 'public' <- default depends on public 'defaultUrlGenerationOptions' => [ 'download' => false, 'transform' => [], ], 'signedUrlExpires' => 60 * 60 * 24, // 1 day <- default to 1 hour (3600) ], 
`` I'm guessing thebucket` is simply the name of the bucket (e.g. myapp-file-uploads) and the endpoint is the one specified in the storage settings.
The key is the bit I don't understand. I don't know what "Use a privileged key; read-only does not work" means. I've tried the S3 key in the storage settings and the Project API keys in the API settings.
Thanks for any help anyone can provide.
submitted by KiwiNFLFan to PHPhelp [link] [comments]


2024.05.05 05:17 Pierced_Bear Issues with Nextcloud Client Push/Notify Push setup

Hello, I have been having a bit of a problem, a catch 22 situation, setting up notify push (client push) for Nextcloud. I'll try to be as clear and concise as possible.
I am following the instructions on this page: https://github.com/nextcloud/notify_push
I added this to the 443 Nextcloud Apache VirtualHost
ProxyPass /push/ws ws://127.0.0.1:7867/ws ProxyPass /push/ http://127.0.0.1:7867/ ProxyPassReverse /push/ http://127.0.0.1:7867/ 
Via command line while in the nextcloud directory sudo -u www-data php occ notify_push:setup
I created the notify_push.service as instructed
[Unit] Description = Push daemon for Nextcloud clients [Service] Environment=PORT=7867 Environment=NEXTCLOUD_URL=https://[nextcloud.domain-name.tld] ExecStart=/vawww/nextcloud/apps/notify_push/bin/x86_64/notify_push /vawww/nextcloud/config/config.php User=www-data [Install] WantedBy = multi-user.target 
Saved the file then: sudo systemctl enable --now notify_push
Added my personal IP address in the 'trusted_proxies' => array
and I received a thumbs up
✓ push server seems to be functioning correctly. Reverse proxy seems to be configured already ✓ reverse proxy seems to be setup correctly. configuration saved 
However, Nextcloud does not like this and shows a big frightening warning on the Administrative Settings >> Overview page
"Security & setup warnings !
It's important for the security and performance of your instance that everything is configured correctly. To help you with that we are doing some automatic checks. Please see the linked documentation for more information.
There are some warnings regarding your setup.
• The reverse proxy header configuration is incorrect, or you are accessing Nextcloud from a trusted proxy. If not, this is a security issue and can allow an attacker to spoof their IP address as visible to the Nextcloud. For more details see the documentation a .
Please double check the installation guides 2, and check for any errors or warnings in the log.
Check the security of your Nextcloud over our security scan 2."
I have read over the documentation in the link provide over, over, and over.
If I remove my personal IP from the trusted proxies array there are no warning from Nextcloud but then Notify Push starts complaining that the IP addresses is not in the trusted proxies config.php file, catch 22.
I have been readings a lot of documentations about different solutions for the past 8 hours. Anyone know if it is okay to ignore the Nextcloud warning? Anyone encounter this problem and were able to resolve it? Thanks!
submitted by Pierced_Bear to NextCloud [link] [comments]


2024.05.04 07:22 amerking123 [request application]

[request application]
Hello everyone can someone give me the ipa file if found because the application deleted from appstore
submitted by amerking123 to jailbreak [link] [comments]


http://activeproperty.pl/