Are you talking about the “The page needs to be reloaded” error?
The current solution is to use nieveve/piped-backend for the API.
I have used their image before, when there was an issue with Piped appearing as a bot and requiring captcha.
Are you talking about the “The page needs to be reloaded” error?
The current solution is to use nieveve/piped-backend for the API.
I have used their image before, when there was an issue with Piped appearing as a bot and requiring captcha.
If your old piece of software is not available through Flatpak, you can use DistroBox to run your app inside a container with older Debian/Ubuntu.
What are the advantages of Invidious, compared to Piped?
I have been self-hosting Piped for the last 3 years, but I never tried Invidious.
Smart TVs are, for sure, easier to setup, but TV manufacturers are starting to inject their ads to anything that is showing on the TV. Sorry, but I don’t want to see any ads while watching a movie, or playing games.
I don’t care whether the TV is smart, or not. I will just not connect it to internet, and I’ll use it as a monitor. No one is messing with my boss fights!
Pissing in the bucket is dangerous for its electronics and may void its warranty. You can buy a 2 year insurance for 50$
Our buckets have advanced AI capabilities to provide personalized bucketing experience. Also, you can disable our buckets’ ads with just 3.99$/month/user/breath


someone with unmitigated mental health problems are present.
You mean ICE ?
Did you know that Ubuntu actually started as a Hannah Montana Linux spinoff?
And Symbian
A lice in chains
Google doesn’t spy only the web. There are some pretty common and completely legal devices, that Google takes advantage of to spy in people’s everyday life. Those devices are called Android phones.


Sure, go ahead


For those who don’t want to open Facebook links:
It’s a (rage bait AI ?) video of an old lady trying to cross the street through an ongoing riot. And there are some protestors intentionally blocking her way. After this clip, there is a guy explaining how empty inside those people are.
When you create VMs/containers, there is an option on the network step to set the VLAN tag to use
Have you ever dealt with zombie processes?
What’s the difference between this and the classic “ssh user@server” ?
I think it’s the same thing, except I am pulling the pre-built image