• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: August 8th, 2023

help-circle

  • There’s only been about 700 yacy peers online in the last 30 days which is pretty low for a “crowd sourced” search engine, especially when many of those are, I think, temporary peers that come and go. It looks like it has only maybe 200 “master” servers which wouldn’t be nearly enough to keep up with the Internet these days.

    The good news is that if there’s websites / urls that you care about you can point your own yacy instance at them and schedule the crawls to keep up with content changes.

    I remember reading about yacy some years ago and now that I’ve bumped it into again it’s sparked my interest. I may stand up a docker instance and play with it for awhile. If nothing else it could make a very useful “arrrrr” search engine.


  • basically requires a minimum of 20-30GB of RAM to be performant.

    That’s odd, the project page states 256 Megabytes and practically speaking that’s nothing. Where did you find 20-30G? Are you sure you’re not confusing the memory requirement with the suggested free hard drive space?

    Even if it does need 32G of RAM to perform well it’s not a very high hurdle. 32G of DDR4 can be had used for less than $75. Toss that in an old Core8/9 I5 Desktop, install your preferred flavor of Linux, add Docker, and you’re off to the races.





  • Buelldozer@lemmy.todaytoFediverse@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    20
    ·
    edit-2
    6 months ago

    Hi!

    I can’t speak for all users of lemmy.today but as a user of lemmy.today I would prefer it if we took reasonable steps like email verification to be a good neighbor, especially if it prevents other instances from de-federating us. Just my 2 cents. :)

    If you’d like help managing it I’m willing to donate time and effort.


  • The correct response to someone claiming something is propaganda is to go find more sources for more and separate incidents. If you can find multiple sources showing that a situation has happened multiple times then it stops being “propaganda” and starts being information.

    At this point I have a pile of independent sources documenting multiple different incidents that support my understanding of the situation. I’m still open to counter evidence but so far you haven’t provided any.






  • I feel like I should say that a VPN isn’t a magic bullet. Even if its configured correctly to totally obfuscate the data and the final endpoint of the traffic it’s still blatantly obvious that a VPN is in use. Given that the CCP monitors all of this stuff it wouldn’t surprise me to learn that if you run a VPN long or often enough without providing stating why that it’ll either end up blocked or you’ll end up in trouble.