

I’ll prolly give it a shot at some point. I bought lifetime plex long before jellyfin was a thing. Is there an experience similar to plexamp? It’s too good.
(҂⌣̀_⌣́)
I’ll prolly give it a shot at some point. I bought lifetime plex long before jellyfin was a thing. Is there an experience similar to plexamp? It’s too good.
Plex allows this as long as you set whatever devices local IP on the allow without authorization list. I also know that plex just gets shit on the fediverse. Jellyfin doesn’t have local allowance baked in? I’ve never used it.
Not outright displayed but you can find them in the source code.
Would be helpful to let everyone know the TOS you violated.
Wasn’t anywhere near a temper tantrum either.
I’d call that far from edgy. Some of you are ridiculously pathetic when it comes to the sensitivity.
Awesome, this is something I’ve wanted forever.
There are third party keyboards on iOS. The person you responded to is right that there is shake to undo, but this prompt has absolutely nothing to do with it.
Awesome, need to incorporate this in my lemmy registrations.
Edit: never mind just saw the note about it not being secure lol
Maybe https://snapdrop.net/
It is truly awesome. Kbin/mbin goes a step further and gives you the choice of viewing the way you’d like. Haven’t used them though. My twitter use was very specific and mastodon definitely doesn’t fill that void.
I see it but your subject is just the post contents until it reached a character limit. So it looks like crap.
Maybe install Debian and setup yunohost.
https://www.racknerd.com/ ¯\_(ツ)_/¯
I agree, but it was initially snuck on through TestFlight.
It was initially launched through TestFlight you’re conflating two ways it was distributed to just try to call me an idiot. I’m assuming you don’t even know what TestFlight is.
No, they’re wrong. They were wrong as soon as they said a Trojan you have to install yourself, which is exactly how it works. It can’t work if you weren’t tricked into installing it. The Trojan doesn’t have to cause harm it’s called a Trojan based on the way it has to be deployed.
What? I’m confused by the question the OP asked if it’s just automatically that way.