In general, FortNine's channel[0] is incredibly informative and entertaining; many comments on his videos suggest people watch without even riding a motorcycle. See his educational, elaborate explanations of the physics of riding, market/business aspects (esp. interesting is relationship between motorcycle dealerships and manufacturers), reviews, and much more. Well worth exploring.
Not sure. A cursory look suggests it runs file ops in a thread pool.
The problem that I'm aware of is at a deeper level and has to do with the ability (or lack thereof) to set nonblocking on file descriptors associated with disk files.
Because it's default configuration and (most) naive setups offer no redundancy? It is almost entirely in-memory with no easy eviction controls? If you are going to snapshot on every change because the thing you are doing needs to happen another purpose built queue like rabbitmq is going to perform better in this situation, especially during failures.
I've had mixed experiences with RQ. It works great most of the time, but I've observed that you can get into weird states if you OOM your system or otherwise throw curveballs at it. Overall I think Python makes it easy enough to handroll a queue management system that I would generally recommend that over RQ.
Are there legal implications on an ISP subscriber if illegal activity is conducted via their network? I would very much mind sharing a ‘small fraction of bandwidth’ while having arbitrarily large legal exposure.
My guess is that the legal exposure would be minimal because you'll only be able to connect to whitelisted endpoints (basically whoever partners up with AMZN).
Even if legally you're in the clear, you'd still run the risk of getting all you electronics confiscated until the police figure out that you were just sharing your bandwidth, no?
Based on my reading of the article all traffic is sent to amazon. So presumably you won't get in trouble for trickling a small encrypted channel of data to Amazon.
Basically with the fixed Amazon endpoint it bypasses direct illegal activity and general network abuse. Of course this means that everything goes through Amazon and that if someone gets your IP from Amazon you still might have some difficulty.
I think the security white paper addresses this silently by making the claim that the devices can’t be tracked due to a combination of encryption and periodic re-addressing. I’m skeptical of the security guarantees, but it’s a good step.
[0] https://github.com/jsha/minica