TCB13

joined 2 years ago
[–] TCB13@lemmy.world 2 points 1 week ago

@Vendetta9076@sh.itjust.works latest code pushed into the repo splits the config into it's own file.

[–] TCB13@lemmy.world 1 points 2 months ago* (last edited 2 months ago) (1 children)

What part of at what cost are you not getting? This is nothing with denying vaccines, there are real concern when it comes to mRNA vaccines that were simply ignored in the COVID panic. And now with all the fuzz made by COVID and the subsequent panic and mass vaccination nobody can really study or discuss the side effects properly.

[–] TCB13@lemmy.world 1 points 2 months ago* (last edited 2 months ago) (3 children)

Sure, let's make more experimental, untested vaccines that may result in even more oncology cases and all kinds of heart conditions. What can go wrong.

Look, I'm all for developing new stuff and progress but things need to be done the right way, not like this. Don't you see that pharmaceutical companies used COVID as an excuse to "prove" that mRNA was safe and now nobody can every object again to mRNA vaccines?

[–] TCB13@lemmy.world 0 points 2 months ago* (last edited 2 months ago)

Okay, I don't have anything against vaccines, and I'm fully vaccinated against more stuff that most people because I've to take trips to tropical places and I live in Europe. Now, COVID and related vaccines were all about profits not about public health. We're talking about vaccines developed in record time with experimental tech, shady statistics and govts changing their "recommendations" every week based on profits above all "now we've friends that sell masks then let's force everyone to use them".

Here's an example of how ridiculous this situation was: in my country a cousin of mine needed to take his tetanus vaccine and asked the public health system for it, the answer? "Great, we can place you on a waiting list of 6 months to a year because there's no vaccines available for that now, the labs are using all their resources to make COVID vaccines". Here's the thing, tetanus is WAY more terminal than COVID ever was, especially when talking about people under 35 yo without any prior health complications. This doesn't look reasonable at all.

All the stats on COVID, vaccines, spreading of the virus etc. are very questionable at best and then we had govts signing documents saying if things went bad then the pharmaceutical wouldn't be prosecuted. I've been told that the EU contracts for most of those vaccines are nowhere to be found as well.

So yes, vaccines are important and increased our life expectancy by a lot but what happened with COVID was bullshit.

[–] TCB13@lemmy.world 4 points 3 months ago (2 children)

It's a Pi, what are you expecting. You just wasted a ton of money on inferior hardware with extra software issues. You could've just got a mini pc with 2 nvme slots instead for half the price and add a 6 port sata board for 20$ to one of those. Much cheaper, way more reliable, upgradable and ZFS actually would've work as you expect.

[–] TCB13@lemmy.world 3 points 3 months ago (2 children)

I've said this in the past, the app is good and works fine but it lacks a standalone desktop app...

It's a bit pointless to have it working [only] the way it does, it's all JS already so why force people into Docker to install something that can already perfectly work as desktop app with Tauri, Electron or even something much simpler like a custom build C++ webview? Thanks.

[–] TCB13@lemmy.world 1 points 3 months ago* (last edited 3 months ago) (1 children)

Yes, but this is a slippery slope. You allow a govt to ID people, track movements and restrict freedoms to counteract the spread of a disease... they test the tech. The next day they're applying it to porn with the "lets protect children" mantra and a few months down the line they're applying it because of "terrorism and ilegal immigration" and then you can't travel inside your country without your digital ID flashing green and/or you cant buy stuff.

[–] TCB13@lemmy.world 9 points 3 months ago* (last edited 3 months ago) (3 children)

I don't think these systems should be implemented, the internet should be a free place and that's it. Before anyone says "what about the kids oh my god" - this has nothing to do with kids, but the politicians like to use the kids as an excuse to do anything because if you add "kids" and "pornography" or even better "online abuse" and "kidnap" into the same phrase then they can shame you and shut down any argument against whatever they want to implement.

This age verification BS is just a first step into full identity verification online and also the govt knowing exactly you're doing online, when and where. They also want to be able to instantly remove your ability to login into anything (or everything) they would like.

People say that the US is turning into surveillance / china-like state but in reality the EU is way, way closer than that. Just look at what was done with the EU Digital COVID Certificate (EUDCC) recently:

The EUDCC was a digitally-signed document. It was usually supplied in the form of a QR code, either contained in a PDF file, or as a printout. There are various mobile apps available to store and display the EUDCC (such as the Corona-Warn-App); alternatively, the EUDCC can be presented on paper.

Technically, the QR code contains a JSON document with the information payload. This JSON document is serialized using Concise Binary Object Representation (CBOR), and digitally signed according to CBOR Object Signing and Encryption (COSE). The resulting data is compressed with zlib and encoded into the final QR code

And yes, there were countries blocking you from going into a store to buy basic stuff without showing a valid COVID certificate. No vax or no proof of recovery = starve out. Add the inability to move between cities to that and you're very, very close to the "democratic" China.

More here: https://github.com/ehn-dcc-development/eu-dcc-hcert-spec

[–] TCB13@lemmy.world 12 points 3 months ago* (last edited 3 months ago)

Yeah that the obvious straightforward fix, but that's not the point. They want to have some online system that really tracks your ID checks and where you're checking it. :)

[–] TCB13@lemmy.world 6 points 4 months ago

Audio recordings in this would be useful, but the rest just kills the product.

 

uSentry is a lightweight, self-hosted Identity and Access Management (IAM) and Single Sign-On (SSO) solution designed for homelab and small-scale environments.

⚡ A single PHP file. < 400 lines of code. No database. No background processes. No cloud. Just works. ⚡

Most IAM and SSO solutions require databases, certificates and background services baked into a dozen containers. This is all fine but also also overkill for homelabs and impossible for low-power ARM devices. uSentry is different, it isn't pretty but it sucks less for a lot of use cases.

Enjoy!

 

Considering a lot of people here are self-hosting both private stuff, like a NAS and also some other is public like websites and whatnot, how do you approach segmentation in the context of virtual machines versus dedicated machines?

This is generally how I see the community action on this:

Scenario 1: Air-gapped, fully Isolated Machine for Public Stuff

Two servers one for the internal stuff (NAS) and another for the public stuff totally isolated from your LAN (websites, email etc). Preferably with a public IP that is not the same as your LAN and the traffic to that machines doesn't go through your main router. Eg. a switch between the ISP ONT and your router that also has a cable connected for the isolated machine. This way the machine is completely isolated from your network and not dependent on it.

Scenario 2: Single server with VM exposed

A single server hosting two VMs, one to host a NAS along with a few internal services running in containers, and another to host publicly exposed websites. Each website could have its own container inside the VM for added isolation, with a reverse proxy container managing traffic.

For networking, I typically see two main options:

  • Option A: Completely isolate the "public-facing" VM from the internal network by using a dedicated NIC in passthrough mode for the VM;
  • Option B: Use a switch to deliver two VLANs to the host—one for the internal network and one for public internet access. In this scenario, the host would have two VLAN-tagged interfaces (e.g., eth0.X) and bridge one of them with the "public" VM’s network interface. Here’s a diagram for reference: https://ibb.co/PTkQVBF

In the second option, a firewall would run inside the "public" VM to drop all inbound except for http traffic. The host would simply act as a bridge and would not participate in the network in any way.

Scenario 3: Exposed VM on a Windows/Linux Desktop Host

Windows/Linux desktop machine that runs KVM/VirtualBox/VMware to host a VM that is directly exposed to the internet with its own public IP assigned by the ISP. In this setup, a dedicated NIC would be passed through to the VM for isolation.

The host OS would be used as a personal desktop and contain sensitive information.

Scenario 4: Dual-Boot Between Desktop and Server

A dual-boot setup where the user switches between a OS for daily usage and another for hosting stuff when needed (with a public IP assigned by the ISP). The machine would have a single Ethernet interface and the user would manually switch network cables between: a) the router (NAT/internal network) when running the "personal" OS and b) a direct connection to the switch (and ISP) when running the "public/hosting" OS.

For increased security, each OS would be installed on a separate NVMe drive, and the "personal" one would use TPM with full disk encryption to protect sensitive data. If the "public/hosting" system were compromised.

The theory here is that, if properly done, the TPM doesn't release the keys to decrypt the "personal" disk OS when the user is booted into the "public/hosting" OS.

People also seem to combine both scenarios with Cloudflare tunnels or reverse proxies on cheap VPS.


What's your approach / paranoia level :D

Do you think using separate physical machines is really the only sensible way to go? How likely do you think VM escape attacks and VLAN hopping or other networking-based attacks are?

Let's discuss how secure these setups are, what pitfalls one should watch out for on each one, and what considerations need to be addressed.

 

The most severe restrictions to the general public are imposed within a 20-mile (32 km) radius of the Green Bank Observatory.[5] The Observatory polices the area actively for devices emitting excessive electromagnetic radiation such as microwave ovens, Wi-Fi access points and faulty electrical equipment and request citizens discontinue their usage. It does not have enforcement power[6] (although the FCC can impose a fine of $50 on violators[7]), but will work with residents to find solutions.

0
submitted 2 years ago* (last edited 2 years ago) by TCB13@lemmy.world to c/selfhosted@lemmy.world
 

The Banana Pi BPI-M7 single board computer is equipped with up to 32GB RAM and 128GB eMMC flash, and features an M.2 2280 socket for one NVMe SSD, three display interfaces (HDMI, USB-C, MIPI DSI), two camera connectors, dual 2.5GbE, WiFi 6 and Bluetooth 5.2, a few USB ports, and a 40-pin GPIO header for expansion.

 

cross-posted from: https://lemmy.world/post/7123708

In this article, you will discover the ISO images that Debian offers and learn where and how to download them. I’ll also provide some useful tips on how to use Jigdo to archive the complete Debian repository into ISO images.

 

Here is what I don't get about Wine. Even in 2023 it seems to fail to handle basic Windows software written in 1996-1995 like the classic convert.exe (https://joshmadison.com/convert-for-windows/). This program and others run flawless in ReactOS for instance, why not under Wine?

Another things I don't get include:

  • Why is Wine is still stuck on that Windows 98 style GUI instead of a more modern thing;
  • Flickering;
  • How can ReactOS, that shares code with Wine, run everything way more smoothly?

For reference I'm using Debian 12, Wine 8.0. Also tried with Soda 7.0, same results.

view more: next ›