BonkTheAnnoyed

joined 3 months ago

Maybe? If they're suffering from brain injury, developmental disability, age related dementia, or similar.

[–] BonkTheAnnoyed@lemmy.blahaj.zone 0 points 14 hours ago* (last edited 14 hours ago) (2 children)

The sad thing is, if it weren't for the privacy horrors of today's world, a voice activated agentic OS could be a fantastic accessibility aid for visually and cognitively impaired people, for example

The real answer is, ngnx is a great fit. I already know most quirks of Apache, though, and I don't necessarily want to pull in another manual to my brain.

I might switch in the future, though. It'd be handy to have that in my pocket.

I'm not using containers, per se, at least not in the docker sense, virtualization is done with is KVM

That's a really good strategy , thanks!

[–] BonkTheAnnoyed@lemmy.blahaj.zone 2 points 1 day ago (4 children)

thanks! It's hard not to feel out of my depth, it's been so long. And, it being my own info, not a corp's protected by insurance, indemnity, mandatory arbitration, and (as a last resort) backups, the stakes feel a little higher.

 

cross-posted from: https://lemmy.blahaj.zone/post/34623175

How realistic is this architecture? It's been a while since I've set something like this up for work.

The thought behind this layout is that having only one machine hanging out there with just Apache and ssh (from lan only, non-standard port), and forwarding via Mod_Proxy any services I might want to share with non-LAN friends/family (photos, docs), is a smaller exposure than hosting all my VMs in a DMZ and hoping that the one server doesn't get nuked.

Something like: DNS -> public-zone{ www-serv } <-> firewall-1 <-> lan{ vm-host <-> firewall-2 <-> (printers, laptops, etc) }

firewall-1 is actually a router running Tomato, with custom iptables rules. That way if www-serv is compromised the attacker can't just drop some rules.

firewall-2 is just iptables rules on vm-host

all LAN computers' iptables are a little more permissive, with holes for SAMBA, CUPS, and ssh on non-standard port.

What do you think? Is this sufficient? What would you do differently?

 

How realistic is this architecture? It's been a while since I've set something like this up for work.

The thought behind this layout is that having only one machine hanging out there with just Apache and ssh (from lan only, non-standard port), and forwarding via Mod_Proxy any services I might want to share with non-LAN friends/family (photos, docs), is a smaller exposure than hosting all my VMs in a DMZ and hoping that the one server doesn't get nuked.

Something like: DNS -> public-zone{ www-serv } <-> firewall-1 <-> lan{ vm-host <-> firewall-2 <-> (printers, laptops, etc) }

firewall-1 is actually a router running Tomato, with custom iptables rules. That way if www-serv is compromised the attacker can't just drop some rules.

firewall-2 is just iptables rules on vm-host

all LAN computers' iptables are a little more permissive, with holes for SAMBA, CUPS, and ssh on non-standard port.

What do you think? Is this sufficient? What would you do differently?

She's positioning herself for running as Vance's VP in 2028. That's it.

She hasn't had a change of heart, she doesn't warrant us "giving her a chance," she's not "okay for a republican."

NOTHING has changed.

She's an unapologetic white supremacists who is happily employed by the billionaire class.

[–] BonkTheAnnoyed@lemmy.blahaj.zone 2 points 5 days ago (1 children)

I happen to know of a newly minted trillionaire whom in a just world would reasonable be asked to foot the bill

Jack Dorsey once again singing "but baby I've changed!"

hard pass from me.

[–] BonkTheAnnoyed@lemmy.blahaj.zone 8 points 1 week ago* (last edited 1 week ago)

Good. Because without even reading it I'll bet they tried to throw trans people under the bus again

[–] BonkTheAnnoyed@lemmy.blahaj.zone 1 points 2 weeks ago (1 children)

Are API calls to the device signed or whatever? At a minimum one could snoop traffic to rev-eng the API, then recreate it on a lan-only segment

42
submitted 3 weeks ago* (last edited 3 weeks ago) by BonkTheAnnoyed@lemmy.blahaj.zone to c/196@lemmy.blahaj.zone
 

~~transpeople~~ (and ~~transman~~ and ~~tramswoman~~) is dehumanizing.

“Trans people” and “cis people.” Otherwise it reads like, “blarglepeople” and “actual people.”

The mashing together of the words was the language of the early anti-trans propaganda. It was successful enough that even allies continue to use it, unfortunately. Mostly because they’ve come up with new and worse ways to deny our existence while specifically addressing us.

I would say that it feels like blowing into the wind, but I know things like this can change, especially if 'teh youth" get it.

 

cross-posted from: https://lemmy.blahaj.zone/post/33020379

cross-posted from: https://lemmy.blahaj.zone/post/33020376

One more step to unhitching from Google...

Right now the only option I see in F-Droid is Aegis.

I'm not sure what to actually look for side from checking for unexpected permissions and reasonably frequent updates.

Hopefully something I can sync with a GNOME app...

 

cross-posted from: https://lemmy.blahaj.zone/post/33020376

One more step to unhitching from Google...

Right now the only option I see in F-Droid is Aegis.

I'm not sure what to actually look for side from checking for unexpected permissions and reasonably frequent updates.

Hopefully something I can sync with a GNOME app...

 

One more step to unhitching from Google...

Right now the only option I see in F-Droid is Aegis.

I'm not sure what to actually look for side from checking for unexpected permissions and reasonably frequent updates.

Hopefully something I can sync with a GNOME app...

 

cross-posted from: https://lemmy.blahaj.zone/post/33012882

Planning on switching to GrapheneOS soon. Anyone know if they're planning on implementing the side-loading restrictions?

 

Planning on switching to GrapheneOS soon. Anyone know if they're planning on implementing the side-loading restrictions?

 

cross-posted from: https://lemmy.blahaj.zone/post/31922513

cross-posted from: https://lemmy.blahaj.zone/post/31922512

I recently picked up an older but perfectly adequate HP Z Book Firefly with a built-in smart card reader and I'm wondering what possible use is this little bit of tech? Can I, like, auth with my credit card or whatever? (mostly joking, I briefly looked at the PAM config for that and prefer my current hobbies lol)

 

cross-posted from: https://lemmy.blahaj.zone/post/31922512

I recently picked up an older but perfectly adequate HP Z Book Firefly with a built-in smart card reader and I'm wondering what possible use is this little bit of tech? Can I, like, auth with my credit card or whatever? (mostly joking, I briefly looked at the PAM config for that and prefer my current hobbies lol)

view more: next ›