a_fancy_kiwi

joined 2 years ago
[–] a_fancy_kiwi@lemmy.world 2 points 2 months ago (1 children)

You’re silly

[–] a_fancy_kiwi@lemmy.world 2 points 2 months ago (3 children)

I think your post breaks rule 4 for trolling but you’ve made a good point 🤷‍♂️

[–] a_fancy_kiwi@lemmy.world 5 points 2 months ago

Agreed. Debian with docker, flatpak, and/or distrobox is solid

[–] a_fancy_kiwi@lemmy.world 66 points 2 months ago* (last edited 2 months ago) (1 children)

Let me know when these X elite chips have full Linux compatibility and then I’ll be interested. Until then, I’ll stick with Mac, it has the better hardware.

[–] a_fancy_kiwi@lemmy.world 10 points 2 months ago* (last edited 2 months ago)

Just to add to your comment; get a three phase inspection. Inspect the foundation before the walls go up, inspect right before the drywall goes up, and inspect after the drywall goes up before you start signing paperwork. If you wait to inspect after the drywall is up, you can miss a lot.

[–] a_fancy_kiwi@lemmy.world 21 points 2 months ago (5 children)

Do you have a list of items you’d be willing to share?

[–] a_fancy_kiwi@lemmy.world 13 points 2 months ago* (last edited 2 months ago)

I’m currently using an iPhone and I had planned to go back to Android the next time I upgraded because I missed F-Droid, Obtainium, and the choice of different browser engines more than I expected. This kind of throws a wrench into that plan. If my choice is between walled garden and walled garden, why switch?

I’m currently looking into LineageOS to see if the cons of it are something I can tolerate. GrapheneOS seems cool but every pixel I’ve had has been unusable in the summer due to how it heats up and slows down to compensate. This sucks

[–] a_fancy_kiwi@lemmy.world 2 points 3 months ago (1 children)

I agree with you in principle. I just think, for the majority of people, it's not worth the risk of getting fired and getting set back in life for public comments over a YouTuber's death. I'm not saying there are no hills to die on, this just doesn't seem like the one.

I said this in a reply to someone else but my issue here is risk assessment, not whether the comments are abhorrent or not. I've read enough accounts regarding different periods of history where citizens turned each other in. If I'm going to get fired, doxxed, turned in, etc., I would want it to be over something that means more than opinions shared of Charlie Kirk.

[–] a_fancy_kiwi@lemmy.world 1 points 3 months ago

…should be cancelled?

No. I intended my comment to be more of a statement on risk assessment. Seemingly half the country is on the right. A non-insignificant portion of them would probably be empathetic to Charlie Kirk’s death.

If I’m reading the rest of your comment correctly, I’d say we are in agreement. I don’t condone the right getting people fired over this, I don’t think it’s fair, and I don’t think it’s right of them to do so. But I do think the right trying to get people fired was foreseeable and it surprises me just how many people have attached their names to their comments, especially if they aren’t set up financially to deal with any potential fallout.

[–] a_fancy_kiwi@lemmy.world 1 points 3 months ago

I completely agree with you on principle. My problem is that I don’t make “fuck you” money and whether we like it or not, seemingly half the country disagrees with our views. I can’t be starting fights and setting myself back over a YouTuber’s death.

 

This is a continuation of my other post

I now have homeassistant, immich, and authentik docker containers exposed to the open internet. Homeassistant has built in 2FA and authentik is being used as the authentication for immich which supports 2FA. I went ahead and blocked connections from every country except for my own via cloudlfare (I'm aware this does almost nothing but I feel better about it).

At the moment, if my machine became compromised, I wouldn't know. How do I monitor these docker containers? What's a good way to block IPs based on failed login attempts? Is there a tool that could alert me if my machine was compromised? Any recommendations?

EDIT: Oh, and if you have any recommendations for settings I should change in the cloudflare dashboard, that would be great too; there's a ton of options in there and a lot of them are defaulted to "off"

 

tldr: I'd like to set up a reverse proxy with a domain and an SSL cert so my partner and I can access a few selfhosted services on the internet but I'm not sure what the best/safest way to do it is. Asking my partner to use tailscale or wireguard is asking too much unfortunately. I was curious to know what you all recommend.

I have some services running on my LAN that I currently access via tailscale. Some of these services would see some benefit from being accessible on the internet (ex. Immich sharing via a link, switching over from Plex to Jellyfin without requiring my family to learn how to use a VPN, homeassistant voice stuff, etc.) but I'm kind of unsure what the best approach is. Hosting services on the internet has risk and I'd like to reduce that risk as much as possible.

  1. I know a reverse proxy would be beneficial here so I can put all the services on one box and access them via subdomains but where should I host that proxy? On my LAN using a dynamic DNS service? In the cloud? If in the cloud, should I avoid a plan where you share cpu resources with other users and get a dedicated box?

  2. Should I purchase a memorable domain or a domain with a random string of characters so no one could reasonably guess it? Does it matter?

  3. What's the best way to geo-restrict access? Fail2ban? Realistically, the only people that I might give access to live within a couple hundred miles of me.

  4. Any other tips or info you care to share would be greatly appreciated.

  5. Feel free to talk me out of it as well.

EDIT:

If anyone comes across this and is interested, this is what I ended up going with. It took an evening to set all this up and was surprisingly easy.

  • domain from namecheap
  • cloudflare to handle DNS
  • Nginx Proxy Manager for reverse proxy (seemed easier than Traefik and I didn't get around to looking at Caddy)
  • Cloudflare-ddns docker container to update my A records in cloudflare
  • authentik for 2 factor authentication on my immich server
 

I've been interested in building a DIY NAS out of an SBC for a while now. Not as my main NAS but as a backup I can store offsite at a friend or relative's house. I know any old x86 box will probably do better, this project is just for the fun of it.

The Orange Pi 5 looks pretty decent with its RK3588 chip and M.2 PCIe 3.0 x4 connector. I've seen some adapters that can turn that M.2 slot into a few SATA ports or even a full x16 slot which might let me use an HBA.

Anyway, my question is, assuming the CPU isn't a bottle neck, how do I figure out what kind of throughput this setup could theoretically give me?

After a few google searches:

  • PCIe Gen 3 x4 should give me 4 GB/s throughput
  • that M.2 to SATA adapter claims 6 ~~GB/s~~ Gb/s throughput
  • a single 7200rpm hard drive should give about 80-160MB/s throughput

My guess is that ultimately, I'm limited by that 4GB/s throughput on the PCIe Gen 3 x4 slot but since I'm using hard drives, I'd never get close to saturating that bandwidth. Even if I was using 4 hard drives in a RAID 0 config (which I wouldn't do), I still wouldn't come close. Am I understanding that correctly; is it really that simple?

 

PSA

After updating to TvOS 17, my Sonos Beam sound bar started making weird crackling sounds and music sounded tinny. Turns out, I had to change the audio format in the Apple TV settings from Stereo to Dolby Digital 5.1 for the issue to be fixed.

Not sure what I had that setting set to before but I’m leaning toward the idea that the update reset the audio format back to default settings. If you are having sound issues after updating, that might be the issue.

 

I occasionally find myself reinstalling home assistant and every time I do, I get stuck on two steps because I forgot the commands and didn't write them down from the last time. I'm writing them below mainly for myself but also for anyone else who may get stuck. For future reference, I'm using Ubuntu 23.04 with Virt-Manager.

Before you begin the installation of the provided qcow2 image, you might want to resize that image from 32G to whatever size you want. ex:

qemu-img resize haos_ova-10.3.qcow2 +68G

Next, you might want to make a network bridge device. Navigate to your netplan folder and backup the yaml file that's in there (your file may be named differently)

cd /etc/netplan

cp ./01-network-manager-all.yaml ./01-network-manager-all.yaml.old

Edit the yaml config.

nano ./01-network-manager-all.yaml

Change the renderer to networkd and add the bridge device (br0). Your ethernet device may not be named enp12s0, make sure to use your ethernet device name. If you are on wifi, look up a netplan wifi config and make adjustments as needed.

network:
  renderer: networkd
  ethernets:
    enp12s0:
      dhcp4: true
  version: 2
  bridges:
    br0:
      dhcp4: yes
      interfaces:
        - enp12s0
      parameters:
        stp: true

save the file. generate and apply the new netplan. WARNING - If you are hosting this on your own network, it's possible the Ubuntu host IP could change. If you were doing these steps over SSH, you might need to find the new IP and reconnect. Static IPs can be set in the netplan config but I usually just do it from my router settings afterwards which is probably why the IP changed.

netplan generate

netplan apply

Now just go through the installation process and when you select your network device, make sure you select "Bridge Device" and the device name is "br0"

Edit 12/15/23 - well, I rebuilt my server again. I used regular Ubuntu desktop this time and I for the life of me I couldn’t get networking to function properly. I ended up buying an Ethernet card and passed it through to the VM

view more: next ›