beirdobaggins

joined 2 years ago
[–] [email protected] 4 points 2 weeks ago

Mine shows the full path and a new line for commands.

It will also print the exit code of the last command in red above the prompt, if the exit code is not 0.

PS1='$(ec="$?"; if [ $ec -gt 0 ]; then echo -e "\n"[\e[91m]"exit code: $ec"[\e[0m]; fi)\n[\e[92m]\u[\e[38;5;213m]@[\e[38;5;39m]\h[\e[0m]:$PWD\n$ '

[–] [email protected] 5 points 2 weeks ago

Love child of Bilbo Baggins and a particularly hairy dwarf.

[–] [email protected] 5 points 2 weeks ago

TIL that Arch users are Pastafarians.

May you be touched by his Noodly appendage!

[–] [email protected] 9 points 2 weeks ago

The meme is talking about sshfs.

For smb, the share would need to be created first.

Sshfs is pretty nice because it will give you access to all of the files that on the server that you have permissions to access.

[–] [email protected] 12 points 3 weeks ago (5 children)

clearly knows what he is doing

[–] [email protected] 4 points 1 month ago (1 children)

fusilli but i pronounce it F. U. Silly

[–] [email protected] 0 points 1 month ago

yeah, I know. that why I want to do it.

[–] [email protected] 0 points 1 month ago (2 children)

Yeah, my plan will be to use a domain that I don't actually use for my email to start with, make sure that I can reliably send and receive mail with it. Then add my normal email domain for sending-only to start, will just need to add it to my spf and dkim records. Once I test with that and verify that I can reliably send mail then I can fully switch things over.

Still trying to decide what do do about full disk encryption.

Thinking that maybe I can host a decryption key on private github repo, have the preboot environment use a local key to download the decryption key to ephemeral storage and use it to unlock the disk. This doesn't make it truly secure because anyone with access to the boot partition could figure out what is happening and do it manually. but it would make it difficult enough that a bored sysadmin at the vps provider couldn't just browse me data easily.

I'd really like it better if I could have it send me a push notification to my phone to authorize the unlock. Maybe I can set that up with how ever I decide to host the decryption key.

[–] [email protected] 4 points 1 month ago (7 children)

Toying with the idea of running my own email server. Lots of people say this is a bad idea.

Been doing lots of research. I have a VPS for it already and want to set it up with postfix, dovecot, roundcube, and mariadb.

I don't want to host locally because I don't want it to depend on my internet connection and because my ip address will likely change at some point and most residential IPs are blacklisted.

But also don't want to host it on someone else's machine unless I can totally encrypt the drive. I have been looking at how to do full drive encryption on a vps hard drive by adding dropbear ssh to the initsys so I can ssh in and enter the decryption password when rebooting.

This also doesn't seem ideal, because it would require me to be available to do this for every reboot.

So still researching to see what other options there are.

[–] [email protected] 3 points 1 month ago (1 children)

I thought they got rid of the iguana mascot.

I guess they realized that it was the best thing about their brand.

[–] [email protected] 4 points 2 months ago (3 children)

I really like and use fastmail.

Although I have just started to try to completely de-google. Its a bit frustrating that they don't offer an apk download. I put in a ticket today saying as much.

They seemed to understand,but basically just said that all I can do is to use the browser version.

I'm using aurora store to download their official google play version for now but it feels icky.

They are obviously now the only ones that I am having trouble with but I thought that they might be more willing to help people distance themselves from Gmail and Google, as Gmail is their obvious competition.

[–] [email protected] 3 points 2 months ago (1 children)

Doesn't turn 2fa into 1fa?

I like to know that even if someone got into my bitwarden vault they would still not be able login to my most important stuff.

 

I have a question about hardware security keys. Like a yubikey.

I have not actually used one before so maybe I am missing some critical information.

Aren't they inherently less secure than a TOTP code?

If someone ( like a evil government ) gets your key and knows your password for a particular service or device, they can login.

If these same people try to login but it is secured with a TOTP code instead, they would need access to my phone, which requires a password to unlock and then biometric validation to open TOTP app.

I mean yeah, they could just beat me with a large wrench until I agreed to login for them, but that is true with any method.

I've heard that in the US, the 5th amendment protects you from being forced to divulge a password, but they can physically place your finger on the finger print scanner.

 

$10 Benchmade bugout inspired knife with D2 steel

3
EDC Toolkit (lemmy.world)
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]
 
  • 6 in 1 Milwaukee Fastback with bit-driver

  • Curated set of bits to fit most occasions.

  • Icon micro ratchet with extension and 1/4 square socket adapter.

  • Cheap 4 mm bit driver, seems like it is the same as the Harbor freight one I've seen before.

  • Knipex 87-100 cobra pliers

  • Mini Bic lighter

  • Bit of glue stick

  • Bit of gaffer tape

  • 16 feet of micro cord

  • A few zip ties cut down to shorter length

  • Tweezer man nail tool that came with nail clippers. I use it a lot for poking, scraping and prying.

It all packs up pretty well in an old earbud case I found at a thrift store.

The only things I still want to add to this kit is the Knipex xs Pliers Wrench and a double sided sharpie.

1
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

phone: Samsung Galaxy S23 Ultra

pen: Pilot G-2 .07

earbuds: Tozo T6

USB drives: Samsung USB-C 64GB and 256GB

knife: Gerber EAB Exchange a blade

wallet: Chums Surfshort Wallet

The 64GB drive is setup with Ventoy and has a ton of bootable ISO files on it.

The 256GB drive is encrypted and has a copy all of my files. (not including files that could be easily reproduced, like movies and music)

view more: next ›