Cool, thanks.
Cool, thanks.
Idk, you’re probably right.
People are aguing about the reparability thing a lot. Current electric cars are less reparable, but that is by design. Car manufacturers are using electric as an excuse to make cars harder to repair. The reality is that electric motors and batteries are dead simple, they just add a bunch of techno bullshit to make them worse. Charging is bad right now, but that will improve with time, just like gas did when gas cars were new. I like cars, and hate seeing them being turned into what they are today, but there is nothing fundamentally different about electric cars to make them the piles of absolute garbage they are, (apart from battery technology not being great right now). 90% of the problems with electric cars are there by design, and I think everyone should buy a car that isn’t designed to suck, whether it’s gas, electric, steam, or fart powered.
What do you mean? She’s 32000 years old. /s
Delete /etc to make your system faster. /s Also, obligatory warning to NEVER DO THIS for anyone new to Linux.
Did you have to use a display to flash? Some of them don’t seem to have a display output and I don’t know if that will be an issue. The apple thing concerns me. There are a few macs and iPhones on the network, but the macs are m1, and the oldest iphone would be a 12. Do you think that would be an issue? Also, which R3 router are you using specifically?
You may get better responses posting this on [email protected].
Unless I’m missing the joke, I think you’re in the wrong place. Also, IDK.
Skimming the article, it appears they attacked a particular client that is popular in Korea.
They said they want a local backup so they don’t have to redownload because bandwidth is expensive. I think a RAID makes more sense. I also don’t think btrfs is a great idea for a boat. Power failures will probably be somewhat common, and btrfs is not the most stable, so I don’t think I would trust it in weird conditions. Documentation is definitely a great idea though.
For hardware, I would go with sata ssds for storage. I also would recommend a separate boot drive as it makes re installing without loosing data a breeze. You could go with a new processor from intel or amd, and make sure it has onboard graphics. You should also go into the BIOS, enable xmp (always do that. It’s free performance), and look for power saving settings. You could go for arm, but most arm computers lack expansion options and that can mean you use USB for drives which is unreliable. I think dc atx power supplies are a thing, but I know nothing about them. I would recommend doing ext4 and a raid, ideally 6 or 10. That will give you stability (from filesystem issues) and good reliability. I know RAID is not a backup, but in this case it may be what you want. RAID is for uptime, and it would be able to usually buy you enough time to finish your trip, or you could even have spare drives onboard and fix it while you’re out in like 10 minutes. Also, I would highly recommend researching how to power it well. Starting an engine can mess with the power and could fry a computer. I don’t know if a dc ups is a thing, but if it is, get it.
For software, use whatever you want, mostly. I always use debian for servers, but proxmox would probably be fine. You can use powertop to make sure it runs efficiently.
You can. I am lucky enough to not have been hacked after about a year of this, and I use a server in the living room. There are plenty of guides online for securing a server. Use common sense, and also look up threat modeling. You can also start hosting things locally and only host to the interwebs once you learn a little more. Basically, the idea that you need cloudflare and aws to not get hacked is because of misleading marketing.
I know i2p is a bit hard, but if you can figure out how to torrent you should be able to. I would recommend i2p+, which is a fork of i2p that is compatible with regular i2p but is easier to setup. Get the installer here: https://i2pplus.github.io/. If you are on linux, don’t worry about it being an exe, it is java and you can run it with “java -jar file.exe.” After that, you can open a browser and type localhost:7657. Set your proxy in your browser to localhost:4444, for the http and https settings. It may be different if you use chrome. Now you should be able to access tracker2.postman.i2p/. Don’t forget a slash at the end. Your browser won’t recognize it as a website without it. You will need the torrent client, i2psnark, which can be accessed on localhost:7657/i2psnark.
This may sound complicated, but the steps to install i2p boil down to:
I agree, though I wouldn’t blame the article. If it is insecure, you shouldn’t be using it unless it is set up to allow you to run a real os on it.
I think the teacher specified that we use eclipse, and most who didn’t were using vscode. If I recall correctly, they did use eclipse. I don’t remember how it handles saves, but I don’t think it does that.
Gen Z here. Totally agree, though I personally am a bad example for this one. There was someone in my CS class once who I was put into a group with for a project. I needed some code that they had, so I asked them to put it on my flash drive. It was taking a while and eventually I asked why. They didn’t know where their IDE saved their code, and were using Windows search to try and find it. They were pretty good at actual programming, logic, etc. though.
Openhab is a project like HomeAssistant. Both are basically websites that offer pre made smart home functionaility and can run on your own server. Openhab doesn’t set a password by default (iirc), and when people expose it to the internet they end up with random bored people in another country somewhere flipping their lights on and off or adjusting their thermostat, though they could also get hacked. The openhab example was one of what not to do. I could have been more clear about that.
Security is an issue that people in this community are fairly opinionated on. Try to build up a practical knowledge of every tool you use (like tools for remotely managing your server). Think about how much access that tool gives you, and how easy it is to get. Ssh gets you basically full access to the system, except for bios level settings and things, but it is generally quite secure, and you can use keys instead of passwords. Cockpit, a remote management tool you can access from your browser, offers you a full terminal, so functionally the same access as ssh. However, hackers nearly got a back door into openssh (ssh is the protocol, openssh is the software on linux that implements that protocol), and cockpit is much less thoroughly looked at. Also cockpit doesn’t let you use keys.
You’re website will be static, which decreases the complexity and makes it easier to make it secure, so don’t worry too much. Here are some links that might be useful: https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on-a-linux-server
https://www.cyberciti.biz/tips/linux-security.html (this one seems to be geared more towards enterprise stuff, so not all of it is relevant, but a decent amount is.)
Edit: This one is good too. I recommend at least skimming it before the one above this. It will help you figure out which of the points in the link above are worth paying much attention to. https://owasp.org/www-community/Threat_Modeling
Yeah. I just forward SSH with keys only on a nonstandard port + fail2ban. Plus you can access local only services with an SSH port forward.
That’s also why I don’t use cockpit. It looks cool, but opens up vulnerabilities for very little benefit.
You can use I2p and upload to postman (tracker).
You can do that with pihole and basically any reverse proxy. The process is the same, so you can follow tutorials, you just have to set up your domain through your pihole instance instead of a registrar. You can set pihole as your dns for specific devices, or you can set it as the default dns for your network through the router.