Skip Navigation

Posts
11
Comments
104
Joined
9 mo. ago

  • It is a gamble, fuck the AI bozos for speculating us into economic uncertainty

  • For power on and off automatically, I just rely on Linux’s spin down timer. Which I guess is built in - not sure of anything more specific!

  • Git me lost in some woods that unsettle me with hoodwinks and feelings of looming demise and cutting laughter any day

    just so I feel something again

  • Backup drive doesn’t need to be anything more than holding your (ideally daily) backup of your main drive(s). It doesn’t need to be powered up and spinning all the time, it can be in the same computer. Spinning up and down causes major wear on hard drives, but I think spinning up once a day for backups is fine and won’t stress it.

    For example, have 3 used enterprise drives in my computer case: 2 in BTRFS RAID1 (mirror) as a data drive and 1 with BTRFS as a backup drive. I use snapshotting to mirror the data drive to the backup drive. I then use restic to copy essential data from the backup drive to a remote cloud location (friend’s house with a 4th smaller hard drive - if I did not have a friend with a hard drive I would use hetzner most likely). My Linux ISO’s don’t go remote, but my photos do.

    Thus I have immediate redundancy (and bit rot protection) from the BTRFS RAID1 data drives, I have a local full backup with the BTRFS backup drive, and I have my essential stuff far away if the computer explodes or something.

    Edit: again, if I was going to save cash I would drop the RAID1 from the data drives and just get 1 data drive and 1 backup drive. RAID1 is never as good as an independent copy.

  • I got several from them and they’ve been fine for a year now - and theoretically have a 5 year warranty from them too. So worked out for me to save some cash! Buuuut if they do end up failing, it’s gonna be a hassle to get replacements for sure

  • Consumer is fine then, cheapest you can. Edit: I did see people mention SMR drives, get cheapest CMR drives. SMR is not worth the money saved for usual use cases.

    You can def wait, but do the over-under with what you can pay. External drives, even if shucked, seem to be the lowest quality drives and die earliest. May be better to get real drives now, even with inflated costs.

    Make sure you get a drive for backup. Extra layout up front but worth it. I’d recc 1 data drive + 1 backup drive over just 2 raid1 data drives any day.

  • Now is a bad time to buy hard drives price-wise. Massive price gouging going on with all storage pre-sold based on IOUs to “AI” companies.

    If you must…

    Buy used enterprise drives with a ~5 year warranty. In US there is serverpartdeals and goharddrives. I am not sure of the Europe equivalents but I am sure they exist. The enterprise drives should be cheaper than new drives and will last longer; they’ve been used out of their early failure bathtub curve but they’re young enough to be given a 5 year warranty. Make sure to get ones with SATA connectors not SAS, you’ll need a PCIe card to talk to the SAS ones, and maybe something for power idk.

    They should be cheaper - I am not sure if price uncertainty has upended that.

    Enterprise drives are louder, I have them in a quiet case with sound dampening padding (fractal define) and I do not hear them 5 feet away.

    I have heard bad things about consumer drives longevity. I used several 1 TB barracudas for years with no issues in a server setting, I used 3 TB barracudas in a server setting and one failed early. I used a 4 TB Toshiba that failed early and I used an 8 TB blue that is fine in a personal computing setting. I have bought enterprise drives and none have an issue yet.

    It seems luck of the draw, so the thing to maximize is cheapest per GB.

  • Fuck AI @lemmy.world

    Ars writers likely used AI to hallucinate quotes from the blog “An AI Agent Published a Hit Piece on Me”

    web.archive.org /web/20260213194851/https://arstechnica.com/ai/2026/02/after-a-routine-code-rejection-an-ai-agent-published-a-hit-piece-on-someone-by-name/
  • 🥺👉👈

  • King, simply neg your collaborators into using overleaf

  • You cannot control where pictures occur within a text body in latex, it decides for you. You can give it recommendations, but it’ll figure out the final alignment when rendering to page. I’m not sure that’s a limitation you want for design-focused use cases.

    And if you want to do something seriously nice you need to code a it in latex’s reverse Polish notation code language from hell, let me tell you latex ain’t the future of ease haha

  • Be wary, pea-based whistles will freeze up from humidity from blowing. And they won't work in the rain either. SOS has a non-lanyard one that's pealess, and idk where you're planning on deploying 500+ whistles but if it was in a cold area or a wet area they'll fail. And they probably will fail if blown on continually in dry conditions due to moisture as well.

  • SSH lets you remotely control a computer It runs on port 22 If you forward port 22 to your computer, you will allow anyone on the internet to SSH to your computer

    You can do that pretty safely by disabling root login and disabling password logins - only using keys to SSH in.

    You can join the borg botnet by enabling root login, setting a simple password (maybe even password as recommended!), and waiting.

  • King, all you must do is set up root ssh access with a short password and port forward port 22 to it. Super easy, super quick!

    For extra spice, I’d recommend also hitting your hard drives with a hammer once or twice a day. They just don’t like vibrations; you’ve gotta weed out the weak ones. Only the strong data will survive.

  • The only thing that can get hacked is something that responds on the World Wide Web.

    So you limit the scope of what talks to the WWW:

    Wireguard VPN will not respond unless the magic keys are correct, it’s ideal security and obscurity. Put everything you can behind it.

    For things I want on the WWW without a VPN, I split out two options otherwise.

    1. Caddy checking mTLS certificates that basically allows a device access without extra steps - relying on Caddy to be strong and mTLS to be strong.

    2. Authentik’s proxy check, I think Authelia has this too, but to access a site you hit an Authentik login first.

    For both of those, you rely on those services not having 0-day hacks. More likely for these services to stay ahead of the game and/or fix quick than something that doesn’t exist just to do authentication. I run them in containers that are run by independent users and are read-only with capabilities limited, in a VM.

    I’d say the Caddy route is more secure than Authentik, but it needs more effort to setup the certificate stuff. Authentik route needs a web browser to log in with. Obviously the WG VPN is primo.

    Edit: also tailscale is just managed wireguard, so it has the same benefits as a wireguard vpn with the catch a company has access to your network also now. But really simplifies setup…..

  • Gotchya, so at the reverse proxy stage you have a pathway for “if they have the mTLS certificate, allow in” to let you access your stuff from outside your local network?

  • I’ve found Authentik’s proxy will break things that don’t support it (like a Jellyfin app; afaik no app supports hitting an Authentik proxy login first). Do you have a way around that? Or are the friends/fam web-browser only unless they get around to the certificate?

  • If you feel up for answering, what is your use case for wanting to manage your own mTLS?

  • That statue killed its creator and has veiny balls, it’s got it all

  • 196 @lemmy.blahaj.zone

    we stay ruley

  • 196 @lemmy.blahaj.zone

    gary rule

  • 196 @lemmy.blahaj.zone

    boiler exprulesion

  • 196 @lemmy.blahaj.zone

    wiimote speakerule

  • 196 @lemmy.blahaj.zone

    infinite crimes rule

  • 196 @lemmy.blahaj.zone

    doot doot rule

  • 196 @lemmy.blahaj.zone

    shrimp maxxing rule

  • 196 @lemmy.blahaj.zone

    The Velocirulezzler

  • Selfhosted @lemmy.world

    IPv6 & Opnsense & Not Exposing Machine-Specific IPv6s to Corpos

  • 196 @lemmy.blahaj.zone

    Lex is a hacker rule