a_fancy_kiwi

joined 2 years ago
[–] a_fancy_kiwi@lemmy.world 24 points 1 month ago

2018 - adds digital wellbeing features to help you disengage from your device

2025 - makes the entire interface more engaging to help keep you engaged

It looks nice. It’s like having a casino in your pocket.

[–] a_fancy_kiwi@lemmy.world 29 points 1 month ago (1 children)

Have you seen the price of McDonalds recently? I’d rather miss a meal than get scammed like that. Fuck them.

[–] a_fancy_kiwi@lemmy.world 5 points 2 months ago* (last edited 2 months ago) (4 children)

22nd Ammendment

What’s stopping Trump from having a puppet run for President and he as Vice President? The puppet could then step down after Inauguration Day.

The argument I’ve heard being, the Vice President isn’t elected to the office of the President.

Edit:

Does the 12th Amendment negate that argument? The last sentence in the amendment seems to suggest so.

12th Amendment

[–] a_fancy_kiwi@lemmy.world 8 points 3 months ago

To go along with that, Telegram doesn't make it easy to set up an encrypted chat. First, you have to set up a regular chat, then tap on the profile image of the person you are messaging, then tap the 3 dot menu, and finally tap "secret chat". It's there but they clearly don't want people using it.

[–] a_fancy_kiwi@lemmy.world 3 points 3 months ago (2 children)

If you know iptables, just stick with that. In my testing, docker containers seem to ignore ufw rules. Supposedly, iptable rules are respected but I haven't learned iptables yet so I can't verify.

[–] a_fancy_kiwi@lemmy.world 3 points 3 months ago

I don't know what the fuck is going on. The client app connects to all 4 servers it needs a connection to. I can create a user on the server and all clients can login using it, I just can't get notes to sync.

Official docs here

I found this tutorial1 and this tutorial2

Tutorial2 makes this one port change to the official docker compose file but otherwise is seemingly the same as tutorial1:

  notesnook-s3:
    image: minio/minio:RELEASE.2024-07-29T22-14-52Z
    ports:
      - 9009:9000
      - 9090:9090

With that change, and setting the port of the domain to 9090, I can access minio in the browser. But I don't know if that's necessary or not. I'm stumped.

[–] a_fancy_kiwi@lemmy.world 9 points 3 months ago* (last edited 3 months ago) (3 children)

Did you by chance self host the sync server using docker compose? Their instructions aren't great and I was hoping you had some tips.

For anyone else interested, if I figure it out, I'll post what I did here.

Edit 1: I finally got it all setup but syncing isn't working so I guess I did something wrong 🙄 . Troubleshooting now

[–] a_fancy_kiwi@lemmy.world 2 points 3 months ago

I cannot think of a situation where I would have access to those but not have access to a full PC

I feel the same way. I'm probably not the target audience for this feature. I could see it being beneficial for lower income families though. Seems like most kids have phones but many don't have their own PC.

[–] a_fancy_kiwi@lemmy.world 5 points 3 months ago (4 children)

9 meals

I'm not familiar with that reference

[–] a_fancy_kiwi@lemmy.world 4 points 3 months ago (3 children)

2) Running Windows or desktop Linux applications with desktop mode + USB-C DisplayPort alt mode on the Pixel 8 and later.

I'd be curious to know what desktop apps people plan on running on their phones. It's cool that it's possible but I'm not sure what I would do with it.

 

This is a continuation of my other post

I now have homeassistant, immich, and authentik docker containers exposed to the open internet. Homeassistant has built in 2FA and authentik is being used as the authentication for immich which supports 2FA. I went ahead and blocked connections from every country except for my own via cloudlfare (I'm aware this does almost nothing but I feel better about it).

At the moment, if my machine became compromised, I wouldn't know. How do I monitor these docker containers? What's a good way to block IPs based on failed login attempts? Is there a tool that could alert me if my machine was compromised? Any recommendations?

EDIT: Oh, and if you have any recommendations for settings I should change in the cloudflare dashboard, that would be great too; there's a ton of options in there and a lot of them are defaulted to "off"

 

tldr: I'd like to set up a reverse proxy with a domain and an SSL cert so my partner and I can access a few selfhosted services on the internet but I'm not sure what the best/safest way to do it is. Asking my partner to use tailscale or wireguard is asking too much unfortunately. I was curious to know what you all recommend.

I have some services running on my LAN that I currently access via tailscale. Some of these services would see some benefit from being accessible on the internet (ex. Immich sharing via a link, switching over from Plex to Jellyfin without requiring my family to learn how to use a VPN, homeassistant voice stuff, etc.) but I'm kind of unsure what the best approach is. Hosting services on the internet has risk and I'd like to reduce that risk as much as possible.

  1. I know a reverse proxy would be beneficial here so I can put all the services on one box and access them via subdomains but where should I host that proxy? On my LAN using a dynamic DNS service? In the cloud? If in the cloud, should I avoid a plan where you share cpu resources with other users and get a dedicated box?

  2. Should I purchase a memorable domain or a domain with a random string of characters so no one could reasonably guess it? Does it matter?

  3. What's the best way to geo-restrict access? Fail2ban? Realistically, the only people that I might give access to live within a couple hundred miles of me.

  4. Any other tips or info you care to share would be greatly appreciated.

  5. Feel free to talk me out of it as well.

EDIT:

If anyone comes across this and is interested, this is what I ended up going with. It took an evening to set all this up and was surprisingly easy.

  • domain from namecheap
  • cloudflare to handle DNS
  • Nginx Proxy Manager for reverse proxy (seemed easier than Traefik and I didn't get around to looking at Caddy)
  • Cloudflare-ddns docker container to update my A records in cloudflare
  • authentik for 2 factor authentication on my immich server
 

I've been interested in building a DIY NAS out of an SBC for a while now. Not as my main NAS but as a backup I can store offsite at a friend or relative's house. I know any old x86 box will probably do better, this project is just for the fun of it.

The Orange Pi 5 looks pretty decent with its RK3588 chip and M.2 PCIe 3.0 x4 connector. I've seen some adapters that can turn that M.2 slot into a few SATA ports or even a full x16 slot which might let me use an HBA.

Anyway, my question is, assuming the CPU isn't a bottle neck, how do I figure out what kind of throughput this setup could theoretically give me?

After a few google searches:

  • PCIe Gen 3 x4 should give me 4 GB/s throughput
  • that M.2 to SATA adapter claims 6 ~~GB/s~~ Gb/s throughput
  • a single 7200rpm hard drive should give about 80-160MB/s throughput

My guess is that ultimately, I'm limited by that 4GB/s throughput on the PCIe Gen 3 x4 slot but since I'm using hard drives, I'd never get close to saturating that bandwidth. Even if I was using 4 hard drives in a RAID 0 config (which I wouldn't do), I still wouldn't come close. Am I understanding that correctly; is it really that simple?

 

I occasionally find myself reinstalling home assistant and every time I do, I get stuck on two steps because I forgot the commands and didn't write them down from the last time. I'm writing them below mainly for myself but also for anyone else who may get stuck. For future reference, I'm using Ubuntu 23.04 with Virt-Manager.

Before you begin the installation of the provided qcow2 image, you might want to resize that image from 32G to whatever size you want. ex:

qemu-img resize haos_ova-10.3.qcow2 +68G

Next, you might want to make a network bridge device. Navigate to your netplan folder and backup the yaml file that's in there (your file may be named differently)

cd /etc/netplan

cp ./01-network-manager-all.yaml ./01-network-manager-all.yaml.old

Edit the yaml config.

nano ./01-network-manager-all.yaml

Change the renderer to networkd and add the bridge device (br0). Your ethernet device may not be named enp12s0, make sure to use your ethernet device name. If you are on wifi, look up a netplan wifi config and make adjustments as needed.

network:
  renderer: networkd
  ethernets:
    enp12s0:
      dhcp4: true
  version: 2
  bridges:
    br0:
      dhcp4: yes
      interfaces:
        - enp12s0
      parameters:
        stp: true

save the file. generate and apply the new netplan. WARNING - If you are hosting this on your own network, it's possible the Ubuntu host IP could change. If you were doing these steps over SSH, you might need to find the new IP and reconnect. Static IPs can be set in the netplan config but I usually just do it from my router settings afterwards which is probably why the IP changed.

netplan generate

netplan apply

Now just go through the installation process and when you select your network device, make sure you select "Bridge Device" and the device name is "br0"

Edit 12/15/23 - well, I rebuilt my server again. I used regular Ubuntu desktop this time and I for the life of me I couldn’t get networking to function properly. I ended up buying an Ethernet card and passed it through to the VM

view more: next ›