doeknius_gloek

joined 2 years ago
[–] doeknius_gloek@discuss.tchncs.de 7 points 1 day ago* (last edited 1 day ago)

The question you're asking is too broad. Every tool somehow differs from the others, but listing all differences requires in-depth knowledge of each tool and a lot of time.

At the end of the day, every tool somehow backs up your data. CLI interfaces, encryption algorithms, deduplication logic, supported backends, underlying programming languages and a lot more may differ. Identify what's most important to you, test different solutions and then use the tool that works best for your use-case.

[–] doeknius_gloek@discuss.tchncs.de 19 points 1 week ago (3 children)

one of their leaders saying “use AI to help with the trauma of job loss”

no way

[–] doeknius_gloek@discuss.tchncs.de 8 points 1 week ago (2 children)

men don't even like their babies for the first three months

That's a gross generalization and simply untrue.

[–] doeknius_gloek@discuss.tchncs.de 11 points 1 week ago (1 children)

My server rack is located in an uninsulated attic with two tiny windows. I haven't measured the ambient temperature but I think it's over 40°C. Yesterday one drive in my storage server reached 65°C - so for today I have shut it off until the rain comes. Fun times.

[–] doeknius_gloek@discuss.tchncs.de 2 points 3 weeks ago* (last edited 3 weeks ago)

Looks like the front fell off.

[–] doeknius_gloek@discuss.tchncs.de 3 points 1 month ago (1 children)

Obligatory: RAID is not a backup.

🎶🪈🎶 SHORT!

[–] doeknius_gloek@discuss.tchncs.de 11 points 1 month ago* (last edited 1 month ago)

Security in software is about implementation, not different programming languages. Security as a whole is also not something you can achieve just by installing "secure" software - every software has bugs and vulnerabilities. Some of them are known, others are unknown and not every one of them automatically poses a security risk to you, this depends on the bug, your usage and environment. You can try to harden your system, but you need to do this in layers and the application code is just one of them.

For example, you could geoblock IP addresses so their requests never even reach your application. This does not mean that you're automatically safe from attackers from e.g. Russia, but you make yourself a less easy target.

There are many other defense mechanisms like request limiting, dynamically blocking malicious requests with something like Fail2Ban, strong authentication, frequent patching, network segregation, virtualization, and so on. I hope you see where I'm going. Security is complex and depends a lot on your personal threat model.

That being said, if you need to know how secure the code of a given software is, you need to find something that has recently been audited or audit it yourself.

It doesn't look like anything to me.

It's also not available yet with a planned release in 2026.

view more: next ›