• 15 Posts
  • 70 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle








  • Yes. It’s the “put a copy somewhere else” that I’m trying to solve for without a lot of cost and effort. So far, having a remote copy at a relative’s is good for being off site and cost, but the amount of time to support it has been less than ideal since the Pi will sometimes become unresponsive for unknown reasons and getting the family member to reboot it “is too hard”.



  • Take some time and really analyze your threat model. There are different solutions for each of them. For example, protecting against a friend swiping the drives may be as simple as LUKS on the drive and a USB key with the unlock keys. Another poster suggested leaving the backup computer wide open but encrypting the files that you back up with symmetric or asymmetric, based on your needs. If you’re hiding it from the government, check your local laws. You may be guilty until proven innocent in which case you need “plausible deniability” of what’s on the drive. That’s a different solution. Are you dealing with a well funded nation-state adversary? Maybe keying in the password isn’t such a bad idea.

    I’m using LUKS with mandos on a raspberry PI. I back up to a Pi at a friend’s house over TailScale where the disk is wide open, but Duplicity will encrypt the backup file. My threat model is a run of the mill thief swiping the computers and script kiddies hacking in.






  • Anonymouse@lemmy.worldtoAsklemmy@lemmy.mlComplexity
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    I wanted to quit nagging my kids to close the pantry door. It conflicts with the fridge door and they’re both getting banged up pretty bad. I replaced one of the pantry door hinges with a spring hinge (and removed the latch mechanism from the handle) and now the pantry door closes on its own. Sometimes, I hear them fling the door open and hit the fridge anyways, but I giggle just a little when it bonks them on the head.




  • Jeff? Is that you, son? I told you that it was nonnegotiable, now get off the internets, I’m expecting an important telephone call and don’t want you tying up the lines.

    While there are a lot of good technical suggestions here, I’ve found that a conversation goes a long way. In my experience, when talking with loved ones, explain your emotions. Not “I hate this” or “the governments are listening!”, but those core emotions. “Having a device in my room that is always monitoring me makes me feel anxious and I don’t feel comfortable in a place where I should feel safe.” Make sure that the dialog is calm and remains about your feelings until you know that you’re being heard. If you aren’t, try other phrases or examples.

    Once you’ve established your feelings, address their concerns and feelings (active listening). It sounds stupid at first, but it works. “I hear that you are frustrated when I don’t come down for dinner immediately.” Finally, propose some solutions that meet everybody’s needs and that the parties can select one to try out for a week and evaluate it’s effectiveness, trying new things until a mutually beneficial solution is found.

    Good luck. Please post the outcome!



  • I’m not as enraged by this as most, but I think the true test will be to see if this feature is disabled by default in future releases. If they actually do listen to their users, that’s better than any of the other big players.

    I read a bit about the new “feature” and it seems to me that they’re trying out a way to allow ad companies to know if their advertisement was effective in a way that also preserves the privacy of the user. I can respect that. I did shut it off, but am also less concerned because I have multiple advertisement removal tools, so this feature is irrelevant.

    The fact that it’s enabled by default isn’t comforting, but who would actually turn this on if it were buried in about:config? In order to prove its effectiveness to promote a privacy respecting but advertisement friendly mechanism, this is what they felt that they had to do.

    Of course, I could easily be all wrong about this and time will tell.


  • I don’t know if this applies directly, but in my early days of hosting a server for fun, I installed a telnet server because my phone didn’t have SSH at the time. I forgot to close it when i was done and someone got in and installed a password sniffer. This was a Slackware box, IIRC. My only indication that there was a problem was that the “.” & “…” directories didn’t appear from an “ls -Alf”. I pulled the network cable and booted to a boot image and discovered that many key system utilities were replaced with imposters that would mask that there was an intruder. The '“ps”, “ls” and other utils were symlinked to the “…” dir in /usr/local/lib.

    I didn’t trust anything on that server and nuked it. Now, anything that’s internet facing is built from ansible and the config is stored in a repo and the repo is backed up on a drive that’s physically disconnected except when backing up. I’ve messed up the initrd from time to time and it’s usuall easier for me to reimage than try to fix it.