Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

Emma_Gold_Man

@Emma_Gold_Man@lemmy.dbzer0.com

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Emma_Gold_Man ,

But it would not work on older non-GNU versions of tar.

GNU introduced the "--foo" style long options, and it was a long time before Unix versions began adopting them.

Emma_Gold_Man ,

Probably, but unsurprisingly the far-right influencer went to a right-wing mouthpiece media outlet to tell her story. OP probably doesn't want to drive traffic and advertising revenue to them.

Emma_Gold_Man , (edited )

Tell me you're bi without telling me you're bi

Emma_Gold_Man ,

The way this works in the server world is "95th percentile" billing. They track your bandwidth usage over the course of the month (probably in 5 minute intervals), strike off the 5% highest peaks, and your bill for the month is based on the highest usage remaining.

That's considerably more honest than charging you based solely on the highest usage you could theoretically use at any time point in a 24 hour period (which is how ISPs define the "max bandwidth") and then charging you again or cutting off your service if you use more than a certain amount they won't even put in writing.

Emma_Gold_Man ,

Depends who you need privacy from. I recall Stallman's advice about VPNs - that to avoid having your information turned over you should choose a VPN from a country whose government is no friend of your government. Depending on your threat model, I could see this being the same principle

Emma_Gold_Man ,

Probably not. It looks like it's setting the fake address before reading the tunnel parameters, where the real address is stored. Probably a kludge in case the connection address is undefined so the program doesn't crash. So check whether the address is included there.

Also check the function that establishes the connection. 10.1.1.1 is not a public subnet, so unless there is a VPN device listening at the local address, the tunnel should fail to establish and throw an error, triggering the exception clause in that code. Again, you'll want to confirm that in the code.

Emma_Gold_Man ,

The money in calligraphy is usually made on wedding invitations, diplomas, "fine fining" menus, and corporate award certificates

Emma_Gold_Man , (edited )

https://onlykey.io/

Built in hardware pin entry means your unlock code can't be captured by a compromised machine. Emulates Yubikey if you need that, handles Fido / U2F, stores up to 12 passwords, acts as PGP and SSH key if you install the (open source) agent.

The SSH agent implementation is forked from https://trezor.io/ which is advertised more for crypyo wallet uses.

Edit: For OP's concern about losing the key, it also has the ability to export an encrypted backup that can be restored to a replacement key

Emma_Gold_Man , (edited )

Manually keying in the pin is only needed when plugging in the device. Challenges for TOTP, FIDO2, etc. are a configuration option, and are only 3 digits if enabled (press any button if disabled).

As for "excessive amount of security", security as an absolute measure isn't a great way to think about it. Use case and threat model are more apt.

For use case, I'll point out it's also a PGP and SSH device, where there is no third party server applying the first factor (something you know) and needs to apply both factors on device.

For threat model, I'll give the example of an activist who is arrested. If their e-mail provider is in the country, they can compel the provider to give them access, allowing them to reset passwords on other more secure services hosted outside the country. The police now have the second factor (something you have), but can't use it because it's locked.

Emma_Gold_Man ,

If your usecase and threat model don't require the pinpad, Onlykey Duo is worth a look. No pin, USB A or C, and still gives you 6 slots to support any combination of Fido2, TOTP, SSH, PGP, and password storage.

supermarket club cards

Hey I'm sure you all know how sketchy club cards are for collecting your data. But I do begrudge paying slightly higher prices just for valuing my privacy. I was wondering if there was any way to sign up to these things whilst limiting the data they have access to. Would it be enough to sign up with fake details and never use...

Emma_Gold_Man ,

Guess I should switch. I always get funny looks when I say my number is "Beechwood 45789"

Emma_Gold_Man ,

Off topic, but as a pen lover - those are lovely! Especially enjoyed the second two from the left.

How to get a private car

Hello internet users. Someone in my family is looking to buy a car and wanted some recommendations for a private one. They are looking to buy new, and need Android Auto and CarPlay. I know all new cars suck for privacy by default, but I was hoping someone here could offer some insight as to which cars can be made better and what...

Emma_Gold_Man ,

Sorry, but I have bad news for you. Privacy in major car brands no longer exists.

You don't say where your family member lives, but you might look into smaller regional brands that focus on cheap cars for less overdeveloped areas of the world. Be aware the tradeoff is probably in safety features.

Emma_Gold_Man ,

ssh -X

Emma_Gold_Man ,

You don't need to run an X server on the headless server. As long as the libraries are compiled in to the client software (the GUI app), it will work. No GUI would need to be installed on the headless server, and the libraries are present in any common Linux distro already (and support would be compiled into a GUI-only app unless it was Wayland-only).

I agree that a GUI-only installer is a bad thing, but the parent was saying they didn't know how it could be done. "ssh -X" (or -Y) is how.

Emma_Gold_Man , (edited )

There are problems they can actually solve, mostly heating and power related:

  • In summer, lower the blinds on south facing windows when the sun comes up to reduce solar heating, then raise them in the evening to increase air flow against the window panes. This reduces the need for air conditioning, resulting in a surprising amount of power saved.

  • On a home solar system, start the washing machine, dishwasher, and dryer that were loaded in the morning when the batteries reach 80% charge. Allow them to run off the inverter rather than taking the charge/discharge losses involved in battery storage, reducing the size of both battery bank and solar array needed.

  • Lower the freezer temperature when there is a power surplus, and raise it back to normal when not so that cooling energy is used when it's cheapest/most available

If you don't work from home, you can't do the second two yourself. They require automation. Reducing baseload requirements and battery storage needs can make a transition to renewable power much cheaper and more efficient. With mass adoption, that extends to power grids and not just off-grid homes, and has significant effects on things like the amount of lithium that needs to be mined or the number of coal and LNG power plants that are needed for times that are off-peak for wind and solar generation.

Emma_Gold_Man ,

There's more truth to that than most people realize: Linux is only one kernel option in Debian:

Debian GNU/kFreeBSD

Debian GNU/NetBSD

Debian GNU/Hurd

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • incremental_games
  • meta
  • All magazines