• 6 Posts
  • 86 Comments
Joined 1 year ago
cake
Cake day: June 21st, 2023

help-circle
  • Just because the phone is connected to the car doesn’t mean that the driver of said car is using the phone, or that the phone even belongs to the person driving.

    It is Android’s job to provide music and entertainment to my car’s head unit. It is my job to drive safely. It is NOT the job of Android to make sure I’m driving safely. Why in the hell should my passenger have to sit through repeated “safety breaks” while they try to scroll down to play a new song?






  • I’m curious, why does this require OpenSSL in order to compile? I’m not aware of any audio formats that use encryption, but I could be wrong.

    My first thought was for connecting to https streams, but I don’t remember Winamp having this capability. “Back in the day,” I used Winamp for playing local audio and RealPlayer for what little streaming was available.


  • There are really two reasons ECC is a “must-have” for me.

    • I’ve had some variant of a “homelab” for probably 15 years, maybe more. For a long time, I was plagued with crashes, random errors, etc. Once I stopped using consumer-grade parts and switched over to actual server hardware, these problems went away completely. I can actually use my homelab as the core of my home network instead of just something fun to play with. Some of this improvement is probably due to better power supplies, storage, server CPUs, etc, but ECC memory could very well play a part. This is just anecdotal, though.
    • ECC memory has saved me before. One of the memory modules in my NAS went bad; ECC detected the error, corrected it, and TrueNAS sent me an alert. Since most of the RAM in my NAS is used for a ZFS cache, this likely would have caused data loss had I been using non-error-corrected memory. Because I had ECC, I was able to shut down the server, pull the bad module, and start it back up with maybe 10 minutes of downtime as the worst result of the failed module.

    I don’t care about ECC in my desktop PCs, but for anything “mission-critical,” which is basically everything in my server rack, I don’t feel safe without it. Pfsense is probably the most critical service, so whatever machine is running it had better have ECC.

    I switched from bare-metal to a VM for largely the same reason you did. I was running Pfsense on an old-ish Supermicro server, and it was pushing my UPS too close to its power limit. It’s crazy to me that yours only pulled 40 watts, though; I think I saved about 150-175W by switching it to a VM. My entire rack contains a NAS, a Proxmox server, a few switches, and a couple of other miscellaneous things. Total power draw is about 600-650W, and jumps over 700W under a heavy load (file transfers, video encoding, etc). I still don’t like the idea of having Pfsense on a VM, though; I’d really like to be able to make changes to my Proxmox server without dropping connectivity to the entire property. My UPS tops out at 800W, though, so if I do switch back to bare-metal, I only have realistically 50-75W to spare.


  • corroded@lemmy.worldtoSelfhosted@lemmy.worldLow Cost Mini PCs
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    14 days ago

    I have a few services running on Proxmox that I’d like to switch over to bare metal. Pfsense for one. No need for an entire 1U server, but running on a dedicated machine would be great.

    Every mini PC I find is always lacking in some regard. ECC memory is non-negotiable, as is an SFP+ port or the ability to add a low-profile PCIe NIC, and I’m done buying off-brand Chinese crop on Amazon.

    If someone with a good reputation makes a reasonably-priced mini PC with ECC memory and at least some way to accept a 10Gb DAC, I’ll probably buy two.




  • I’m okay with the “human-readability,” but I’ve never been happy with the “machine-readibility” of XML. Usually I just want to pull a few values from an API return, yet every XML library assumes I want the entire file in a data structure that I can iterate through. It’s a waste of resources and a pain in the ass.

    Even though it’s not the “right” way, most of the time I just use regex to grab whatever exists between an opening and closing tag. If I’m saving/loading data from my own software, I just use a serialization library.


  • It really depends on how far back you want to look.

    If the US was to suddenly stop projecting its interests internationally, then as others have mentioned, then likely the world work become somewhat more socialized. European countries would probably step up and try to keep China in check, but without the US contributing to these efforts, it would cause a significant strain on their military resources.

    If the US was to take an isolationist policy 100 years ago, then there is a good chance that WW2 would have been won by the Axis. The Allied forces likely would have put up a good fight, but I’m not sure they would have emerged victorious against the combined Axis forces. The war in the Pacific would have raged on much longer, and without nuclear weapons, there would have been an extreme loss of life invading Japan. At the very least, WW2 would have lasted much much longer than it did. Depending on the outcome, plenty of countries might currently be speaking German and debating if they should tear down 80-year-old statues of Hitler.





  • Like several people here, I’ve also been interested in setting up an SSO solution for my home network, but I’m struggling to understand how it would actually work.

    Lets say I set up an LDAP server. I log into my PC, and now my PC “knows” my identity from the LDAP server. Then I navigate to the web UI for one of my network switches. How does SSO work in this case? The way I see it, there are two possible solutions.

    • The switch has some built-in authentication mechanism that can authenticate with the LDAP server or something like Keycloak. I don’t see how this would work as it relies upon every single device on the network supporting a particular authentication mechanism.
    • I log into and authenticate with an HTTP forwarding server that then supplies the username/password to the switch. This seems clunky but could be reasonably secure as long as the username/password is sufficiently complex.

    I generally understand how SSO works within a curated ecosystem like a Windows-based corporate network that uses primarily Microsoft software for everything. I have various Linux systems, Windows, a bunch of random software that needs authentication, and probably 10 different brands of networking equipment. What’s the solution here?





  • I understand what you’re saying. As far as using your school account to sign in to Microsoft Office, the fact that you use a school account should not make a difference in terms of privacy. If you’re using Outlook and Teams for school, just don’t use them for personal things, and you should be fine. If you’re using the web versions through a web browser, then you have nothing at all to worry about. If you actually install the apps, you still likely have nothing to worry about, although I would make sure they’re at least signed out and closed when you’re not using them. You don’t want to accidentally send a message to your school’s Teams group when you’re drunk and watching YouTube videos at 3am.

    As far as “enrolling in your school’s environment,” I’m afraid I don’t know what you mean by that. I know that some companies will install corporate nanny-ware on systems that they issue out to their employees (you’ve probably heard about CrowdStrike), but if you’re using a personal laptop for school, that’s not going to happen unless you hand it over to the school’s IT department and say “please fuck up my computer.”

    Most likely the “cloud” file you see in your documents is a Microsoft OneDrive account that comes included with your school’s Office subscription. You can use it as a backup for schoolwork, ignore it completely, or just uninstall OneDrive. I like keeping my important stuff on local storage, but if you want a place to back up a project, go ahead and use it. Maybe don’t copy your porn stash over to your OneDrive account.

    I am a strong advocate for keeping things separate on your computer. Not necessarily from a privacy standpoint, but more so just to keep everything tidy and easy to manage. If I was just using Teams and Outlook, maybe logging into an online portal, I’d probably just do exactly that without a second thought. If you find that you’re installing a lot of different applications for your studies, like I mentioned before, you might consider setting up a VM. A VM (Virtual Machine) essentially acts as a second computer within your own. You would install a hypervisor (I’d recommend VirtualBox for you), and inside the hypervisor, you can create separate “virtual” computers. You install your operating system, boot up the virtual machine, and use it just like you would a whole separate PC. When you’re done, you shut it down, and when you no longer need it, just delete the VM, and your PC isn’t cluttered with a bunch of stuff you don’t need. The “hard drive” for your VM lives in a single file, and once that file is deleted, it’s as if your virtual machine never existed. One way to think of it is like building a house inside a room in your own house. You still have a bedroom, a kitchen, bathrooms, and a living room. Only in this “virtual” house, you can paint the walls, throw parties, trash the carpet, invite hobos to live on your couch, whatever you want. When the house gets too trashed to live in any more, you just hit “delete” and it disappears; the actual house you live in is still in pristine condition.

    So just as a summary, my opinion is just use your computer normally. Log into whatever school resources you need and don’t worry. If you need to install a whole bunch of school-related stuff that you don’t want cluttering up your PC, set up a VM.

    It’s probably also worth noting that your school almost certainly isn’t trying to damage your computer or catch you doing something you want to keep private. They’re providing resources (a free Office subscription, for example) that they think might help facilitate your studies. You can use those resources, or not, but your computer is still your personal property, and your school isn’t trying to infringe on that.


  • You may need to elaborate a bit more on what your are trying to achieve; it looks like your post is missing a bit of backstory. It sounds like your concern is keeping your personal business and school activities separate, though.

    • Switching away from Google is overall a good thing for privacy, but if your goal is privacy from your school, not from Google itself, it makes no difference who you want to use for email.
    • Creating an additional account on your PC is not detrimental to privacy; in fact, some might argue that having a separate account for separate tasks is actually a good thing. I have multiple accounts on my servers, depending on what/who needs to log in. It doesn’t hurt to do the same on a desktop PC or laptop.
    • Simply accessing school resources on your PC isn’t going to send the school your personal information, browser history, pirated movies, whatever. Clear your browser cookies between sessions if you’re concerned. Better yet, just set your browser to automatically clear cookies when you close the window, and make sure you exit the browser when you’re done with school work.
    • Do you really need to use your school e-mail for anything other than school? I have a work email, but I only use it for things that are directly related to my job.

    What you’re saying doesn’t really make a lot of sense. A lot of people here are probably happy to help you out, but you’ll need to be a bit more clear on what your goal is. I get the impression that you’re concerned about your school having some kind of privileged access to your computer because you check your school email and work on school assignments using personal computing resources. That’s not something you need to worry about; it’s really not how technology works. Logging into your school’s online portal doesn’t give them access to your files any more than buying something on Amazon.com lets Jeff Bezos browse your system.

    If you’re really, REALLY concerned about privacy, just set up a VM using VirtualBox (it’s free and easy) for school stuff and continue to use your computer as you would normally. If you’re already comfortable re-installing Windows, then you absolutely will be able to set up a simple Windows VM. To be clear, I wouldn’t consider this necessary, but if you want to do it for peace of mind, then you have nothing to lose.

    This situation becomes vastly different if you have a company or school-issued computer. In that case, then I wouldn’t use it for anything other than strictly business (or school)-related activities. Given the fact that you’re able to reformat and add/remove accounts, though, it doesn’t sound like you’re using a computer managed by an IT department.

    On a side note, if your school did some how manage to gain access to your personal computer without your permission, find information that was detrimental to you, and somehow use it against you, I would ask you two things:

    • What the hell kind of school are you going to?
    • Do you like money? Because you and your lawyer are going to get a lot of it.