Unfortunately, not everyone has a choice in who they work for in end-stage-capitalism. Work is about survival, not ideology. The majority of Americans are not far-right capitalists, but the vast majority of CEOs are, and it’s not really possible to survive long enough to start a small business in most of the US without investment from a far-right capitalist or inheritance (usually also from a far-right capitalist family member).
irotsoma
- 1 Post
- 93 Comments
I have a separate boot partition so the rest can be encrypted with luks. That’s all that’s needed in a large majority of scenarios. Most other setups end up needing to resize something at some point which in many cases is a total pain.
On my primary PC I do have a second hard drive for documents and other long term storage files that I want to access more often than on the NAS. This way it’s nearly impossible to lose those files of I reinstall something and it can act as a temporary backup storage for settings files when I do reinstall stuff rather than having a partition that wastes space or runs out of space.
It’s not that you can’t at all, it’s just that you’d either need to give up a lot of the functionality of a lot of sites or at least reduce the usability of many sites and your browser or configure whitelist and such for every site manually and deal with breaking changes when websites update.
irotsoma@lemmy.blahaj.zoneto Privacy@lemmy.ml•Ofcom to tell social media sites to protect children from adult content13·6 days agoEveryone having to prove they’re an adult just means the end of privacy on social media. Tracking everything you do online becomes extremely easy when your real ID is attached to your advertising IDs. And breaches become leaks of more significant data used in age verification.
Problem is that if a site gets too popular, then the search engines like google tend to start rate limiting. Before in started self hosting I jumped around every couple of months to a new server.
What’s wrong with being the only one on it?
It’s not profitable.
I’d say none will be private in the long term. Acquisitions ultimately break that eventually. It’s hard to run a successful service and not get acquired, eventually. So, I have a self-hosted searxng instance. DDG has already started moving away from privacy and Startpage has some signs it might be moving that way in the near future. I’ll let others comment on the current state of things at each, but if you give your search to any profit driven company it has the potential to be sold. But IMHO Qwant is currently the best option outside of metasearch engines with small nonprofit ownership, whoch can be unreliable, or self hosting.
I think this is a great idea and a great goal. It will take time and the process will not be easy as there’s always subjectivity. But I think if you make sure to include everyone, but also don’t waffle too much once the subjective stuff is given proper attention, it can be great.
irotsoma@lemmy.blahaj.zoneto Selfhosted@lemmy.world•Is it normal to not have any malicious login attempts?English2·11 days agoHow do you connect? Is there a domain? Is that domain used for email or any other way that it might circulate?
Also, depends on if the IP address was used for something in the past that was useful to target or not. And finally do you use that IP address outbound a lot, like do you connect to a lot of other services, websites, etc. And finally, does your ISP have geolocation blocks or other filters in place?
It’s rare for a process to just scan through all possible IP addresses to find a vulnerable service, there are billions and that would take a very long time. Usually, they use lists of known targets or scan through the addresses owned by certain ISPs. So if you don’t have a domain, or that domain is not used for anything else, and you IP address has never gotten on a list in the past, then it’s less likely you’ll get targeted. But that’s no reason to lower your guard. Security through obscurity is only a contributory strategy. Once that obscurity is broken, you’re a prime target if anything is vulnerable. New targets get the most attention as they often fix their vulnerabilities once discovered so it has to be used fast, but tend to be the easiest to get lots of goodies out of. Like the person who lives on a side street during trick-or-treat that gives out handfuls of candy to get rid of it fast enough. Once the kids find out, they swarm. Lol
Google is a Reddit partner now, so they probably don’t want discussion of anything that removes them from the loop, thus privacy is very limited to “privacy from everyone but Google” or whatever corporate blob is currently funding Reddit. This is why Reddit is dead to me, basically it is now all about profit and communities can only exist if they contribute to that goal.
irotsoma@lemmy.blahaj.zoneto Linux@lemmy.ml•Bored. Give me a good "Living room PC" distro3·12 days agoNot free, hard to get food and necessities, but yeah, some days I wish it was that easy, though I’d be hella bored.
irotsoma@lemmy.blahaj.zoneto Privacy@lemmy.ml•Stumbled upon this in the France community when browsing Local. Needs to be shared wider.61·12 days agoAnyone know the source of this version? I’ve seen several similar versions over the years. And what is the hat representing, since that’s new to me.
irotsoma@lemmy.blahaj.zoneto Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?2·14 days agoIt’s rarely a good idea to log in as root, doubly so if it’s a system with sensitive data or services that could easily be disrupted accidentally. And even more important if multiple users log in. How will you know who broke things to teach them if they don’t log in first. The only time I log in to any system as root other than a test system is when I need to sftp to access files or some other system that doesn’t have a way to elevate permissions.
irotsoma@lemmy.blahaj.zoneto Privacy@lemmy.ml•That groan you hear is users’ reaction to Recall going back into Windows32·16 days agoEven if Copilot was suspended, the idea was put into the heads of managers and executives. My work laptop current has three applications constantly locking files as they track everything I do and every file that gets touched and upload it all to the servers. Git now takes a ridiculous amount of time to check in and push files since it creates tons of small changes to the cached files that a the tracking applications block further changes or uploads until they can record the information. It takes about 30 seconds to a minute to check in a single small file. Something that used to take a second or two at most. Worst part is if I’m in a WebEx meeting, the fighting over caches in it and git and any other processes,often causes deadlocks that crash the machine. I’m constantly apologizing for being late for meetings because the laptop crashed and had to reboot. It’s gotten to the point that they finally gave me a much faster laptop rather than just excluding cache and git folders and such from the tracking because the people who want literally everything tracked don’t know what cache or git is, much less how much useless data they’re gathering or how the AI that analyzes it all is going yo get distracted by the garbage and not find any useful data anyway. Microsoft needs to get in the game to push the others back out.
At work we have 6 environments other than production. At home just one. I created a way to ease deployment of the environment from scratch using a k0sctl config and argocd and the data gets backed up regularly if I need to restore that, too.
irotsoma@lemmy.blahaj.zoneto Privacy@lemmy.ml•Inside a Powerful Database ICE Uses to Identify and Deport People22·19 days agoAlso, not sure if it’s this database or another leaked database, but I get a lot of targeted phishing messages that know exactly what forms I’ve filed for my wife’s family for their immigration over the years. And I’ve heard similar anecdotes from others. Only started this year, so definitely something this administration has either broken the security of to speed up deportations or possibly purposely allowed to leak to foreign agents and thus their hacking groups.
irotsoma@lemmy.blahaj.zoneto Selfhosted@lemmy.world•Why is my server using all my Swap but I have RAM to spare?English9·20 days agoNote that often it’s more efficient to move infrequently accessed memory for background tasks to swap rather than having to move that out to swap when something requires the memory causing a delay in loading the application trying to get the RAM, especially on a system with lower total RAM. This is the typical behavior.
However, if you need background tasks to have more priority than foreground tasks, or it truly is a specific application that shouldn’t be using swap and should be quickly accessible at all times, or if you need the disk space, then you might benefit from reducing the swap usage. Otherwise, let it swap out and keep memory available.
I do this as much as possible, though I have a self hosted VaultWarden instance. I really wish more stuff supported TOTP or Yubikey. There’s still a ton that only support text or email which just puts a big old hole in the security, IMHO.
See the context mentioned by OP. It was a reply to a post about Recall on Windows.