rho50

joined 1 year ago
[–] [email protected] 2 points 5 months ago

Ideally you want something that gracefully degrades.

So, my media library is hosted by Plex/Jellyfin and a bunch of complex firewall and reverse proxy stuff... And it's replicated using Syncthing. But at the end of the day it's on an external HDD that they can plug into a regular old laptop and browse on pretty much any OS.

Same story for old family photos (Photoprism, indexing a directory tree on a Synology NAS) and regular files (mostly just direct SMB mounts on the same NAS).

Backups are a bit more complex, but I also have fairly detailed disaster recovery plans that explain how to decrypt/restore backups and access admin functions, if I'm not available (in the grim scenario, dead - but also maybe just overseas or otherwise indisposed) when something bad happens.

Aside from that, I always make sure that all of all the selfhosting stuff in my family home is entirely separate from the network infra. No DNS, DHCP or anything else ever runs on my hosting infra.

[–] [email protected] 12 points 5 months ago

It would be better to have this as a FUSE filesystem though - you mount it on an empty directory, point the tool at your unorganised data and let it run its indexing and LLM categorisation/labelling, and your files are resurfaced under the mountpoint without any potentially damaging changes to the original data.

The other option would be just generating a bunch of symlinks, but I personally feel a FUSE implementation would be cleaner.

It's pretty clear that actually renaming the original files based on the output of an LLM is a bad idea though.

[–] [email protected] 17 points 7 months ago

At least in some circumstances, the risks of sharing your DNA include having children...

[–] [email protected] 3 points 7 months ago

Ohh, my bad! I thought the person you were replying to was asking about Gitea. Yeah, Forgejo seems truly free and also looks like it has a strong governance structure that is likely to keep things that way.

[–] [email protected] 3 points 7 months ago (2 children)

This sadly isn't true anymore - they now have Gitea Enterprise, which contains additional features not available in the open source version.

[–] [email protected] 5 points 7 months ago

From here:

  • SAML
  • Branch protection for organizations
  • Dependency scanning (yes, there are other tools for this, but it's still a feature the open source version doesn't get).
  • Additional security controls for users (IP allowlisting, mandatory MFA)
  • Audit logging
[–] [email protected] 77 points 7 months ago (12 children)

Don't use Gitea, use Forgejo - it's a hard fork of Gitea after Gitea became a for-profit venture (and started gating their features behind a paywall).

Codeberg has switched to Forgejo as well.

Also, there's some promising progress being made towards ActivityPub federation in Forgejo! Imagine a world where you can comment on issues and send/receive pull requests on other people's projects, all from the comfort of a small homeserver.

[–] [email protected] 3 points 9 months ago

Songs and albums that I’ve uploaded from my own collection have disappeared from Apple Music, despite my physically owning them on CD and Apple advertising the ability to store my CD rips in the cloud.

It’s unacceptable. I’m still on Apple Music for now, but moving my music library to Jellyfin looks more appealing by the day.

[–] [email protected] 2 points 9 months ago

Agreed, and it could definitely make such an assumption. The other aspect that I don’t really get is… if a superintelligent entity were to eventuate, why would it care?

We’re going to be nothing but bugs to it. It’s not likely to be of any consequence to that entity whether or not I expected/want it to exist.

The anthropomorphising going on with the AI hype is just crazy.

[–] [email protected] 11 points 9 months ago* (last edited 9 months ago) (3 children)

Yeah bro but eXpOnEnTiAl ImProVeMeNt bro!

And haven’t you heard of Roko’s basilisk? Better be careful what you say on the cybernets, lest our AGI/ASI overlords of 2026 take a disliking to your commentary regarding their eventual supremacy!

Excuse me while I go back to mining Dogecoin until I can buy enough NFTs to make Elon or Sam Altman notice me.

/s

[–] [email protected] -3 points 10 months ago* (last edited 10 months ago)

It’s a risk that I’m willing to take, personally.

But tbf I do make sure that I own my primary mail domain.

Website hosting and such thing? Njal.la all the way. Never had an issue with them.

Edit: oof, clearly some irrational hate for njal.la here. I state my personal preference and get downvoted… is this reddit now?!

[–] [email protected] 11 points 1 year ago (1 children)

Tl;dr: TPMs are very unlikely to make your privacy better or worse, but they could definitely be abused by a company like MS to make end users’ experiences worse. They could also be used for significant security and privacy gains… they’re a tool.

The TPM can be used to provide a cryptographic binding between aspects of your system’s configuration and a unique key which is resident within the TPM (a process called “attestation”). It can also generate secondary keys that are associated with the base key, and use those to do cryptographic operations like encryption/decryption and authentication.

Telemetry wise, the TPM’s only utility might be to “prove” that the data sent from your PC wasn’t tampered with. That said, I don’t think MS is actually doing that, and they don’t need to in order to be incredibly invasive in their telemetry.

The (imo) worst way in which a TPM might be abused in a user-hostile sense is to detect if the OS has been modified by the user, or if an installation isn’t legitimate, etc. That could be used to disable certain features if you try to install unauthorised software, dual boot Linux or whatever. This would be similar to the smartphones of today, which can for example disable access to banking apps if jailbroken/rooted.

TPMs (>2.0 at least) otherwise have the potential to realise a significant improvement in security and privacy for users, if used correctly. They can be used for encryption and credentials that are bound in hardware and therefore practically impossible to steal. And can detect hardware tampering and potentially foil Evil Maid attacks. Imagine if your login sessions for various websites were bound to your hardware, such that a dodgy extension could never steal your cookies.

view more: next ›