[-] Bookmeat@lemmy.world 6 points 5 days ago

If you don't pay the $7b then maybe next time Elon won't get his pay package...

[-] Bookmeat@lemmy.world 82 points 1 week ago

Sure, but then there won't be any conservative judges left to let him off the hook for it.

[-] Bookmeat@lemmy.world 60 points 4 weeks ago

So prosecute them first, then they can go to jail and clean up.

[-] Bookmeat@lemmy.world 66 points 1 month ago

EVP of Samsung, Patrick Chomet, recently said that "there's no such thing as a real picture". So this artist should object to the disqualification 🙂

[-] Bookmeat@lemmy.world 154 points 1 month ago
[-] Bookmeat@lemmy.world 56 points 1 month ago* (last edited 1 month ago)

Thank fucking <deity>.

[-] Bookmeat@lemmy.world 63 points 1 month ago

In the olden days, if you didn't have a term limit and you were needed to step down from your post you were assassinated.

[-] Bookmeat@lemmy.world 74 points 2 months ago

Why are people doing resource exploration in protected areas? >___>

16
submitted 5 months ago* (last edited 5 months ago) by Bookmeat@lemmy.world to c/selfhosted@lemmy.world

I currently have a storage server with the following config.

Multiple raid6 volumes (mdadm) -> aggregated into a lvm volume group -> lvm volumes -> encrypted with luks1 -> (no partitioning) xfs file systems mounted and used by the os

I have the following criteria: I want to keep software raid (mdadm) with multiple raid sets, xfs, and lvm. I don't mind using 2fa, but I don't want to just store my secret keys on a dongle attached to my PC because that seems to defeat the point of encryption at rest.

My questions:

  1. Is there a better way to encrypt my data at rest?

  2. Is there a better layer at which to apply the encryption?

I'm mostly unhappy with luks1 over a whole lvm volume and looking for alternatives.

--

Thank you everyone for these great responses! I'll be looking into these ideas :)

view more: next ›

Bookmeat

joined 1 year ago