[-] helpimnotdrowning 12 points 1 month ago

What do you mean by privacy? If you mean like other people you may live with/come across having access to your data, the best solution is having an encrypted drive/partition. No DE or standard login is going to stop a determined threat actor from just pulling out your storage device and reading off what's on there.

[-] helpimnotdrowning 88 points 1 month ago* (last edited 1 month ago)

yes, it's mostly things like games or software

though, I have seen more & more reports of people finding malicious disguised LNK files in their downloads and torrents, which will run some arbitrary command if you open that: Windows does not ever show the LNK extension, so a file could be named ".mkv.lnk", and you would only know if you checked the "file type" column in Explorer (which would read "Shortcut" instead of something like "Matryoshka file"), or when you see the cmd.exe window flicker open and close.

bonus edit: LNK is the native file extension that Windows uses to link app shortcuts, such as the shortcuts on your desktop.

[-] helpimnotdrowning 29 points 2 months ago

I haven't had any issues since April-ish. Try refreshing your blocklists: in your Settings Page > Filter Lists, click the little clock icons next to the list names to force-refresh

[-] helpimnotdrowning 26 points 2 months ago* (last edited 2 months ago)

as long you are only forwarding Minecraft's 25565 port from your router to your server machine, it should be fine. Just make sure to keep Online mode on, use the whitelist, and get your plugins from trusted sources. Otherwise I wouldn't worry too much.

I see others recommending VPN solutions like zerotier for your friends to connect to; I don't personally feel like this is necessary, and (in my experience), making your friends do more technical setup than just connecting to the server is often a big turn-off.

Bonus: If you ever take a peek at your server logs while it's running (and exposed to the Internet, if you avoid said VPN solutions), you might notice a lot of weird connections from IPs and usernames you don't recognize. These are server scanners and threat scanners that look for vulnerable servers to connect to and exploit. This is normal and you'll be fine as long as you keep that whitelist and stay up-to-date on developments in the server admin space.

40
submitted 6 months ago* (last edited 6 months ago) by helpimnotdrowning to c/linux@lemmy.ml

Solved: decided to avoid the funkyness this would invoke and just bought another drive. all good now👍

About a year back, I moved my internal 8tb and 4tb HDDs from my main Windows machine to my old PC-turned-Linux-server. They hold a bunch of bulk data like Youtube channel archives and torrents that are open to download.

I would like to do an in-place ext4 conversion, if possible. Currently I've just started shuffling data off to an SSD and the plan was to slowly shrink the NTFS partitions and turn the new space into ext4, 500gb at a time (size of the intermediary SSD), but it is taking an unbearably long time. Shrinking the 4tb partition in gparted has been running for 13 hours, with an estimated 22 hours remaining! And I'll have to do it 7 more times for the 4tb, and 16 times for the 8tb!!

Is there a better way to do this?

[-] helpimnotdrowning 20 points 1 year ago

TLDR; No

It hasn't been necessary in a long time, unless you're a developer who frequently needs to type in filenames in everywhere (since the command line needs extra protection against spaces and other symbols)

The OS (Windows, Mac, Android, etc) handles thar all for you so you don't have to worry about it (unless you happen to use a badly-written program that doesn't understand spaces, but this is super rare to begin with, and more protected against as time goes on)

[-] helpimnotdrowning 61 points 1 year ago

2013 is generous.

[-] helpimnotdrowning 18 points 1 year ago

I would imagine 2° at 12 billion miles means it's almost certainly not pointing at anything man-made anymore, but I'm also not an astrophysicist so ¯⁠\⁠_⁠(⁠ツ⁠)⁠_⁠/⁠¯

Being that far out I don't even think we could go out and fix it anymore

[-] helpimnotdrowning 19 points 1 year ago

Basically, the idea is that a server can refuse to serve you (or degrade your experience with captchas/heavier restrictions) unless you (your device) complete a "challenge". This could be something like the browser (through a system API) checking some device details like

  • root/admin
  • unlocked bootloader
  • extensions (either bad extensions or something like an Adblock)
  • VPN (potentially "if you have nothing to hide you have nothing to fear")
  • installed apps (Adblock via DNS like blokada,
  • device emulation
  • TPM (generate secure key to make sure device is "real")
  • OS state (heavily modified?, untrusted OS?)

etc. Basically making sure the "environment" is clean and not tampered with (trusted).

The problem is with what defines a "trusted" environment. It could start at just making sure the device isn't rooted (like Android's Safetynet/Play Integrity check; most people don't root their device & don't/won't care, also easily justifiable since it can be a security vulnerability because the device is "wide open").

Then, like the article mentions, the device makers (Google (phones, chromebooks), Microsoft (Windows, Xbox), Apple (macOS, iOS, visionOS, etc), Meta/Facebook (Oculus), etc) could change their terms for attestation and deny approval on stricter, potentially anti-consumer criteria such as device age (forcing you to buy more things).

[-] helpimnotdrowning 61 points 1 year ago

Not to defend musk, but it's not from one specific font. The logo is just Unicode char 1D54F, a blackboard bold X/"MATHEMATICAL DOUBLE-STRUCK CAPITAL X"

[-] helpimnotdrowning 28 points 1 year ago

I think the reply by musk is paying-subscriber-only; when I saw someone post about it, it said something like "only the people who have subscribed to this person can view this tweet"

1
submitted 1 year ago by helpimnotdrowning to c/hololive@lemmy.world

(screenshot credit: @itoridayo via Twitter)

8
submitted 1 year ago by helpimnotdrowning to c/hololive@lemmy.world
16
submitted 1 year ago by helpimnotdrowning to c/hololive@lemmy.world

What'd you think?

13

(I asked this on r*ddit a long while ago, but I don't think I explained myself properly)

Basically, I would like to host a few services on my own metal (and not anywhere else in the world!) to play around with and learn, like my personal site, lemmy instance, vpn, fdroid, image host, etc etc.

I would also like to hide my public IP address because I don't want people who connect to me to know my location (even if it's rather coarse).

I know that this isn't possible without at least another server in a different physical location, but I really have no idea how to approach this. What software do I run? What is this action called? What do any of these AWS/Azure service names mean? How much would I realistically need to pay? Etc etc.

Anyone have any pointers?

[-] helpimnotdrowning 14 points 1 year ago

Can't say i didn't expect this.

[-] helpimnotdrowning 69 points 1 year ago

"be mindful of wearing Reddit gear"??? this doesn't feel like this was said in good faith at ALL.

view more: next ›

helpimnotdrowning

joined 1 year ago