Skip Navigation

Posts
63
Comments
1,439
Joined
5 yr. ago

  • Cool story bro but you clearly still didn't even read the first sentence of what I wrote.

  • Note that the diff does not necessarily correlate with the amount of data that changed, not how much additional space the snapshot takes.

  • What a great argument! You didn't even read the first sentence...

    It isn’t an ethical concern and hasn’t been since the 90s.

    You'll have to explain to me how not compensating someone for their work has been ethical since the 90s.

  • Security knowledge and ethical concerns are two separate things. Whether we like it or not, we pay online creators through private data we must give to entities who will use it against our best interests.

  • Size of diff between btrfs subvolume and snapshot is 11GiB

    WDYM by "diff"?

    Also forgot to mention but if you want to know what's taking how much space on your btrfs, try btdu. It uses a sampling-based approach and will therefore never be 100% accurate but it should be quite accurate enough after a little bit.

  • This is the way. You need to check whether CPU and package are mostly in the highest C-states they can be. If not, you've got a task or IO device causing a lot of wasted power.

  • I don't see how undervolting would result in power savings on modern CPUs if you're not up against clock limits as the CPU would simply boost higher.

  • As per btrfs fi df /home, used space is 82.86 GiB, not 83.21 GiB.

    That's just used data. The global used metric likely incorporates metadata etc. too. System aswell as the GlobalReserve are probably accounted as fully used as they're, well, reserved.

    As per btrfs fi du -s /home , used space is 63.11 GiB.

     
        
         Total   Exclusive  Set shared  Filename
      63.11GiB    13.64GiB    49.01GiB  /home
    
    
      

    While according to du -hs /home, 64GiB is used.

    Likely compression or inline extents. btrfs only reports apparent size to du and friends unfortunately.

    Also, maximum space used should be close to 72 GiB as per btrfs fi du -s / and 73 GiB as per du -hs /, if btrfs fi usage includes all subvolumes . '/home' and '/' are on separate subvolumes.

    Your home has a lot of shared extents which indicates to me that you have at least one snapshot of it.

    You also wrote 13.6GiB of new data to your home since the snapshot. Assuming a similar amount of data was deleted/overwritten since, that would add up to 76GiB. If there's perhaps one or two more snapshots, that would explain the rest.

    Snapshots are "free" only so long as you don't write or delete any data in the origin.

  • You don't use HTTP or SOCKS proxies to proxy internet traffic these days but VPNs. The effect is the same but it's a shiny new name to market. If you're talking to a normie (i.e. Google), you're looking for "a VPN".

    This space is quite crowded as it's a super simple service to offer and is insanely profitable. You're basically being resold datacenter bandwidth with a profit margin of at least 90%.

    What you're likely looking for (given the community) is a proxy to pseudonymise your internet traffic such that neither data brokers nor governments can trivially get access to this information.

    Given the insane profit margin, there are tonnes of unscrupulous "VPN services" that stab you in the back and double dip; selling your traffic data to the highest bidder. If you want one who doesn't do that, you must pay and even then you have to be extremely careful in your selection. Unless proven otherwise or very implausible, assume any VPN proxy provider stabs you in the back for even higher profits.

    The only exception I know of is ProtonVPN which offers limited free servers. The free tier is effectively a free trial with some limitations, namely that it's only a handful of countries and that P2P is blocked. I've used it for years and IME speed has almost always been absolutely fine.

    Whether you trust Proton is up to you to decide. IMV the company does not appear to be in this primarily for enrichment but because they actually care about privacy. They offer quite a wide range of other services that they built from the ground up and largely open sourced. The raison d'être for their free VPN proxies appears to be customer aquisition and I guess it worked on me because I'm now a paying customer of theirs, though primarily for their email services.

    Note that they comply with (Swiss) government orders (as any sustainable business must) but I trust them to not sell my data to the highest bidder or governments which is what I care about. If you're doing shit bad enough that could get someone to convince the Swiss government to go after you, they will not shield you (but also just.. please don't).

  • I was in a similar situation as you. I pulled through and let me tell you: It did not get better :(

    I managed to get good grades and such because I knew most of the core concepts already and had some luck in the intelligence lottery w.r.t the specific kinds of intelligence beneficial in my field which enabled me to learn the new parts really quite easily but if that's not the case for you, YMMV.

    If I was doing it again, I'd stop if possible (a degree was not strictly required in my situation but beneficial). Failing that, I'd find a way to make it not as stressful (i.e. fewer classes).

  • Thanks for the answer :)

    Google play appears to be delivering the 4.0.6 (8308) update to me already, is that intended?

  • I do like the idea of using USB drives for storage, though…

    I wholeheartedly don't.

  • They are quite solid but be aware that the web UI is dog slow and the menus weirdly designed.

  • Just try a default Firefox. Though if you want to use TOR anyways, why not just use TOR browser? It's the only browser where the starting conditions are reasonably anonymous.

  • There's a large difference between surrendering massive amounts of highly critical metadata aswell as some data to a known abuser vs. an entity that prides itself in not abusing your data and which even takes specific technological measures to make it as hard for them as possible (zero access encryption at rest, automatic key discovery).

    ( Partial social graph, interaction timestamps, political interests, health, hobby interests and much of that usually even in plain text data form when receiving email; stored in in plain text forever.)

  • Yeah and that's great but my point is that I don't see an obvious way to use it for that in its current implementation. I'm sure you could build it but it's simply not built yet.

  • Well that depends on how you define malware ;)

  • Then let's ship your PC, that's how containers work, right?

  • The reason given is also great.

  • I wouldn't really call the BE service "core" to what they provide. All the truly interesting code is in the clients. The server just an email service that stores the email in an encrypted format and talks their custom API.

    An open source ProtonMail back-end won't help you in any way unless you're trying to host PM yourself I guess?