Security knowledge and ethical concerns are two separate things. Whether we like it or not, we pay online creators through private data we must give to entities who will use it against our best interests.
Size of diff between btrfs subvolume and snapshot is 11GiB
WDYM by "diff"?
Also forgot to mention but if you want to know what's taking how much space on your btrfs, try btdu. It uses a sampling-based approach and will therefore never be 100% accurate but it should be quite accurate enough after a little bit.
This is the way. You need to check whether CPU and package are mostly in the highest C-states they can be. If not, you've got a task or IO device causing a lot of wasted power.
As per btrfs fi df /home, used space is 82.86 GiB, not 83.21 GiB.
That's just used data. The global used metric likely incorporates metadata etc. too. System aswell as the GlobalReserve are probably accounted as fully used as they're, well, reserved.
As per btrfs fi du -s /home , used space is 63.11 GiB.
Total Exclusive Set shared Filename
63.11GiB 13.64GiB 49.01GiB /home
While according to du -hs /home, 64GiB is used.
Likely compression or inline extents. btrfs only reports apparent size to du and friends unfortunately.
Also, maximum space used should be close to 72 GiB as per btrfs fi du -s / and 73 GiB as per du -hs /, if btrfs fi usage includes all subvolumes . '/home' and '/' are on separate subvolumes.
Your home has a lot of shared extents which indicates to me that you have at least one snapshot of it.
You also wrote 13.6GiB of new data to your home since the snapshot. Assuming a similar amount of data was deleted/overwritten since, that would add up to 76GiB. If there's perhaps one or two more snapshots, that would explain the rest.
Snapshots are "free" only so long as you don't write or delete any data in the origin.
You don't use HTTP or SOCKS proxies to proxy internet traffic these days but VPNs. The effect is the same but it's a shiny new name to market. If you're talking to a normie (i.e. Google), you're looking for "a VPN".
This space is quite crowded as it's a super simple service to offer and is insanely profitable. You're basically being resold datacenter bandwidth with a profit margin of at least 90%.
What you're likely looking for (given the community) is a proxy to pseudonymise your internet traffic such that neither data brokers nor governments can trivially get access to this information.
Given the insane profit margin, there are tonnes of unscrupulous "VPN services" that stab you in the back and double dip; selling your traffic data to the highest bidder. If you want one who doesn't do that, you must pay and even then you have to be extremely careful in your selection. Unless proven otherwise or very implausible, assume any VPN proxy provider stabs you in the back for even higher profits.
The only exception I know of is ProtonVPN which offers limited free servers. The free tier is effectively a free trial with some limitations, namely that it's only a handful of countries and that P2P is blocked. I've used it for years and IME speed has almost always been absolutely fine.
Whether you trust Proton is up to you to decide. IMV the company does not appear to be in this primarily for enrichment but because they actually care about privacy. They offer quite a wide range of other services that they built from the ground up and largely open sourced. The raison d'être for their free VPN proxies appears to be customer aquisition and I guess it worked on me because I'm now a paying customer of theirs, though primarily for their email services.
Note that they comply with (Swiss) government orders (as any sustainable business must) but I trust them to not sell my data to the highest bidder or governments which is what I care about. If you're doing shit bad enough that could get someone to convince the Swiss government to go after you, they will not shield you (but also just.. please don't).
I was in a similar situation as you. I pulled through and let me tell you: It did not get better :(
I managed to get good grades and such because I knew most of the core concepts already and had some luck in the intelligence lottery w.r.t the specific kinds of intelligence beneficial in my field which enabled me to learn the new parts really quite easily but if that's not the case for you, YMMV.
If I was doing it again, I'd stop if possible (a degree was not strictly required in my situation but beneficial). Failing that, I'd find a way to make it not as stressful (i.e. fewer classes).
Just try a default Firefox. Though if you want to use TOR anyways, why not just use TOR browser? It's the only browser where the starting conditions are reasonably anonymous.
There's a large difference between surrendering massive amounts of highly critical metadata aswell as some data to a known abuser vs. an entity that prides itself in not abusing your data and which even takes specific technological measures to make it as hard for them as possible (zero access encryption at rest, automatic key discovery).
( Partial social graph, interaction timestamps, political interests, health, hobby interests and much of that usually even in plain text data form when receiving email; stored in in plain text forever.)
Yeah and that's great but my point is that I don't see an obvious way to use it for that in its current implementation. I'm sure you could build it but it's simply not built yet.
I wouldn't really call the BE service "core" to what they provide. All the truly interesting code is in the clients. The server just an email service that stores the email in an encrypted format and talks their custom API.
An open source ProtonMail back-end won't help you in any way unless you're trying to host PM yourself I guess?
Cool story bro but you clearly still didn't even read the first sentence of what I wrote.