Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IN
Posts
1
Comments
273
Joined
2 yr. ago

  • Use -B instead.

    Sets Advanced Power Management feature. Possible values are between 1 and 255, low values mean more aggressive power management and higher values mean better performance. Values from 1 to 127 permit spin-down, whereas values from 128 to 254 do not. A value of 255 completely disables the feature.)

  • Define "sandboxed"

    Application can only access a limited part of the system? = use flatpak or build a container/VM image using the nix pkgs.

    Application can be uninstalled completely and has separate libraries? I prefer nix.

  • Especially since they don't talk about how they secure the local data

    They don't because they don't

    All the data you import is indexed in a SQLite database and stored on disk organized by date, without obfuscation or anything complicated.

    Probably because this is still in early alpha and "the schema is still changing".

  • Drives connected to usb have an unstable connection in my experience, this is very annoying and gets worse with hubs.


    RAIDs reduce the time a system is offline and reduce data loss, if a drive fails and you can afford to wait for the new disk and the backup to restore, and have regular backups that ensure no important data gets lost (though remember the data added between backups may be lost) then you don't need a RAID.

    I don't use RAIDs cause if my disk fails then I can stomach the 2-4 days it takes to buy a new one and restore the backup

    Very important: use S.M.A.R.T and a filesystem with checksums to make sure you're not backing up corrupted data and know to get a new one


    For encryption at rest you may want to look at clevis and tang, though you need a server in your home network for this to work. The client (with clevis) then decrypts the disk at boot if it can reach the server (tang). The server can't decrypt the data without the client secret and the client can't decrypt it without the server public key.

    Don't know what your server could be though, maybe a router with custom firmware?


    You should also look into cloud storage/rclone, that way you can automate your backups more and reduce the need for manual intervention.

    I use rclone and restic to automatically backup my servers daily which takes a few seconds most of the time due to them being incremental backups.

  • Something I don't get is, why try to make all browser look the same when you can do the easier thing and just make each browser session have a new fingerprint?

    A unique fingerprint doesn't matter much if it's only valid till I close that website, right? So why not change a lot of variables by some small amount to make the data useless?

  • And to calculate the offset needed to get them all synced up involves calculating time dilation, which involves knowing/assuming the speed of light. These synchronizations work just as well if the two way speed of light is different than the one way speed of light.

    To know the speed of light you assume the speed of light is c, but you're trying to calculate c so all those clocks aren't verified synced.

    Just read through the wiki or Harvard's books if you'd like, this is an unsolved "problem" in physics for a reason or do you think no one cares about how fast c is?

    See also This or, more accessibly "Synchronization conventions"

  • It is impossible to synchronize the clocks in such a way that you can actually measure the speed of light with it due to time dilation unless you define beforehand how fast the speed of light is to calculate that time dilation.

    See also This or, more accessibly "Synchronization conventions"