Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)JA
Posts
1
Comments
215
Joined
2 yr. ago

  • Does it still count as "self hosting" if one of your backups uses something like restic to push to b2 or hetzner storage boxes? It's not consumer point and click.

    I have one copy going there, and one going to a $50 thinkstation usff connected to a single external hard drive. It's not raid, but if it dies, it just gets quickly replaced while I rely on the hosted backup.

  • If you don’t think they all talked about those problems, you weren’t listening. The difference was which party’s solution was believable. In my mind none of them were good enough, but Pierre’s ideas were particularly terrible. He would have DOGEd his way to a solution.

  • NAT punching and proxying when a p2p connection between any 2 nodes cannot be achieved. It’s a world of difference with mobile devices when they always see each other, all the time. However, headscale does all that.

  • Too many people thought that tax would cut into their retirement investments. So dumb. We can’t do anything good without conservative hucksters convincing median income Canadians it will hurt them.

  • Well, that’s what you are doing with ssh tunnels and remote browsers. If you want separation, they can put your computer in their router’s DMZ (demilitarized zone), so it doesn’t have access to their devices. Additionally, If you use the Tailscale IPs (or host names) instead of their local IPs on his network, they won’t ever change.

  • Even in the most extreme scenario, they will be aiming to stabilize prices, so it will take rising wages over at least a decade to make housing affordable. They won’t want to see prices dropping because they will be worried about a financial crash when people start walking away from under-water mortgages.

    Edit: not disagreeing with your main point. Cutting off immigration entirely would be suicidal for a country with our demographics.

  • Yes. EBay and Amazon have a certified refurbished thing with warranties for a little more money, or monitor local classified sites if you can inspect them. I’ve bought a couple off Kijiji here in Canada, which is a bit like Craigslist and Facebook marketplace. The sellers didn’t advertise that they were a business selling off-lease stuff, but you can tell by the number of laptops they post.

  • Find out if there are any corporate off-lease machines being sold in your area. USFF machines are frequently used as mini desktops or point of sale computers then sold off for peanuts when warranties are done. Especially look at i3-8xxx generation, as they don’t support windows 11 fully.

  • Yes, we need to expand provincial park campgrounds to catch up with population growth. It’s a crime that in such a big, mostly forested province, people can’t easily get a couple hundred square feet of grass to pitch a tent for a weekend.

  • Agreed. This is American style storm in a teacup politics when we have bigger fish to fry -including his actual failures as a parliamentarian and lawmaker. It will cost more to move him out and in again, and putting his autistic daughter through two moves for “optics” is just dumb. Keep pointing out that he’s such a weak leader they needed to hand him the easiest seat in Canada on a platter, and /that/ will do more damage than pretending anyone cares about him staying rent free in Stornaway for a couple months.

  • You are talking out of your ass. First, a timing attack requires numbers to correlate - reasonable numbers of people using a node or server and a LOT of packets going back and forth. Neither are true for a Signal server. Second, they don’t get the phone numbers if contacts are using only their username (with phone number sharing disabled). Your criticisms are over the top and not at all nuanced to the degree of protection of metadata that was built into signal. If it was as bad as you imply, a whole heck of a lot of the most respected security researchers would have to be complete idiots.

  • That a timing attack could be successful is not a given. It’s a possibility, yes, but there is very likely sufficient mixing happening to make that unrealistic or unreliable. An individual doesn’t create much traffic, and thousands are using the server constantly. Calling it a honeypot or claiming the phone number and device is are available is a stretch.

    Timing attacks can work in tor when you are lucky enough to own both the entrance and exit node for an individual because very few people will be using both, and web traffic from an individual is relatively heavy and constant to allow for correlation.

  • At least in theory, this is mitigated. The signal activation server sees your phone number, yes. If you use Signal, the threat model doesn't protect you from someone with privileged network or server access learning that you use Signal (just like someone with privileged network access can learn you use tor, or a vpn, etc).

    But the signal servers do not get to see the content of your group messages, nor the metadata about your groups and contacts. Sealed sender keeps that private: https://signal.org/blog/sealed-sender/

    You would obviously want to join those groups with a user Id rather than your phone number, or a malicious member could out you. It's not the best truly anonymous chat platform, but protection from your specific threat model is thought through.

    edit: be sure to go to Settings > Privacy > Phone Number. By default anyone who already has your phone number can see you use signal (used for contact discovery, this makes sense to me for all typical uses of Signal), and in a separate setting, contacts and groups can see your phone number. You will absolutely want to un-check that one if you follow my suggestion above.