I'm also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it's game over anyway.
I am sorry but that is BS. Encryption is not easy to break like in some Movies.
If you are referring to that a bad actor breaks in and modifies your hardware with for example a keylogger/sniffer or something then that is something disk encryption does not really defend against.
That's also my take on the topic and that is also what backblazes data is suggesting. Would they not believe it themself then they would stop buying unreliable drives. Every brand can have outlier models that have a bad failure rate.
Go with the drive with the best money/TB rate that meets your criterias. I would consider everything above ironwolf or red plus fitting for NAS use.
Data center drives are in my experience often cheaper than NAS drives. (wd ultrastar or seagate exos or toshiba enterprise capacity)
Look for the warranty. Some times another drive for just a couple of bucks gives you a way longer warranty.
And as backblaze says themselves every time, this data is not.the complete truth either, they have large sample size but this sample size is still too small to large claims about reliability. Especially about brand reliability.
In Linux systems, initrd (initial ramdisk) is a scheme for loading a temporary root file system into memory, to be used as part of the Linux startup process. initrd and initramfs (from INITial RAM File System) refer to two different methods of achieving this. Both are commonly used to make preparations before the real root file system can be mounted.
As i said 2 different things, initrd was used to create a ramdisk, a block device. Initramfs basically directly offers a filesystem instead of a block device.
Brussels will follow it without question or thought about negative effects on Europe, just because it's given in Brussels that EU will follow US wherever it goes.
It is just not the way the usual scammer and spammers operate. Ofc there are other types of criminals that do operate differently but those do not get their Addresses from a data leak which E-Mail aliases pretect against
Why should a scammer or spammer bother with a tech savy person. Scammers and spammers use E-Mail dumps from data leaks to spam and scam ppl. The first step is automated, way more profitable then to go spear fishing on a normal user.
Nope. It is objectively opinionated, since he only shows his solution and offers or shows no other solution.
Tbf I haven't looked at the source material but I don't think two points make it "outdated". It's like calling Debian outdated.
Debian is not outdated, also is the technology not outdated he used in the guide (as far as i can tell since i have not read through everything).
But using those to get to the shown solution is outdated. When someone in this community asks for a VPN solution most ppl will recommend Wireguard and or tailscale and not OpenVPN.
OpenVPN has other benefits like better user management and more customizability but for this use case it is not the fit, since other solutions are easier to setup and harder to fuck up the security part for a beginner.
Edit: Those are only the 2 examples i picked. I have not looked through everything, but those 2 stood out to me by just looking at the ToC.
This is correct, i missed that part. pfSense is mentioned 259 vs. OPNsense 3 times.
But only the "not nice part" is mentioned and not the hostility towards FOSS. Here are some examples https://github.com/rapi3/pfsense-is-closed-source
I have not vetted every single claim but just alone that fact that they have this closed source model is enough for not using it. OPNsense is to my knowledge fully open source.
I am sorry but that is BS. Encryption is not easy to break like in some Movies.
If you are referring to that a bad actor breaks in and modifies your hardware with for example a keylogger/sniffer or something then that is something disk encryption does not really defend against.