rtxn
@rtxn@lemmy.world
I take my shitposts very seriously.
- Comment on Selfhosted - friendly ways to fight spam without email / sms verification? 1 week ago:
Still don’t understand why they cut the fleeb.
- Comment on Simplifying Crypto Parties 1 week ago:
I don’t think you fully comprehend just how many footprints people leave behind on the internet. Users would have to practice perfect opsec – and I mean completely, absolutely perfect. One mistake, like using an e-mail address or an alias off-site, will link a person to the account. It’s happened before.
Thinking you can solve the issue of privacy with a single idea is simply delusional.
- Comment on Simplifying Crypto Parties 1 week ago:
Have you heard of surveillance cameras and facial recognition? If a hostile actor knows in advance that members of a targeted online community will be physically present at a location at a given time, those people will be linked to the community. It doesn’t take a lot from then to link specific persons to accounts.
- Comment on Noob Tailscale questions 2 weeks ago:
Something’s not right. There shouldn’t be a
deck-tailscale.sh
file. There’s supposed to be a directory nameddeck-tailscale
and atailscale.sh
and some other files inside it.Here’s what you do. First, open a terminal like Konsole. Then run these commands:
git clone https://github.com/tailscale-dev/deck-tailscale cd deck-tailscale sudo bash tailscale.sh
- Comment on Noob Tailscale questions 2 weeks ago:
You should see “Getting version…” right after running the script. Did you
cd
into the directory where the repository was cloned? - Comment on Noob Tailscale questions 2 weeks ago:
Program no worky will not be enough if you want help. What is the exact output when you try to run
tailscale.sh
? - Comment on Noob Tailscale questions 2 weeks ago:
The problem is that your phone’s hotspot network doesn’t advertise routes through the Tailscale tunnel. I don’t know how/if it can be done.
Try this guide on the deck: github.com/tailscale-dev/deck-tailscale
- Comment on What are your VPN recommendations for accessing self-hosted applications from the outside? 2 weeks ago:
Managing Wireguard is just one of Tailscale’s features.
It uses some UDP black magic fuckery to get through NAT and firewalls without having to open ports. Very useful if you’re behind CGNAT and/or your ISP is a dickhead and locks down the firewall on your router (this is why I use it; eat a dick, Vodafone). If the UDP fuckery is not available, it reverts to simple relay servers. The client can also advertise subnets and route to hosts on it. You could install the Tailscale client on OPNSense/pfSense/OpenWRT and access your entire home network through that one device.
- Comment on What are your VPN recommendations for accessing self-hosted applications from the outside? 2 weeks ago:
And why, pray tell, do you need Mullvad to do it? I want to know why you think that.
- Comment on Anubis is awesome! Stopping (AI)crawlbots 3 weeks ago:
I’ve made that exact comparison before. TLS uses encryption; ransomware also uses encryption; by their logic, serving web content through HTTPS with no way to bypass it is a form of malware. The same goes for injecting their donation banner using an iframe.
- Comment on Anubis is awesome! Stopping (AI)crawlbots 3 weeks ago:
But don’t you know that Anubis is MALWARE?
…according to some of the clowns at the FSF, which is definitely one of the opinions to have. www.fsf.org/…/our-small-team-vs-millions-of-bots
- Comment on Is there a last resort, whistleblowing like app that requires a password on a timer? 3 weeks ago:
My immediate thought is a cron job that tests the user account’s last login time and fires a script if it is exceeded.
- Comment on VERY simple web-based reliable file browser/hosting 4 weeks ago:
You can use basically any HTTP server to achieve that, like Apache or Nginx. If the directory (specified by the path in the URL) doesn’t contain a file that matches the default file in the config (index.html and such), the server will list the directory contents instead.
- Comment on PewDiePie: I'm DONE with Google 5 weeks ago:
Extrapolate from the context. I’m tired of explaining obvious things.
- Comment on PewDiePie: I'm DONE with Google 5 weeks ago:
The discourse goes to the same fucking place every time Felix is mentioned. People don’t deserve the benefit of doubt.
- Comment on PewDiePie: I'm DONE with Google 5 weeks ago:
I seriously doubt that anyone who asks that question doesn’t already have a foregone conclusion, but fine, I’ll indulge you.
Probably not. If he was, and had been hiding it his entire life, even in the era when he was the youtube star and had zero restraint, why would he slip up those few times, and especially such highly public ways?
He did and said some shit in his early 20s, and he deserved the criticism at the time, but those incidents weren’t repeated and weren’t part of a pattern. He wasn’t the paragon of virtue and maturity, but I’m willing to bet my left nut that neither are the people who are lining up to crucify him.
- Comment on PewDiePie: I'm DONE with Google 5 weeks ago:
Do you want to continue posturing and fishing for confirmation from other edgy teens, or do you want the answer?
- Comment on PewDiePie: I'm DONE with Google 5 weeks ago:
I’m sure all the reactions will be nothing but respectful and factual, and not riddled with decade-old festering emotions.
- Comment on PewDiePie: I'm DONE with Google 5 weeks ago:
hosting their videos on their own website
I love that entrepreneurial attitude. If an online service is unsatisfactory, just develop your own software from the ground up and provision the infrastructure from your pocket. Car industry sucks? Just build your own car! GPU prices high? Grab a soldering iron and a handful of sand, how hard could it be?
- Comment on ELI5: How to put several servers on one external IP? 1 month ago:
What if you try reaching it through your public IP?
- Comment on ELI5: How to put several servers on one external IP? 1 month ago:
Stupid question, but is the service reachable at all? What if you map 81 to 81? Or whichever port the other, confirmed-to-work service uses?
- Comment on VPN server on router or within home network? 1 month ago:
It’s based on hole punching, but with extras. The clients punch a hole in their respective firewalls then the service connect the holes so the clients end up communicating directly with each other. They have a lengthy blog post about NAT traversal.
- Comment on VPN server on router or within home network? 1 month ago:
Tailscale. It does some UDP fuckery to bypass NAT so you don’t even need to open any ports. You can run it on individual hosts to access them directly, and/or you can set it up on one device to advertise an entire subnet and have the client work like a split tunnel VPN.
- Comment on What's the real difference between a shell script and Ansible (and which should I use)? 1 month ago:
Ansible is an abstraction layer over system utilities, shell, and other programs. You can specify what you want to happen, and it will figure out how to do it. For example, you can use the ansible.builtin.package module to specify which packages you want to be present, and Ansible will decide which specific package manager module should handle it and how.
Ansible tasks are also idempotent – they are concerned with the end state instead of the action. Many of the modules (like the
package
module above) take astate
parameter with the possible values ofpresent
orabsent
(instead of the more common “install” and “remove” actions). If the system’s state satisfies the task’s expected end state (e.g. the package is already present), the task will be skipped – unlike a shell script, which would simply re-run the entire script every time.Ansible also implements strict error checking. If a task fails, it won’t run any subsequent tasks on the host since the end states would be unpredictable.
- Comment on Classification need with Tailscale, remote access, and local access. 1 month ago:
That’s unfortunate, I have no idea how Tailscale does routing on Windows. Try running the client without accepting any subnet advertisements.
I’ve also found this: tailscale.com/kb/1023/troubleshooting#lan-traffic… The solution might be to advertise a larger subnet (e.g. 192.168.1.0/23) to make the route advertisements on the tailnet less specific than on the LAN. Advertising a larger subnet won’t cause any additional issues because it’s in a private IP range.
- Comment on Classification need with Tailscale, remote access, and local access. 1 month ago:
How did you set up subnet advertisements on the router, and which subnets? Did you touch the ACL in the tailnet’s admin console?
On the home PC, did you accept advertised routes with the Tailscale client?
What happens when you ping a host on the LAN using
tailscale ping ADDR
? What happens when you try totracert
ortracepath
to it? - Comment on Good experience with neko remote browser 2 months ago:
Perhaps there was an easier lighter-weight way of doing this?
sshuttle
does exactly that. It’s basically a VPN that uses SSH tunnelling. If you have a host in the same network as the target machine, and you can SSH into it,sshuttle
can route all TCP traffic between you and the target (or a subnet) through the host without having to bind local ports manually. - Comment on ISPs seem designed to funnel people to capitalist cloud services 2 months ago:
- Comment on Garage - S3-compatible Object Storage alternative to Minio 2 months ago:
Minio is about to get Redis’d.
- Comment on Your help needed: PhD research on why people choose to self-host 2 months ago:
I use self-hosted services in the following categories as much as possible…
That question could really use a “not applicable” option. I don’t operate any home automation solutions, so any answer from me would be invalid.