I have local incremental backups and rsync to the remote. Doesn’t syncthing have incremental also? You have a good point about syncing a destroyed disk to your offsite backup. I know S3 has some sort of protection, but haven’t played with it.
I have local incremental backups and rsync to the remote. Doesn’t syncthing have incremental also? You have a good point about syncing a destroyed disk to your offsite backup. I know S3 has some sort of protection, but haven’t played with it.
I have tailscale mostly set up. What’s the issue with USB drives? I’ve got a raspberry pi on the other end with a RO SD card so it won’t go bad.
This reminds me that I need alerts monitoring set up. ; -)
I’ll have to check this out.
I attended some LUGs before covid and could see something like this being facilitated there. It also reminds me of the Reddit meetups that I never partook in.
That’s something that I hadn’t considered!
I wasn’t aware of the untrusted setting. That sounds like a good option.
Yes. It’s the “put a copy somewhere else” that I’m trying to solve for without a lot of cost and effort. So far, having a remote copy at a relative’s is good for being off site and cost, but the amount of time to support it has been less than ideal since the Pi will sometimes become unresponsive for unknown reasons and getting the family member to reboot it “is too hard”.
Take some time and really analyze your threat model. There are different solutions for each of them. For example, protecting against a friend swiping the drives may be as simple as LUKS on the drive and a USB key with the unlock keys. Another poster suggested leaving the backup computer wide open but encrypting the files that you back up with symmetric or asymmetric, based on your needs. If you’re hiding it from the government, check your local laws. You may be guilty until proven innocent in which case you need “plausible deniability” of what’s on the drive. That’s a different solution. Are you dealing with a well funded nation-state adversary? Maybe keying in the password isn’t such a bad idea.
I’m using LUKS with mandos on a raspberry PI. I back up to a Pi at a friend’s house over TailScale where the disk is wide open, but Duplicity will encrypt the backup file. My threat model is a run of the mill thief swiping the computers and script kiddies hacking in.
You’re doing God’s work!
Over my career, it’s sad to see how the technical communications groups are the first to get cut because “developers should document their own code”. No, most can’t. Also, the lack of good documentation leads to churn in other areas. It’s difficult to measure it, but for those in the know, it’s painfully obvious.
I don’t know the legal side, but employers don’t want you to talk about your compensation with anyone. Maybe it’s legal, but definitely frowned upon.
Consider what would happen if employees across the globe posted to an open database about their employer, position title, salary bonus and health care information. I’m sure we’d all be sued. How is this legal?
I’m not as enraged by this as most, but I think the true test will be to see if this feature is disabled by default in future releases. If they actually do listen to their users, that’s better than any of the other big players.
I read a bit about the new “feature” and it seems to me that they’re trying out a way to allow ad companies to know if their advertisement was effective in a way that also preserves the privacy of the user. I can respect that. I did shut it off, but am also less concerned because I have multiple advertisement removal tools, so this feature is irrelevant.
The fact that it’s enabled by default isn’t comforting, but who would actually turn this on if it were buried in about:config? In order to prove its effectiveness to promote a privacy respecting but advertisement friendly mechanism, this is what they felt that they had to do.
Of course, I could easily be all wrong about this and time will tell.
Hi! I’m not having any problems with linux. I just thought you’d like to know.
There. Now there’s a message in the support forums about a person not having problems!
I have the Debian netinst disk, but it doesn’t include the dm-cache modules, so I downloaded the live DVD last night. I only get about an hour a day to work on stuff.
🤦♀️ I’ve never considered this, but it’s the simplest solution and makes perfect sense. I’m always so diligent to keep my system clean to save a few megs.
This particular server is an old PowerEdge server I’m using to learn server stuff on and a practice home lab. Unfortunately, it won’t boot from SD card, so I have a few DVD RW’s in a drawer. I’ve read that there’s a SD slot inside that you can emulate a floppy, but haven’t explored it.
It references a sort of partnership with K9 Mail on android, but later says they’re looking to expand Thunderbird into the iOS & Android space. Either they’ll be direct competitors of each other or they’ll start to blend into each other. I’m wondering which.
In the early kernel (think pre 1.0), I “fixed” the CPU scheduler for performance. I gave too much privilege to user processes, who refused to relinquish control back to the OS.
Another time I was working on a multiprocess bootup configuration (before systemd) in a configuration where the main process would orchestrate the workers. Well, the main process would fork a child to do the work, then the child process would fork a child process to do it’s work. It was infinite delegation and I ran out of pids.
A self replicating 3D printer? I like it.
Perhaps I’ve been naieve.