• 0 Posts
  • 23 Comments
Joined 3 years ago
cake
Cake day: June 17th, 2023

help-circle



  • I would look into Tailscale based on your responses here. I don’t know what your use case is exactly but you set TS up on your server and then again on your phone/laptop and you can connect them through the vpn directly. No extra exposed ports or making a domain or whatnot.

    If you want other people to access the server they will need to make a TS account and you can authorize them.







  • Side note. Don’t use hardware acceleration with TDARR. You will get much better encodes with software encoding, which is great for archival and saving storage.

    Use hardware acceleration with Jellyfin for transcoding code on the fly for a client that needs it.

    If you know what your client specs are, you can use TDARR to reencode everything to what they need and then you won’t have to transcode anything with Jellyfin.



  • You have a point that it will be hard to explain this to everyone on why it is better.

    From my understanding, when you use a password manager, the user will enter a pw into it that they remember and the vault will unlock. Then when they go to log into a website, a different, longer, and impossible to remember password will be sent to the site at login. (Assuming they are using the manager well). A week later when they go to log in again, the same long password will be delivered.

    The problem is that if a bad actor gets involved, whether it is the website is attacked or they send the user a phishing url or something and the password from the manager is exposed, it will have to be changed. That scammer can now log into that website as the user whenever they want, and possibly any other website that user used the same password for. Hopefully they didn’t if they are using a manager.

    With passkeys, a user will log into their manager with a password they remember, but when they go to log into a website, a different token will be sent, based on their key, every time. So if a scammer is listening at the router they still can’t log in again because it has expired.

    It is still not a perfect thing, I would imagine that phishing sites could still get a scammer in, who could possibly do bad things or change the login credentials but it is still much more secure than sending a password to the site for the user.






  • She is in her 80’s. I mostly just explained WHY she would need one, and promised once she was done with the transition, things would be easier. Her old password method was a weathered old piece of paper with everything scribbled down on it, with lots of old pet names and other animals with random numbers attached.

    Now she is very happy with being able to have all of her passwords ready either on her computer, phone, or iPad, and she feels a lot more secure with the long random passwords.