• 0 Posts
  • 87 Comments
Joined 2 years ago
cake
Cake day: July 18th, 2023

help-circle



  • ZFS is an enterprise software RAID, and 1:1 RAM to TB is the minimum recommended requirement for a production server (e.g. enterprise implementations).

    I’ve seen many users stating they have far far less than 1:1 without issues. I recall a r/DataHoarder user saying they have 100+ TB’s and only 16 or 32GB RAM, which is not fully utilized, so it all depends on your usage profile and the size/scale of r/w ops occurring during peak periods.


  • That wasn’t what was reported, and is largely false. What was reported is that people are buying NEW drives which have FARM values indicating years of use. Also the most likely cause being a crypto project going under, and dropping petabytes in capacity over the last 12 months.

    This type of fraud hasn’t been proven in the used HDD space. There are many reasons used drives are sold other than exceeding usable life or warranty. Companies over forecast capacity or simply go bankrupt all the time (see crypto / ai), and those drives are sold. Considering drives are 30-50% more expensive now than they were 6-12 months ago the incentive and profitability of resale has increased.


  • I would suggest investigating how much effort it would take to alter your voice. Is it possible to do it live, or does it take post processing? There’s no harm in doing it unless you meet up with internet people in the real world. Even then it may not really be an issue.

    I’ve felt the same about parsing my comments via an AI because, using stylometry, a small sample of your comments are enough to de-anonymize all of your online accounts. It ultimately required too much effort and friction, plus I have decades of comments already out there so whatevs. I’m not here to fuck spiders.



  • This isn’t as simple or successful as you make it out to be, which is why tor opts for normalization instead of randomization. There are like hundreds of variables with billions of permutations in a browser, and some combinations never appear together in the real world. If all the major vars indicate Firefox 136, but your user agent is Chrome 98, and your language is English but location is Portugal, and some of those are changing every 30 seconds, you could end up being more unique and easier to track than if you’d just used mullvad or arkenfox. Browsers and trackers constantly evolve, so you can’t ever really know how effective any random combination truly is.










  • vyatta and vyatta-based (edgerouter, etc) I would say are good enough for the average consumer.

    WTF? What galaxy are you from? Literally zero average consumers use that. They use whatever router their ISP provides, is currently advertised on tech media, or is sold at retailers.

    I’m not talking about budget routers. I’m talking about ALL software running on consumer routers. They’re all dogshit closed source burn and churn that barely receive security updates even while they’re still in production.

    Also you don’t need port forwarding and ddns for internal routing. … At home, all traffic is routed locally

    That is literally the recommended config for consumer Tailscale and any mesh VPN. Do you even know how they work? The “external dependency” you’re referring to — their servers — basically operate like DDNS, supplying the DNS/routing between mesh clients. Beyond that all comms are P2P, including LAN access.

    Everything else you mention is useless because Tailscale, Nebula, etc all have open source server alternatives that are way more robust and foolproof to rolling your own VPS and wireguard mesh.

    My argument is that “LAN access” — with all the “smart” devices and IoT surveillance capitalism spyware on it — is the weakest link, and relying on mesh VPN software to create a VLAN is significantly more secure than relying on open LAN access handled by consumer routers.

    Just because you’re commenting on selfhosted, on lemmy, doesn’t mean you should recommend the most complex and convoluted approach, especially if you don’t even know how the underlying tech actually works.


  • What is the issue with the external dependency? I would argue that consumer routers have near universal shit security, networking is too complex for the average user, and there’s a greater risk opening up ports and provisioning your own VPN server (on consumer software/hardware). The port forwarding and DDNS are essentially “external dependencies”.

    Mesh VPN clients are all open source. I believe Tailscale are currently implementing a feature where new devices can’t connect to your mesh without pre-approval from your own authorized devices, even if they pass external authentication and 2FA (removing the dependency on tailscale servers in granting authorization, post-authentication).


  • I believe this is what some compression algorithms do if you were to compress the similar photos into a single archive. It sounds like that’s what you want (e.g. archive each day), for immich to cache the thumbnails, and only decompress them if you view the full resolution. Maybe test some algorithms like zstd against a group of similar photos vs individually?

    FYI file system deduplication works based on file content hash. Only exact 1:1 binary content duplicates share the same hash.

    Also, modern image and video encoding algorithms are already the most heavily optimized that computer scientists can currently achieve with consumer hardware, which is why compressing a jpg or mp4 offers negligible savings, and sometimes even increases the file size.