• 0 Posts
  • 74 Comments
Joined 1 year ago
cake
Cake day: July 18th, 2023

help-circle



  • vyatta and vyatta-based (edgerouter, etc) I would say are good enough for the average consumer.

    WTF? What galaxy are you from? Literally zero average consumers use that. They use whatever router their ISP provides, is currently advertised on tech media, or is sold at retailers.

    I’m not talking about budget routers. I’m talking about ALL software running on consumer routers. They’re all dogshit closed source burn and churn that barely receive security updates even while they’re still in production.

    Also you don’t need port forwarding and ddns for internal routing. … At home, all traffic is routed locally

    That is literally the recommended config for consumer Tailscale and any mesh VPN. Do you even know how they work? The “external dependency” you’re referring to — their servers — basically operate like DDNS, supplying the DNS/routing between mesh clients. Beyond that all comms are P2P, including LAN access.

    Everything else you mention is useless because Tailscale, Nebula, etc all have open source server alternatives that are way more robust and foolproof to rolling your own VPS and wireguard mesh.

    My argument is that “LAN access” — with all the “smart” devices and IoT surveillance capitalism spyware on it — is the weakest link, and relying on mesh VPN software to create a VLAN is significantly more secure than relying on open LAN access handled by consumer routers.

    Just because you’re commenting on selfhosted, on lemmy, doesn’t mean you should recommend the most complex and convoluted approach, especially if you don’t even know how the underlying tech actually works.


  • What is the issue with the external dependency? I would argue that consumer routers have near universal shit security, networking is too complex for the average user, and there’s a greater risk opening up ports and provisioning your own VPN server (on consumer software/hardware). The port forwarding and DDNS are essentially “external dependencies”.

    Mesh VPN clients are all open source. I believe Tailscale are currently implementing a feature where new devices can’t connect to your mesh without pre-approval from your own authorized devices, even if they pass external authentication and 2FA (removing the dependency on tailscale servers in granting authorization, post-authentication).


  • I believe this is what some compression algorithms do if you were to compress the similar photos into a single archive. It sounds like that’s what you want (e.g. archive each day), for immich to cache the thumbnails, and only decompress them if you view the full resolution. Maybe test some algorithms like zstd against a group of similar photos vs individually?

    FYI file system deduplication works based on file content hash. Only exact 1:1 binary content duplicates share the same hash.

    Also, modern image and video encoding algorithms are already the most heavily optimized that computer scientists can currently achieve with consumer hardware, which is why compressing a jpg or mp4 offers negligible savings, and sometimes even increases the file size.










  • If they agree that Trump/Republicans are fascist, ask them why they think it’s an acceptable risk to allow the government to construct the most pervasive and advanced surveillance state that has ever existed for fascism — a system so advanced it would make Himmler cream his pants — why build big brother so all they have to do is simply take over, turn a key, and use it against the world?

    If they’re insane and think Trump/Republicans are the good guys, repeat the above but swap out the perpetrator for liberals/trans/immigrants, or whatever “other” is the flavor of the week.

    If they’re not American, ask them what they think will happen if the world’s strongest ever superpower — a kleptocratic failed state, straddling the knifes edge of fascism — with a secret police who have backdoor access to the tracking device in their pocket, all their data, and all their historic communications — became a fascist dictatorship? … Point out how “woke” they are (sex before marriage, gay marriage, whatever) … and ask them how comfortable they would be if the tens of thousands of people working at the NSA/CIA were converted into fascist “troll farms”, and started using AI and analytics of all their personal data, to unilaterally wage a cyber war on everyone they deem “woke”? Do they think their government or military could defend them from a bad actor that has the ability to hack anyone on Earth… A bad actor who, if they want you out of the picture, just has to remote into your machine, download some child porn, and tip off the local police… Good luck trying to prove your innocence. You don’t even know what most of those words mean! You weren’t even aware that this was a possibility 30 seconds ago!



  • If you only included projects created in the last 2 or 5 years rust would be ahead of C/C++, possibly ahead of all other strongly typed langs. Kotlin is usually chosen explicitly for modern Android and Java lib interoperability.

    I would be willing to wager that within the next 1-2 decades, LLM transpilation will be used to replace most C/C++ code, too. LLM’s can’t be trusted to write code, but they can be trusted to transpile in combination with TDD. If a codebase is already well tested then transpilation is many orders of magnitude easier.



  • This is why privacy policies are a virtue signaling joke. They all start with “we respect your privacy” which is so objectively, categorically, false 99% of the time that it should be considered illegal (e.g. false advertising) for the org to even associate those words with their business, in any capacity. Every evilcorp has one policy that is hundreds of pages long and covers everything they ever have done, and ever will do, across every subsidiary and product of the entire umbrella organization. The whole privacy policy system is designed so every consumer rubber stamps them and legally absolves the corporation for everything they will ever do, because it’s impossible for any human to read or understand them. By impossible I mean literally impossible – you would need more than a lifetime to read them, let alone comprehend them…

    If we didn’t live in a capitalist dystopia, privacy policies wouldn’t be needed most of the time, because data laws qould be so comprehensive they explicitly apply for 99% of interactions, and every system would be designed from the ground up for zero trust (e.g. all data is E2EE). But in the 1% of cases where they are needed they’re dynamically generated from templates, based on a users current preferences/settings. The “use X app” policy would be different from the “integrate all of my other various PII linked services to my account” policy. In the case of a completely offline calculator, with no API, and no telemetry/analytics (or them all disabled by default) the policy would not even be a link; just a one-liner that says “App can be used with zero data collection”. If you download the app and choose to enable a data collection setting, that’s when you would be shown the policy related to the specific data points that setting relates to.