[-] brownmustardminion@lemmy.ml 1 points 15 hours ago

You're right. I always thought Peertube was another YouTube frontend.

[-] brownmustardminion@lemmy.ml 10 points 1 day ago

I think the only real path forward is for a developer to figure out a way to decentralize video hosting. The future of the free internet is decentralization. We've seen which way the wind blows when platforms are centralized.

Consumer storage is abundant and cheap as hell. There will need to be incentives for: 1. Creators 2. Node hosters 3. Moderators. Potentially AI could do the heavy lifting on number 3. Figuring out a way to avoid ad based revenue would be another hurdle. In an ideal world, creators would accept that only 10% of their viewers would contribute to them monetarily (through patreon or donations) and use the platform for its freedom from corpo bullshit.

But as much as the Foss and decentralized crowd has been growing, I think we're still a long way out from average people becoming fed up enough to care. I still get eye rolls from everybody I know IRL when I try to get them to open an invidious link.

[-] brownmustardminion@lemmy.ml 2 points 3 days ago* (last edited 3 days ago)

I'm in the same boat as you in that I need Instagram for work. My approach is to create a separate work profile in GrapheneOS. I handle all of my mobile work apps in that profile using a separate VPN from all other profiles. I don't expect to be completely free from tracking in this profile, but for my threat model I don't mind too much. Any web queries I make in this profile I keep strictly work related.

People arguing you just shouldn't use Instagram need to remember Instagram is a tool just like Windows, Adobe, etc. Sometimes you need a specific tool to do your job and I believe as long as you containerize that aspect of your life then you'll be fine.

Just don't use your work Instagram for personal stuff, not even browsing memes.

[-] brownmustardminion@lemmy.ml 5 points 4 days ago* (last edited 4 days ago)

picard_facepalm.png. can you tell I just Tab through terminal?

[-] brownmustardminion@lemmy.ml 4 points 4 days ago

Fixed it. Thanks

141
submitted 5 days ago* (last edited 4 days ago) by brownmustardminion@lemmy.ml to c/selfhost@lemmy.ml

I accidentally attempted to SSH into one of my servers from a device that did not contain my ssh key. I configure all of my servers to only allow authentication via cryptographic keys. Root ssh as well as password auth are disabled.

To my surprise, I was able to log in to my server with a password despite this. Baffled, I first tried some other servers. 2 of the 5 other servers I tried were accessabke via password.

After some swift investigation the culprit was found, a cloud-init ssh config in sshd_config.d/ with one line: password_authentication Yes.

So TLDR PSA....if you run a server in any type of virtualized environment, including a VPS, check your /etc/ssh/sshd_config.d/ folder. And more broadly, actually thoroughly test your ssh access to confirm everything is working as you intend it to.

104

I'm curious what the benefits are of paying for SSL certificates vs using a free provider such as letsencrypt.

What exactly are you trusting a cert provider with and what are the security implications? What attack vectors do you open yourself up to when trusting a certificate authority with your websites' certificates?

In what way could it benefit security and/or privacy to utilize a paid service?

And finally, which paid SSL providers are considered trustworthy?

I know Digicert is a big player, but their prices are insane. Comodo seems like a good affordable option, but is it a trustworthy company?

18

What do you recommend for an at-a-glance access log dashboard? Kibana and Grafana seem cool but overkill.

All I want is a dashboard that can ingest and parse syslogs from various services and neatly display a list of currently connected IPs and usernames if applicable as well as a IP connection history.

12

With the EOL of PVEv7 and my need for more storage space, I've decided to migrate my VMs to a larger set of drives.

I have PVE installed baremetal on a dell r720 RAID1 SSDs. I'm a bit nervous about the migration.

I plan on swapping the SSDs, installing PVE8 from scratch, then restoring VMs from backup.

Should I encounter an issue, am I able to swap the old RAID1 SSDs back in, or once I configure the new ones are the old drives done for? I'm managing RAID on a dell RAID controller.

I also have my data hard drives passed directly into a TrueNAS VM which supplies other VMs via NFS. Is there anything I should be concerned about when I've migrated, such as errors re-passing the data drives to the TrueNAS VM. Or should everything just work again?

Is there a master PVE config file I can download before swapping drives that I can reference when configuring the new PVE install?

[-] brownmustardminion@lemmy.ml 12 points 1 month ago

This is the way. Frigate just had a major update and the UI is now amazing.

44

I was listening to a Bazzell podcast where he mentions his company self hosting and maintaining a database of personal data and credentials for use in OSINT investigations. Some acquired through public sources but others acquired through leaks. Then of course there are data aggregate companies that do the same but are going on to sell this data for a profit.

What is the legality of this? Obviously acquiring publicly available data is legal, but how are these companies able to hold on to leaked usernames, passwords, and other confidential personal information. Especially those that were initially acquired through illegal means?

[-] brownmustardminion@lemmy.ml 46 points 1 month ago

I operate an invidious instance. Google has really cracked down the past two weeks on YouTube front ends. Its extremely frustrating.

Invidious devs are finalizing a workaround so hopefully things will be working again in the next week or two.

50

I'll start by stating my threat model is avoiding corporate tracking, profiling, and analytics. For anything beyond that scope I believe tor is ideal.

Correct me if I'm wrong but my understanding is that Newpipe is a frontend to provide an alternative to the awful YouTube app and/or youtube account. However, your IP along with other device information may still be exposed to google servers. Any ideas as to what info beyond IP is sent to google?

Whereas invidious instances act as a proxy in addition to what is offered by Newpipe, but you are trusting your privacy to the instance owner.

My idea for utilizing these services is the following: Newpipe for managing subscription based YouTube viewing. Google would have my IP, but this IP would be a VPN IP address that periodically changes. Much more reliable than invidious and better quality. App is great.

Invidious for random video searches as well as content I may want to be slightly more cautious about associating with.

I'm looking for feedback on this conceptual setup. I've also been considering making a public invidious instance that I can use but hopefully obfuscates my viewing through its usage by others.

42

I recently acquired a pixel phone and set up gos. Prior to trying gos I was using an iPhone hardened as much as possible based off of recommendations and guides from respected OSINT experts.

It’s only been a week but I’ve found gos extremely frustrating and mostly useless except for web browsing.

I can’t seem to get my Yubikey to work so my 2FA is borked. Works fine on my iPhone.

I’ve previously managed to degoogle my life but now certain apps require me to use sandboxed google apps just to run.

I’m facing the nearly insurmountable task of convincing my friends, family, and colleagues to download and use signal when they are all using encrypted iMessage.

Most of my banking apps just simply do not work. Mobile banking is unfortunately something important that I need in my occupation. A part of the appeal of gos was being able to have an isolated dedicated profile for banking.

There’s also a few features that I’m assuming are iPhone exclusive that it really sucks to have without. Double tapping the bottom of the screen to shift everything down so you can reach the top of the screen with your finger when using one hand. Holding down on the space bar to move the text cursor between characters. Maybe these exist on gos though?

I understand most of the issues lay on the shoulders of the app developers. I’m grateful for the devs for creating and working on this project. I’m not bashing anyone here. I’m simply asking for some guidance on how I can break through the hurdles and make this work for me, from the mouth of those who were once in my position.

33

I’ve been using invidious for a few years. I recently changed up my morning routine and have been eating breakfast watching YouTube via the TV app versus on my PC.

It made me realize I kind of miss the recommended videos in some circumstances like when I just wanna veg out.

Are there any current viable yt front ends that either maintain the algorithm or utilize their own to find you new content?

79

What is the general consensus on trusting data removal services with the data you provide them?

I’ve spent 5 years telling myself I’ll go through the long lists of data aggregators and one by one manually send removal requests. But it’s such a massive undertaking. I’d like to finally get it done through one of these services, but my gut tells me it feels wrong.

Has anybody used them and how do you feel about it? Is DeleteMe a good choice?

16

I have a Dell Poweredge r720xd in RAID10. I've had a couple of drives fail since I've bought it and was able to buy cheap replacements on ebay.

I had another drive fail recently and one of the spare ebay drives came up as "blocked". It put me out a few days while I waited for a new one to arrive; also from ebay.

I'd like to avoid getting another dud drive. Are there any reputable resellers of these old drives so I can stock up on some spares?

[-] brownmustardminion@lemmy.ml 12 points 3 months ago

For my own understanding, what potential dangers are there using a Yubikey as opposed to an open source key?

28

I’ve made a few posts in the past about my experimentation with connecting various devices and servers over a VPN (hub and spoke configuration) as well as my struggles adapting my setup towards a mesh network.

I recently decided to give a mesh setup another go. My service of choice is Nebula. Very easy to grasp the system and get it up and running.

My newest hurdle is now enabling access to the nebula network at the same time as being connected to my VPN service. At least on iOS, you cannot utilize a mesh network and a VPN simultaneously.

TLDR: Is it a bad or a brilliant idea to connect my iOS device to a nebula mesh network to access for example my security camera server, as well as route all traffic/web requests through another nebula host that has a VPN such as mullvad on it so I can use my phone over a VPN connection while still having access to my mesh network servers?

20
submitted 3 months ago* (last edited 3 months ago) by brownmustardminion@lemmy.ml to c/linux@lemmy.ml

As the title says, I'm trying to multiboot Fedora 40 and Ubuntu 24. The documentation and guides for this all seems pretty outdated through my searching and troubleshooting.

I currently have ubuntu installed. My drive partition table looks like this:

  • sda1 -- EFI (250MB)
  • sda2 -- /boot (ext4, 2GB)
  • sda3 -- empty (ext4, 2TB) <-- Fedora partition
  • sda4 -- Ubuntu 24 (LUKS encrypted, 2TB)

I'm trying to install Fedora now and it's giving me nothing but errors. The most useful guide I found for this specific setup just has you adding sda3 as the installation path (mounted at /) for Fedora and it's supposed to figure out the EFI and boot, but that doesn't happen. In fact, the EFI and /boot partitions show up under an "Unknown" tab in the Fedora custom partition window of the installation. They should be under a tab such as "Ubuntu 24 LTS". Fedora isn't recognizing the ubuntu installation (because it's encrypted?)

Am I wrong in assuming that both OS's should be sharing the EFI and /boot partitions? Maybe that's the issue?

Anybody out there successfully dual booting Linux distros with both distros encrypted?

[-] brownmustardminion@lemmy.ml 15 points 5 months ago

Got an alternative that isn't youtube?

[-] brownmustardminion@lemmy.ml 11 points 5 months ago

It's trivial for twitch to differentiate between users who are logged in and have verified accounts. Slapping bans by IP is archaic and lazy when you have more precise metrics to go by. And at the very least, they should make you aware that you are banned before accepting your money for their services.

[-] brownmustardminion@lemmy.ml 15 points 5 months ago

Your question is a good one. I'm not the one who downvoted you fyi. To answer your question, it is absolutely a personal anecdote based on my own experimentation. I'm sure others will add their own experiences. Based on my experiences there's no doubt about twitch shadowbanning based on VPN use. I'll admit I don't have a basis for Linux and adblockers being a part of the equation, but I made it clear in my original post that those were assumptions.

To further speculate, I have an idea that the shadowban may actually be triggered by somebody using the same VPN server doing something that triggers it, affecting anybody else on that server. I can't possibly provide evidence for that theory, but it would explain the seemingly random nature of the shadowbans.

[-] brownmustardminion@lemmy.ml 13 points 9 months ago

I prefer to shy away from those companies, especially Google, for moral/privacy reasons.

view more: next ›

brownmustardminion

joined 2 years ago