Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045

  • 4 Posts
  • 1.09K Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle












  • @[email protected] I personally started out with a wireguard server on a linux vm on my windows machine. a little config here, an open port there, done. Ok, the config even thought it is simple, it took some time to fully understand for the 2-sided meaning of AllowedIPs

    then bought a raspberry pi 4 with very little memory for more services. ran it from an sd card until it died, and from a too weak portable hard drive since. It’s quite slow. and swapping through USB seems to cause kernel panics every few months

    then built a server role computer as NAS from desktop parts, a 1st gen ryzen to be cheap but upgradable, ECC RAM and enterprise drives and no display, which runs Proxmox, a simpler debian VM for core services, and another one for the useful kinds of services in an attempt to minimize downtime. disks are in ZFS managed in the proxmox system, network sharing runs in a VM, the storage is passed in with virtiofs




  • An illegal actor could still

    and that’s all legality on the internet can achieve: calling these illegal actors. just like if I would be called an illegal actor if I kept using Matrix and Signal after (and if) chat control has passed.

    but they would be taking on risk,

    have you seen this article by Proton, showing how much big tech pays in penalties for their illegal acts?

    it does not matter.

    paying substantial infratstructure costs,

    piece of cake for those who already have it. I’m but only talking about traditional big tech, but also other large companies like clearview ai.

    would not be able to make it widely available for fear of being caught, and would have limited options for actually making any real money from it.

    Except if they are

    • in a non-EU country, because EU has no power outside it
    • having business with police forces and such, because then it can easily get an exception or get hidden or handwaved away

    It would completely prevent say, your average stalker, or jilted ex, or non techy weirdo from.being able to access it, and it would prevent corporations from spending all their time building business around privacy invasion.

    only if it gets found out, and if the person doing it does nothing to hide itself. I don’t think this would be effective.

    what I think though that this could be used as another reason to support chat control, and automated surveillance with it, but maybe not even at the chat system, but at the camera software or operating system level


  • I agree with you, I think there might have been a misunderstanding.

    Well you said:

    but that’s the best that can be done on chrome

    that’s true. what I wanted to mean is that I don’t think gorhill really wants to develop that addon (uBO Lite), as I can imagine he’s fed up with the limitations and how little he can do there. I don’t know he’s reason for developing it, though. Maybe as an experiment on what it could still accomplish.

    And I think the best use of such a plugin is actually to use it on Firefox. Since Firefox (or Firefox forks) still support Manifest v2.

    I’m a little confused here. we don’t need that plugin on Firefox, because we have the full capability version.

    SO please do not use Google Chrome

    I totally agree. That would be a huge downgrade. Not looking back, only forward, for FF forks and whatever the future may bring us.


  • It’s possible to run multiple services on the same machine, and actually it’s most often done that way, yes. To keep it all more portable and maintainable, people often use containerization software (like docker with docker compose). It has lower overhead than running VMs.

    If you start hosting multiple services that have a web interface, you will probably want to look into a reverse proxy software, which is basically a web server that handles TLS uniformly and sorts your HTTP services to subdomains. The Apache web server is agood example.

    Prepare yourself to the need of editing text files and using the linux shell, often through SSH. Most often the text files will not need to change after having it set up properly. These text files and tge linux terminal are much more friendly in my opinion than the windows registry and the windows cmd terminal, so don’t let that discourage you.