• 0 Posts
  • 25 Comments
Joined 3 years ago
cake
Cake day: June 19th, 2023

help-circle
  • Would the MacBook Pro or rpi4 with a second Ethernet nic running a firewall before the routers also fix the issue of not getting security updates?

    No. For most routers, this provides no additional protection to the router. Your router should not be accepting connections from the WAN side that would be blocked by the firewall, but consumer routers almost always initiate connections to the WAN side, indistinguishable from normal client traffic to your firewall, and accept connections from the LAN side, invisible to your firewall. If the firewall blocks all incoming requests, it would create problems for UPNP, effectively giving you CGNAT, even if the firewall does not perform address translation.








  • The Epstein files are the distraction. The United States government, particularly but not exclusively Trump and his appointees, is committing a new crime every week but everyone keeps going back to the probable suspicion that Trump was involved in the sexual abuse of minors years ago. There is no way that Trump will be removed from office because of the Epstein files when the Department of Justice is running an illegal coverup for him. Complaining that the DOJ is withholding files that probably exist about something that Trump probably did is too abstract for anything to happen in Congress. Get them out for the recent crimes that aren’t just probablies first and then talk about the Epstein files when over half of the government isn’t trying to cover them up.


  • Enabling SSH password authentication is unnecessary and not a good idea, especially if your temporary passwords are simple. I haven’t used Hetzner but there is probably a way to upload a file or to paste into the console, or else if you fix your keyboard you could at least type a URL to download the public key from the internet. You may want to look into cloud-init instead of manually installing and configuring your VMs.

    LUKS may not make your server meaningfully more secure. Anyone who can snapshot your server while it’s running or modify your unencrypted kernel or initrd files before you next unlock the server will be able to access your files.


  • This is only technically true. He’s found a loophole where he makes an obviously illegal order, and that order is in effect for months before it is struck down, and then he can just make a new order like he’s doing right now with tariffs. He keeps getting away with it because the legislative branch is complicit.

    What happens if he declares that to prevent voter fraud, voters need to prove eligibility in a way that prevents poor people, or people who have changed names, or people who live in a home owned by somebody else, or nationalized citizens, or people living in selectively restricted voting districts, or people who have a skin tone inaccurately recognized by specifically choosen facial recognition software, or people who are “accidentally” detected to be inactive voters, or people who are just afraid of being disappeared by ICE from voting, and it is enforced long enough to impact the election? Will he finally be thrown out of office before the election? If not, will the people illegally prevented from voting have their votes counted after the order is struck down? Would those people be able to vote before some other illegal order goes into effect or would elections and their results be constantly delayed?







  • Kubernetes is much more complicated and powerful than Docker, and Docker Compose is more similar to the way you work directly with Kubernetes than it is to Helm, which adds in a templating system. Basically, from a Docker perspective, Helm allows you to configure your compose file, but not just by substituting variables. Helm can make structural changes such as completely adding or removing sections based on the variables used when loading the chart. The output of Helm is YAML, sort of like a compose file.

    Kubernetes has a much more complicated system for describing workloads and their resources than Docker Compose, and it is extensible. For example, if you are running on AWS you can have Kubernetes attach EBS volumes to your pods, or if you’re on bare metal you might use LVM, and it’s not limited to things that Kubernetes natively understands like storage volumes: Cert Manager is a common piece of software that is deployed into Kubernetes that takes care of issuing and renewing TLS certificates for other software in Kubernetes.

    I used to run Kubernetes at home with ArgoCD, but I’ve moved on to NixOS instead. NixOS is less powerful because it doesn’t have dynamic workload scheduling, but I don’t actually need dynamic workload scheduling or all the configuration necessary to facilitate dynamic workload scheduling in my house, and Nix is much nicer to work with than Helm’s gotmpl templating. Unless you like this kind of stuff or want to get into Kubernetes, you probably want to avoid it for running a few things on one host.