• 0 Posts
  • 487 Comments
Joined 2 years ago
cake
Cake day: June 9th, 2023

help-circle




  • Lennart Poettering intends to replace “sudo” with #systemd’s run0. Here’s a quick PoC to demonstrate root permission hijacking by exploiting the fact “systemd-run” (the basis of uid0/run0, the sudo replacer) creates a user owned pty for communication with the new “root” process.

    To my understanding that actually solves issues. A lot of ppl already prefer other tools like doas since sudo is basically “too big” for what it does.

    More code means more potential bugs. run0 has to my knowledge significantly less code. And the benefit of not relying on SUID.

    In the end, you do you. The big distros will adopt what is good for them and good to maintain. You do not have to use it.


  • Just subscribe to the release channel. That varies from OS to OS or Software, but is worth it.

    Use tools that are universal. For example, I have not used TrueNAS Scale because they did not support native docker at the time. OS specific solutions are more likely to break then universal once (truecharts vs docker)

    To get up and running again after a complete failure i can just download the latest config and data from my backup and set up any distro that supports docker and my system is running again.

    I do OS upgrades when they are available, usually within 1 or 2 days and containers are updated with watchtower daily.


  • The main difference i would say is the development and licensing model. Photo prism is forcing ppl who want to commit to sign a CLA to.give away their rights. Also the community is not really active it is mainly one dev that can change the code license on any given time.

    Immich does not have such an agreement and has a huge active contributor community around it. Also Immich is backed by Futo which has its pros and cons.

    Imho the biggest pain in self hosting is when a foss product turns evil towards its community and start to practice anti consumer/free selfhosters business practices.

    Immich is far less likely to turn evil.

    Edit: I think it is the biggest pain cause you have to migrate every device and person to the new service.





  • ShortN0te@lemmy.mltoPrivacy@lemmy.mlProton CEO Andy Yen Interview
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    14 days ago

    The tweet he commented on was indeed a nice idea, but a CEO should have more foresight that the things Trump stated in it would not be true. When you look at it now, it looks like it was more or less a threat that led to a closer relationship between “tech bros” and the current administration instead of the “take down” of them.


  • Immich requires to be run on a server to function, but a lot of (or even all) of its functions are things that could reasonably done entirely on-device. Aves combined with some automatic backup solution such as Nextcloud gets (from what I can tell) most of the functionality Immich offers.

    How would you backup Immich on device?

    And if you backup to Nextcloud than you already have a served?

    So you are arguing that having a file server is enough? And processing is done on client side?

    That would be in this case very inefficient.

    1. You would need to have all the data on the Client or transfer all the data to the client once you load it.
    2. You device has to do all the processing which would lead to lower battery life.
    3. How do you handle multiple Users? Giving partially access to the Filesystem?

    I could come up with other points but this should give you an idea. Yes, for some use cases a server-client approach does not make sense but for a dedicated photo backup and indexer it absolutely does.






  • I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.

    I am sorry but that is BS. Encryption is not easy to break like in some Movies.

    If you are referring to that a bad actor breaks in and modifies your hardware with for example a keylogger/sniffer or something then that is something disk encryption does not really defend against.