Global namespace extremist. Defragment your communities!

  • 2 Posts
  • 362 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle

  • I host 2 ejabberd servers. One casual, federated, the other one standalone, for work.

    • Conversations is a decent android client that supports modern XMPP standards
    • Dino on the desktop. It just happen to support the same subset of standards as Conversations, so they work pretty well together.

    For Mastodon, I’m using an Akkoma instance hosted by a frind of mine

    • Tusky works pretty well with it. There were certain annoying bugs when I combined the official Mastodon app with Akkoma.

    Every once in a while I try Matrix, but each time I try to log in, Synapse is is fucked in a different way. I have to scrap it up and start from the ground up some day.

    • Only the element based clients so far, because every alternative lack certain features.

    I’m a big fan of Nostr, because of one particular feature - You control your identity without having to selfhost a server. The network seems to be occupied by the christian-carnivore-bitcoin-conservatives so far, therefor it’s pretty bland when it comes to content.

    • Amethyst on Android
    • Gossip on the desktop. This one requires a certain knowledge of the protocol. Each action needs to be manually triggered.

    For some special use cases I have Signal, but most of the time, Telegram is the best the average person can do to meet me in the middle.



  • deafboy@lemmy.worldtoLinux@lemmy.mlEncrypt whole system?
    link
    fedilink
    English
    arrow-up
    4
    ·
    16 days ago

    That’s not a slow laptop. I’ve been daily driving worse for years.

    To protect the data from random thief just browsing through the files I still use ecryptfs. It only encrypts the home directory, and the keys are derived from my accounts password, so no extra hassle.

    The encryption is weak by the current standards, and wouldn’t stop a determined attacker, but it’s 100% better than nothing, and I’ve never noticed any performance problems.




  • Gmail offers imap amd smtp access. You have to enable 2FA, and then it will allow you to create account for so called “less secure apps”.

    In your place, I’d either continue using gmail directly, or finish the configuration of the self hosted mail server and just use that with any smtp/imap client. I suggest getting a separate domain for testing first, before moving your primary inbox there.




  • The usefulnes of a system is often measured by the amount of illegal shit it can handle. Nobody would really use a stick or a fire if it required a law enforcement officer standing behind you the whole time.

    On the other hand, Telegram was always intentionally not secure, nor private. So it’s not that thay can’t comply. They just decided not to (as far as we know).

    - - tinfoil hat on - -

    This is not really about moderation. The europeans just want to evasdrop on the russians.

    - - tinfoil hat off - -










  • TIL: Some people actually like their laptop to wake up after openning the lid!

    I’ve used Elitebooks with elementary for years and found the wakup after pressing a button logical.

    What pissed me off about probooks/elitebooks was that they woke up to inform me about the low battery, then went back to sleep due to low battery, then wake up, sleep, wake up, sleep, wake up… and the agony went on until the sweet death. I’ve never felt so sorry for a non living object before or after.

    Oh, and also elementary can’t go to sleep from the lockscreen, on any hardware. One of those those bugs that I’m always sure will be taken care of in the next release, but it never is.


  • you still need good security configuration of the exposed service.

    In a sense that security comes in layers, yes. But in practice, this setup will prevent 100% of bots scanning the internet for exposed services, and absolute majority of possible targeted attacks as well. It’s like using any other 3rd party VPN, except there’s not a central point for the traffic to flow through.

    From the attackers point of view, nothing is listening there.

    I’ve used a similar setup in the past to access a device behind a NAT (possibly multiple NATs) and a dynamic IPv4. Looking back, that ISP was a pure nightmare.