• 0 Posts
  • 17 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle





  • You’re running docker inside a vm? Why?

    The first thing I would do is learn the 5-layer OSI model for networking. (The 7-layer is more common, but wrong). Start thinking of things in terms of services and layers. Make a diagram for each layer (or just the important layers. Layers 3 and up.)

    If you can stomach it, learn network namespaces. It lets you partition services between network stacks without container overhead.

    Using a vm or docker for isolation is perfectly fine, but don’t use both. Either throw docker on your host or put them all in as systemd services on a vm.




    1. Yes, because:
    2. It could
    3. And if it does, you probably can’t remove it

    Streaming sites can embed an unhearable data stream into audio signal. It’s possible

    That being said, it’s extremely improbable, given the costs to do it at scale.

    If you’re part of a large company’s beta program and have access to some unreleased product, maybe worry.

    If you grabbed a file from some mega host updown whatever site, don’t worry.

    And if you’re still worried, take a sha256 hash and put it into google search. If you get any results that even mention your file’s title, then you’re good.



  • You’ll want to learn the difference between SAS and SATA connectors. You can very probably use either. 3.5 inch is the “standard” size, while 2.5 inch was more popular for laptops. However, in the interest of density, servers started accepting 2.5 inch drives to fit more drives per rack.

    You can get great deals on used sas drives on ebay, but if you don’t know how to monitor s.m.a.r.t. data / rebuild a zfs array, that can be very very risky. You need to be able to survive concurrent disk failures.

    Honestly your best bet is brand new western digital or seagate drives. Buy them on amazon, but double check that the seller is legit. That’s it.





  • Wireguard creates a new network interface that accepts, encrypts, wraps, and ships packets out your typical network interface.

    If you were to create a kernel network namespace and move the wireguard interface into that new namespace, the connection to your existing nic is not broken.

    You can then use some custom systemd units to start your *rr software of choice in said namespace, rendering you immune to dns leaks, and any other such vpn failures.

    If you throw bridge interfaces into the mix, you can create gateways to tor / i2p / ipfs / Yggdrasil / etc as desired. You’ll need a bridge anyway to get your requester software interface exposed to your reverse proxy.

    Wireguard also allows multiple peers, so you could multi-nic a portable personal device, and access all your admin interfaces while traveling, with the same vpn-failure-free peace of mind.