[-] MigratingtoLemmy@lemmy.world 178 points 1 month ago

If OpenAI can get away with going through copy-righted material, then the answer to piracy is simple: round up a bunch of talented Devs from the internet who are writing and training AI models, and let's make a fantastic model trained on what the internet archive has. Tell you what, let Mistral's engineers lead that charge, and put an AGPL license on the project so that companies can't fuck us over.

I refuse to believe that nobody has thought of this yet

[-] MigratingtoLemmy@lemmy.world 92 points 1 month ago

Funny business, we need to get them to move to Codeberg

[-] MigratingtoLemmy@lemmy.world 78 points 4 months ago

Find the politicians by name who voted yes for this, and display them in public.

Let the capable open source community then take over going through their phones, since they must be OK with their phones being scanned, right?

[-] MigratingtoLemmy@lemmy.world 65 points 4 months ago

My point being, what are they going to achieve with this? Ask WhatsApp to pass over their encryption keys?

It should be pretty obvious that you shouldn't be sharing sensitive stuff on chat apps controlled by the NSA. Use element with encryption or something, maybe Briar etc. What are they going to do if you insist on using apps which use asymmetric client-side encryption, break TOR? Force you to use symmetric encryption and give the government your decryption keys?

I don't see how they are going to spy on sensitive details of Europeans with this. They might as well ban phones completely if they want to limit communication.

[-] MigratingtoLemmy@lemmy.world 94 points 4 months ago

Proton and Mullvad leading the way

57

I don't have spare peripherals like a monitor and a keyboard. How do you suggest I do a bare-metal install of Debian on a computer (meant to be a server)?

19

Hi everyone,

This would seem to be a basic question (I've been on this for a few hours and can't seem to get it working).

This is my file for my pod:

$ cat backup.pod

[Unit]
Description=backup pod

[Pod]
Network=slirp4netns:port_handler=slirp4netns
PodmanArgs=--userns=auto:size=10000
PodName=backup

And this is the file for my container which is supposed to be part of the pod:

$ cat backup.container

[Unit]
Description=backup container

[Container]
Image=docker.io/debian/debian:latest
ContainerName=backup-container
Entrypoint=/bin/bash
Exec=/bin/bash -c "apt-get update -y && apt-get upgrade -y && apt-get install rclone vim -y && exec bash"
Pod=backup
GlobalArgs=-d -t

[Service]
Restart=always

[Install]
# Start by default on boot
WantedBy=multi-user.target default.target
  1. Podman's systemd-generator doesn't seem to create any service file for backup.pod in /run/user/$(id -u user). I do see a service file for backup.container, backup.service.
  2. Regardless, systemctl start backup.service errors out anyway.

I'm unable to understand how to use quadlet from the documentation. AFAIK I did everything they asked (https://docs.podman.io/en/latest/markdown/podman-systemd.unit.5.html).

The primary reason why I tried this was because I couldn't figure out how to create a pod using compose.yaml either. If someone has answers to these questions, they would be much appreciated!

Thanks!

18

publication croisée depuis : https://lemmy.world/post/16156662

To be completely open, this is not a question about XCP-ng vs Proxmox. I'm open to doing everything in the cli, comparing two platforms is not my intention here.

I'm very interested in the security benefits one has over the other though. AFAIK Xen has a dedicated for security? I'd like to think that both are reasonably secure by default, but I do not get many hits for "KVM hardening", for example, only OS-level hardening advice.

Do both protect equally against attacks that try to escape the VM? Is there anything in terms of security that one has and the other doesn't?

I know this is not the usual kind of question that is asked on this sub, any help is greatly appreciated!

21

To be completely open, this is not a question about XCP-ng vs Proxmox. I'm open to doing everything in the cli, comparing two platforms is not my intention here.

I'm very interested in the security benefits one has over the other though. AFAIK Xen has a dedicated for security? I'd like to think that both are reasonably secure by default, but I do not get many hits for "KVM hardening", for example, only OS-level hardening advice.

Do both protect equally against attacks that try to escape the VM? Is there anything in terms of security that one has and the other doesn't?

I know this is not the usual kind of question that is asked on this sub, any help is greatly appreciated!

28

cross-posted from: https://lemmy.world/post/15706364

Transparent compression layer on Linux?

My use-case: streaming video to a Linux mount and want compression of said video files on the fly.

Rclone has an experimental remote for compression but this stuff is important to me so that's no good. I know rsync can do it but will it work for video files, and how I get rsync to warch the virtual mount-point and automatically compress and move over each individual file to rclone for upload to the Cloud? This is mostly to save on upload bandwidth and storage costs.

Thanks!

16
submitted 5 months ago* (last edited 5 months ago) by MigratingtoLemmy@lemmy.world to c/selfhosted@lemmy.world

My use-case: streaming video to a Linux virtual mount and want compression of said video files on the fly.

Rclone has an experimental remote for compression but this stuff is important to me so that's no good. I know rsync can do it but will it work for video files, and how I get rsync to warch the virtual mount-point and automatically compress and move over each individual file to rclone for upload to the Cloud? This is mostly to save on upload bandwidth and storage costs.

Thanks!

Edit: I'm stupid for not mentioning this, but the problem I'm facing is that I don't have much local storage, which is why I wanted a transparent compression layer and directly push everything to the Cloud. This might not be worth it though since video files are already compressed. I will take a look at handbrake though, thanks!

[-] MigratingtoLemmy@lemmy.world 59 points 5 months ago

Basically an advertisement for their services, but since they're shitting on Google's ad revenue model I'm all for it.

I will not shit on Google completely myself though, because I do appreciate (other than a few naughty shenanigans they've pulled recently) their work on the Android kernel.

40

Hi everyone,

As always, every time I look at the AWS Glacier egress fee calculator I get fairly irked at how much they charge. Was wondering if anyone knew of any alternatives for cold storage in the cloud without such egregious charges. I will likely not access it ever because I have another offset backup, but just in case I do, I wouldn't want to fork over thousands, really.

I don't know how reliable Scaleway's service is, and Cloudflare's R2 doesn't have a Archive offering. I would be interested in the Azure if anyone can convince me that I won't go bankrupt trying to retrieve my data from them. I don't want to go with Google with the recent stuff they have been doing with data on their servers.

Thanks!

68

Hi, I was planning to encrypt my files with GPG for safety before uploading them to the cloud. However, from what I understand GPG doesn't pad files/do much to prevent file fingerprinting. I was looking around for a way to reliably pad files and encrypt metadata for them but couldn't find anything. Haven't found any recommendations on the privacyguides website either. Any help would be appreciated!

Thanks

14

publication croisée depuis : https://lemmy.world/post/14573897

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

13

publication croisée depuis : https://lemmy.world/post/14573897

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

6

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

21

I'd like to be able to contribute financially to people/communities who run infrastructure, such as nodes, for layers like I2P and Freenet. Where do I find them, and does contributing directly to the projects themselves help in this regard?

Thanks!

[-] MigratingtoLemmy@lemmy.world 72 points 8 months ago

Alright, displayport, here we come

[-] MigratingtoLemmy@lemmy.world 86 points 8 months ago

Linus is full of shit in a lot of videos

[-] MigratingtoLemmy@lemmy.world 81 points 10 months ago

Love your work in managing Lemmy's infrastructure at scale. Would like to join you sometime

[-] MigratingtoLemmy@lemmy.world 56 points 10 months ago* (last edited 10 months ago)

I would have liked for Linus to maintain his angry-man-finger-thrusting self against evil corporates like Nvidia. I suppose I'm asking for too much, but his mild-mannerisms towards developers is a welcome change. Towards such corporates though, not so much. I would have liked some more motivated cursing against Intel and Nvidia and IBM. Oh well.

Other than that (which is a minor gripe from me at the most), touching message from Linus. Indeed, the maintainers are graying, and the current generation isn't that interested in kernel programming. I'm sure there will be talent around (as long as the big companies need Linux to run their servers, I'm sure someone will turn up), but someone to rise to the helm with a fiery approach to openness is very important to my heart. I don't think we will ever see another Linus in our lifetime, and I will personally grieve the day Linus and his core set of maintainers pass away.

I am not a programmer, and the best I can do is provide some funding to people who can/would engage directly with the kernel. But if the situation becomes so dire, I too will get my hands dirty, if nothing but to help the cause. Long live FOSS!

[-] MigratingtoLemmy@lemmy.world 121 points 1 year ago

I'm very curious as to how you survived on the Internet without an adblocker for the last decade.

[-] MigratingtoLemmy@lemmy.world 123 points 1 year ago* (last edited 1 year ago)

I found a few links summarising this:

On 4th and 5th generation Pixels (which use a Qualcomm baseband providing cellular, Wi-Fi, Bluetooth and GNSS in separate sandboxes), almanacs are downloaded from https://qualcomm.psds.grapheneos.org/xtra3Mgrbeji.bin which is a cache of Qualcomm's data. Alternatively, the standard servers can be enabled in the Settings app which will use https://path1.xtracloud.net/xtra3Mgrbeji.bin, https://path2.xtracloud.net/xtra3Mgrbeji.bin and https://path3.xtracloud.net/xtra3Mgrbeji.bin. GrapheneOS improves the privacy of Qualcomm PSDS (XTRA) by removing the User-Agent header normally containing an SoC serial number (unique hardware identifier), random ID and information on the phone including manufacturer, brand and model. We also always fetch the most complete XTRA database variant (xtra3Mgrbeji.bin) instead of model/carrier/region dependent variants to avoid leaking a small amount of information based on the database variant.

Note sure if e/OS/ has taken as much care as Graphene has to make the requests more private. Then again, they don't claim to be the most private OS, just De-Googled.


Edit: this is also a good read for further attempts to make your device more private: https://grapheneos.org/faq#other-connections

view more: next ›

MigratingtoLemmy

joined 1 year ago
MODERATOR OF