• 0 Posts
  • 406 Comments
Joined 1 year ago
cake
Cake day: September 21st, 2023

help-circle







  • Ubiquiti?

    You can’t give me that garbage. I despise it, after setting up a single access point (plus also watching friends deal with it at client sites).

    Besides the discovery issues and slow performance when trying to manage it, I had a random open network on it after setup. This network didn’t appear anywhere in the control panel. I could turn off the access point and the network disappeared.

    It didn’t show up in the guest network config (which was turned off anyway). It had the same name as the WPA-protected network, it was just open - no security at all.

    I had to reset the access point to get rid of this weird random open network.

    What kind of garbage product does that?

    Now let’s look at cloud keys. One has a hard drive in it. Just one drive, 3.5", which besides storing data also stores the OS. What? Why is the OS not on some firmware or at least an M2, since the drive is really for storing surveillance data (did I mention it’s a single drive?), what a joke. Why would I bother with such an expensive device that has zero fault tolerance, when I could simply buy a cheaper real machine, run multiple drives, and host the software there?

    I lack the vocabulary to describe how bad Unifi is.







  • Yea, the aprons make it really robust, but that lateral stress on such a small area seems like it would flex. I’d either want that stretcher or some cross bracing at the rear.

    If you don’t expect to move it, you can cheat and drive a single lag through the apron into a stud. Then it’ll never move, for sure.

    Though I admit I’m impressed it doesn’t already flex, what a beast!






  • Tailscale is wireguard (it uses the wireguard protocols, even says so on the box), just with a centralized resolver to make things easier to setup and manage.

    I’m not sure what you’re saying with the rest of your comment, as Tailscale is a mesh network, not a VPN as most people think of it.

    It encrypts your traffic, but only into the network of which your device is a member. You can’t even see any devices, or networking, outside the Tailscale network, unless a device is configured as a Subnet router. Then you can see devices in the network which the Subnet Router links together.

    For example, you have 3 machines, a laptop on mobile data, and 2 desktops on your home LAN. One desktop and the laptop have Tailscale, they can communicate over Tailscale to each other, but the laptop cannot connect to the second desktop because it’s on a different network, since there’s no routing between Tailscale and your home LAN.

    You then configure Subnet Routing on the desktop that has Tailscale, now your laptop can connect o any device on the home LAN, so long as the desktop is running and Tailscale is up.

    Think of mesh networks as Virtual LANs in software, configurable on each device (mostly, sort of). Twenty years ago Hamachi was the go-to for this, it was brilliant, and much easier to use than today’s mesh networks, just far less capable/manageable/configurable.