![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
Well passwordless.
Same thing in this context. But sure, an encrypted partition would work.
Well passwordless.
Same thing in this context. But sure, an encrypted partition would work.
Dunno about ideal, but it should work.
It does have quite a bit of overhead, meaning it’s not the fastest out there, but as long as it’s fast enough to serve the media you need, that shouldn’t matter.
Also, you need to either mount it manually on the command line whenever you need it or be comfortable with leaving your SSH private key in your media server unencrypted. Since you are already concerned with needing to encrypt file share access even in the local network, the latter might not be a good option to you.
The good part about it is, as long as you can ssh from your media server to your NAS, this should just work with no additional setup needed.
Interesting. Though it does seem to to require your private key to be unencrypted…
Is sshfs an option? Unfortunately, I don’t think you can put that into /etc/fstab, though…
Wait, they managed to forge Let’s Encrypt certificates? While it explains the attack on TLS (though technically not https as originally claimed, not that it makes much of a difference), that’s even worse…
Really? That’s a rather big claim, and would change a lot for me if true. Do you have anything by the way of a source?
Also, how do you MITM https traffic without one of the parties just handing you their keys?
In your case, instead of getting a dedicated server and putting proxmox on it, I would check if it might not be cheaper to just get individual virtual servers directly.
Other than that, sure, I have been a customer for many years now, and I have always been a fan of Hetzner’s price to quality ratio.
Those aren’t files, though, they are just some sectors on your block device. Sure, if you mess with those, your ability to decrypt your disk goes out the window, but then, when was bypassing the filesystem and messing with bits on your disk directly ever safe?
It’s possible he was using an encrypted key file instead of just a password for that extra strong security. In that case, of course, if you lose that file, kiss your data good bye.
That ‘amp;’ does not belong in there, it’s probably either a copy-paste error or a Lemmy-error.
What this does (or would do it it were done correctly) is define a function called “:” (the colon symbol) which recursively calls itself twice, piping the output of one instance to the input of the other, then forks the resulting mess to the background. After defining that fork bomb of a function, it is immediately called once.
It’s a very old trick that existed even on some of the ancient Unix systems that predated Linux. I think there’s some way of defending against using cgroups, but I don’t know how from the top of my head.
Honestly, that was a bit of a wise crack. What I am doing with those two things (plus a number of other that are required these days, notably for DKIM) is running my own mail server.
Fair warning: Doing that costs money, time and effort, and messing it up can lead to… interesting results. (You usually don’t want “interesting” for something as fundamental as your email.)
If you are still interested, join us in selfhosted@lemmy.world. (Still figuring out how to properly link to a community on lemmy. In the meantime, look for it under “Communitys”.)
The postfix mail server can be found here: https://www.postfix.org/
The Cyrus IMAP server can be found here: https://www.cyrusimap.org/
Additionally, I also use roundcube so I can have a web interface for email.
I’m using a combination of Postfix and Cyrus IMAPd.
Granted, probably not what OP was asking for, but privacy wise, this is almost certainly more water tight than any of the other options.
Melania is a blatant gold digger. She might divorce him if he goes bankrupt, but only then.