• 0 Posts
  • 41 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle

  • Yes I read it when it first came out, and again after a recent update. It’s very opinionated and I remain unconvinced the criticisms amounts to very much. At the least, certainly not to the point where words like nazi and fascist should be thrown around!

    For example, I dislike Yarin’s and Lunduke’s politics but I did at least watched Yarin’s interview. (Did you? It was boring, and entirely tech-oriented, nothing controversial at all.) But… trial by association I guess. And anyway, it’s not the article itself I have a problem with - it’s the borrowing of second-hand opinions as if they should be your own. Sometimes, it’s prudent to reserve judgement (until ‘verifying every single thing’), or criticise specific ideas, without leaping to ad hominem per consortium.


  • I find it wild in this day and age how questions like (“why do WE hate” such and such) are being asked in the first place, then answered through one person’s opinion piece mindlessly linked from all angles. Please, for gawd sake, stop listening to random fedditors/redditors about what opinions you should adopt!

    IMHO (<- there’s a novel approach), the criticisms of FUTO are just as biased and political as FUTO themselves, and everyone should be sceptical of bias from all sides. Apparently, focusing on ‘privacy, decentralization, and right to repair’ - is being too political, and they’re not allowed to have a philosophical take on what they imagine successful open source to be. (Incidentally, I’m not necessarily on FUTOs side, just pissed off at the nature of social media to obviate the need of critical thinking and make everything black or white.)




  • You maybe right about the authoritarian part, but I guarantee you they don’t know a thing about technology - evidenced by their unwillingness to listen to experts on matters like the Online Safety Act or on trying to outlaw e2ee. Starmer made Peter Kyle Secretary of State for Science, who said “For everyone thinking of using a VPN, verifying your age keeps a child safe … so let’s not try find a way around, just prove your age, make the internet safer for children.” Authoritarian certainly is an adjective to describe these people, but so also is clueless.


  • Nah. The monarchy absolutely is not part of our identity. More importantly, they don’t have any part in making decisions - parliament and the current govt. do.

    We have some croaky institutions (the Lords) and a stupid voting system (first past the post - just like the U.S) but the monarchy is just a figurehead with some unfair land ownership laws - but the monarchy itself has no authority on this. Today’s bs comes down to heir Starmer’s cluelessness/arrogance.


  • Droolio@feddit.uktoSelfhosted@lemmy.worldTIL - Caddy
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 months ago

    Do ignore me then, I assumed you might know the reference and only I mean’t it in good humour. :) (Without spoiling anything - in the unlikely event you might some day watch it - Mr Milchick is a character that uses ‘big words’. Your choice of words struck a chord.) I will say though, you’re seriously missing out. The cinematography alone is brilliant and the acting exceptional.




  • You’re limiting yourself somewhat if you’re not able to plug in multiple drives at the same time. Otherwise, I might suggest mergerfs for basic JBOD. You won’t be able to use a single ZFS to avoid bit rot - only detect it. SnapRAID - ideal for offline setups - would be the next step up if you could dedicate one of your drives to parity.

    In your position, I’d do Duplicacy backups split/spanned over multiple backup drives (however you connect them).

    It has a pretty cool Erasure Coding feature that protects individual chunks from bit rot and possibly even bad sectors, plus the whole database-less architecture makes it very robust. De-duplication, high levels of compress, and encryption. Plus you can keep historic snapshots, so you can avoid the risk of accidentally sync’ing ransomware over the top.

    Edit: the CLI is free for personal use, and is source-available. Written in Go and extremely performant.




  • Multiple backups may be kept.

    Nice work, but if I may suggest - it lacks hardlink support, so’s quite wasteful in terms of disk space - the number of ‘tags’ (snapshots) will be extremely limited.

    At least two robust solutions that use rsync+hardlinks already exist: rsnapshot.org and dirvish.org (both written in perl). There’s definitely room for backup tools that produce plain copies, instead of packed chunk data like restic and Duplicacy, and a python or even bash-based tool might be nice, so keep at it.

    However, I liken backup software to encryption - extreme care must be taken when rolling and using your own. Whatever tool you use, test test test the backups. :)





  • There’s no point doing anything fancy like that - wireguard over Tailscale is pretty pointless, as Tailscale is literally wireguard with NAT traversal and authentication bolted on. Unless you enable subnetting, it can’t get more secure than that.

    And even if you do enable subnetting (which you might wanna do if you need access to absolutely everything), you can use Tailscale ACLs to keep tighter control - say, from specific (tagged) devices.