Global namespace extremist. Defragment your communities!

  • 16 Posts
Joined 1 year ago
Cake day: June 12th, 2023


  • rest of it reads like a copy-paste about the dangers of 5G cell towers

    I was just about to say boo-hoo, a dog gone bald, but 85 decibels measured from outside your window is brutal. There’s a reason these farms are mostly built in the middle of the desert, on the oil fields, or near a dam, with no residential housing nearby.

    Yeah, every medical emergency in town will be blamed on Mara from now on, but I’m not even mad. They’ve got themselves into this mess. For those who don’t know, they’ve built their entire marketing on being compliant with regulations :D

    The whole thing is awfully similar to the wind turbine controversy. The reasonable people spend years assuring the public that the windmills are not going to kill them, and then somebody comes up and says “Great! We’re gonna build our windfarm right next to these houses”.

  • I’ve been into decentralized networks from a young age. I’ve already been running a tor node around 2009/2010. First time I’ve stumbled onto bitcoin was on the “banking” section of the hidden wiki, and of course I’ve dismissed it as just another scam.

    Then around a year later somebody published a relatively detailed blogpost about the inner workings of bitcoin on a local linux enthusiast news site, and it all just clicked. I was instantly hooked.

  • Of course security comes with layers, and if you’re not comfortable hosting services publically, use a VPN.

    However, 3 simple rules go a long way:

    1. Treat any machine or service on a local network as if they were publically accesible. That will prevent you from accidentally leaving the auth off, or leaving the weak/default passwords in place.

    2. Install services in a way that they are easy to patch. For example, prefer phpmyadmin from debian repo instead of just copy pasting the latest official release in the www folder. If you absolutely need the latest release, try a container maintained by a reasonable adult. (No offense to the handful of kids I’ve known providing a solid code, knowledge and bugreports for the general public!)

    3. Use unattended-upgrades, or an alternative auto update mechanism on rhel based distros, if you don’t want to become a fulltime sysadmin. The increased security is absolutely worth the very occasional breakage.

    4. You and your hardware are your worst enemies. There are tons of giudes on what a proper backup should look like, but don’t let that discourage you. Some backup is always better than NO backup. Even if it’s just a copy of critical files on an external usb drive. You can always go crazy later, and use snapshotting abilities of your filesystem (btrfs, zfs), build a separate backupserver, move it to a different physical location… sky really is the limit here.