• 0 Posts
  • 143 Comments
Joined 2 years ago
cake
Cake day: June 18th, 2023

help-circle
  • Yes, it’s the next step and an evolution because it is far more of a trust less approach. With VPNs you need to trust your provider. If they “give you up” then you’re well and truly fucked. For I2P there is no way for a malicious node operators to parse out who is doing what. And the source code you can vet yourself so no need to trust it. Still if you have actors working together in the nodes, the torrent provider and at the ISP level then you can most certainly find a way to break the layer of secrecy. The barrier is however vast and so far police haven’t spent that much effort on piracy because it isn’t a serious crime in the eyes of the law. And I don’t foresee that they will for many years.

    It’s also far more accessible than say Usenet and VPN+private trackers. Which is a very good thing for privacy in general.


  • Yes, it’s the next step and an evolution because it is far more of a trust less approach. With VPNs you need to trust your provider. If they “give you up” then you’re well and truly fucked. For I2P there is no way for a malicious node operators to parse out who is doing what. And the source code you can vet yourself so no need to trust it. Still if you have actors working together in the nodes, the torrent provider and at the ISP level then you can most certainly find a way to break the layer of secrecy. The barrier is however vast and so far police haven’t spent that much effort on piracy because it isn’t a serious crime in the eyes of the law. And I don’t foresee that they will for many years.

    It’s also far more accessible than say Usenet and VPN+private trackers. Which is a very good thing for privacy in general.


  • Yes, it’s the next step and an evolution because it is far more of a trust less approach. With VPNs you need to trust your provider. If they “give you up” then you’re well and truly fucked. For I2P there is no way for a malicious node operators to parse out who is doing what. And the source code you can vet yourself so no need to trust it. Still if you have actors working together in the nodes, the torrent provider and at the ISP level then you can most certainly find a way to break the layer of secrecy. The barrier is however vast and so far police haven’t spent that much effort on piracy because it isn’t a serious crime in the eyes of the law. And I don’t foresee that they will for many years.

    It’s also far more accessible than say Usenet and VPN+private trackers. Which is a very good thing for privacy in general.



  • That’s what I’m saying. It’s like everyone knows some college kids smoke pot from the smell in the dorms, but Police can’t legally search room by room to find out who it is, they need a search warrant which they need more than a general suspicion that someone in the dorms smoke to get.

    Same with I2P, it’s done in a public setting so from traffic patterns we can be pretty sure someone is downloading a shit ton, and that it’s likely illegal content. Residential IPs have little reason to consistently download several GB files on a daily/weekly basis, streaming and download also look vastly different profile wise and at least no one I know of go to those lengths to try and mask their traffic patterns by trying to make streaming look like download or vice versa.

    But as I said and you reiterated, you still need to crack the encryption to actually prove it in court. But given a specific target there are many ways to do that. A generic approach is likely not going to happen. Which means that I2P is secure much like having a secret chat in a crowded place like Grand Central Station in NY. You know that people are meeting there to chat about illegal stuff but you don’t know who. It becomes much easier if you know who to follow and eavesdrop on, but of course still not easy.

    It is however nowhere near as safe as communication over channels that aren’t public to begin with. But such of course do not exist outside military and other special contexts.









  • Yes, which is exactly what I’m stating. Showing a forcibly non-upscaled video (or one where you’ve manually tweaked the upscaling for that matter) is likely not what you want because there are no circumstances where that is what you’d watch on that particular screen. It could perhaps work as an example of how that video would look if you had a 1080p monitor of the same size instead of the 4k one you have, since it scales in a linear fashion, a pixel of 1080p is 4 pixels in a square on a 4k screen. But that’s likely not what you want to test. Instead the thing you do want to test is “does it matter if I download X content in 1080p or 4k? How big is the difference really?” And if that is the question you need to let it upscale.



  • Tell them to move to yubikey or similar hardware key which is far more secure than any password policy will ever be and vastly more user friendly. Only downside is the intense shame if you manage to lose it.

    The key should stick with the user thus not be stored with the computer when not in use. The key isn’t harmless of course but it takes a very deliberate targeting and advance knowledge about what it goes to and how it can be used. It’s also easy to remote revoke. If you’re extra special paranoid you could of course store the key locked at a separate site if you want nuclear codes levels of security.



  • Yes.

    Microsoft To-Do has most of the features requested here (but is not open really) and I’ve tried to use it extensively but for anything that’s not one-off it doesn’t really work because the problem isn’t generally remembering that you need to clean, pay bills etc it’s actually doing it.

    To-Do software only really works for the things you forget, like buy ingredients to make a birthday cake or setup that ladder service in your selfhosted setup to go around pay walls in a more automated fashion.

    For app supported habit forming there are some gamification apps that some friends swear by but they’ve never really done it for me. For me the only thing that works is cultivating discipline by… Just fucking doing it, no matter what I feel.


  • I think a VPS and moving to NetBird self hosted would be the simplest solution for you. $5 per month gives you a range of options and you can go even lower with things like yearly subscriptions. That way you get around the subdomain issue, you get a proper tunnel and can proxy whatever traffic you want into your home.

    As for control scheme for your home automation you’ll need to come up with something that fits you but I strongly advise against letting users into Home Assistant. You could build a simple web interface that interacts via API with HA, through Node-Red is super simple if it seems daunting to build the API.

    If a RPi 4 is what you’ve got and that’s it then I guess you’re kinda stuck for the time being. Home Assistant is often quite lightweight if you’re not doing something crazy so it runs well on even a RPi 3, same with NAS software for home use, it too works fine on a 3. If SBC is your style my recommendation is to setup an alert on whatever second hand sites operate in your area and pick up a cheap one to allow you to separate things and make the setup simpler.


  • That’s one part of it, but the other is that there’s no proper way to ensure you won’t cause issues down the line and it makes the configuration unclean and harder to maintain.

    It also makes your setup dependent on seemingly unrelated things. Like the certificate for the domain which is some completely different applications problem but will break your Home Assistant setup all the same. That dependency issue can be a nightmare to troubleshoot in some instances, especially when it comes to stuff like authentication. Try doing SSO towards two different applications running on different subpaths on the same domain…


  • ninjan@lemmy.mildgrim.comtoSelfhosted@lemmy.worldI love Home Assistant, but...
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    2
    ·
    11 months ago

    I can’t grasp your use case I feel, pretty much all your complaints seem… odd. To me at least.

    First subdomain. I think HA is completely right that proxy with a subpath is basically an anti-pattern that just makes things worse for you and is always a bad idea (with very few exceptions).

    As for your tunnel I don’t know how you’ve set it up and I haven’t used tailscale but them only allowing one domain sounds like a very arbitrary limit, is it something that costs money to add? I use NetBird which I selfhost on my VPS and from there tunnel into my much beefier home setup.

    Then docker in HAOS. The proper way I feel of running HA is for sure HAOS, and also running it in its own VM / or on dedicated hardware. This because you will likely need to couple additional hardware like a stick providing support for more protocols like ZigBee or Matter. It really isn’t a good solution for running all your self hosted stuff, and wasn’t ever intended to be. Running Plex in HA for instance is just a plain bad idea, even if it can be done. As such the need for an external drive seems strange as well. If you need to interact with storage you should set up a NAS and share over SAMBA. All this to say that HA should be one VM/Device, your docker environment another VM.

    As for authentication there are 10k plus contributors to Home Assistant yearly but very few bother to make authentication more streamlined. I would’ve loved OpenID/OAuth2 support natively but there are ways to do so with custom components and in the end I quite strongly feel that if the end-users of your smarthome setup (i.e. the wife and kids) need to login to Home Assistant then you’ve probably got more work to do. Remote controls which interact with HA handle the vast majority of manual interaction and I’ve dabbled with self-hosted voice interfaces for the more complex operations.

    Sorry if this came across as writing you on the nose, that’s not my intention. I just suspect you’re making things harder for yourself and maybe have a strange idea around how to selfhost in general?