[-] [email protected] 2 points 10 hours ago

That's exactly what I do

[-] [email protected] 2 points 10 hours ago

Dark souls, Bloodborne

[-] [email protected] 1 points 22 hours ago

That is indeed a disadvantage of PGP. Unfortunately, it is the most portable method of encryption text at rest at the moment. The moment somebody manages to figure out a way to use the Diffie-Hellman algorithm in a portable manner, I'm sure a lot of people will consider that a viable alternative. Till then, learn about disk encryption to keep your keys safe

[-] [email protected] 1 points 22 hours ago* (last edited 22 hours ago)

I2p states on there website that it has potentially serious weaknesses.

The only relevant pages I found are I2P's threat model and the comparison between I2P and TOR:

Please cite your sources so everyone can understand the reasoning for your claims of I2P being weaker than TOR.

Oh, and A LOT of the attacks mentioned in the page on threat models is/was possible on TOR. The I2P project follows TOR carefully and implements some of their features/mitigations too.

If we're talking specifically about brute-force DDOS, BOTH TOR and I2P faced these issues. The good thing about I2P is that it is more decentralized than TOR which can sometimes make it easier to mitigate.

Your points about I2P's directory (not sure what you mean by DNS here) can be lumped together with your complaints about usability. This DOES NOT make TOR inherently more private, secure and anonymous than I2P, it just means that somebody on Windows can download the TBB and start browsing (in albeit a not-very-secure way). Unless you missed the news, I2P now has a slick Windows installer so people don't have to fiddle too much with it.

You're going to have to give me evidence for me to believe that using I2P makes a substantial dent in your available bandwidth. Yes you're a router in the network but it doesn't mean that you're passing through traffic at GB/s speeds.

i2p is somehow a replacement for Tor

I never said that. Again, I'm not comparing I2P and TOR based on their usability (which has changed in the recent years), I'm comparing them in terms of anonymity on the wider internet when browsing using either protocol. Both TOR and I2P are great projects, the problem is that TOR is significantly more centralized.

However, if you are in a critical situation use Tor not i2p as today it is the best for bypassing censorship while still trying to stay safe.

Cite your sources for this. This is mere conjecture unless you have proof of metadata leakage on I2P but not on TOR/actual people getting caught using I2P but being safe on TOR. I'm sure the I2P Devs would be very interested too. If you're in restrictive regimes like Iran and China where TOR/I2P traffic is flagged - use a bridge or a VPN disguised as HTTPS traffic and hope for the best (it's a perpetual cat and mouse game).

Again, please cite your sources when making claims about technical shortcomings of I2P

[-] [email protected] 1 points 23 hours ago

Shared key???? PGP works on a public-private key-pair, and unless you're giving out your private key, it's not shared with anyone. This is blatant misinformation

[-] [email protected] 3 points 1 day ago

I've been using vi (just the basics) for ~4 years, I don't think I could be arsed to pick up the keybindings the other way around lol. I've heard very good things about Helix, of course

[-] [email protected] 2 points 1 day ago

Use OpenVPN configured to look like HTTPS if you really need it. I2P is meant to be its own network, not a gateway to the clearnet. I still do not see how it has less measures in place for privacy and anonymity.

[-] [email protected] 6 points 1 day ago* (last edited 1 day ago)

TOR is obvious too to someone snooping on your network, unless you're using bridges (and that's hit or miss). If you don't want someone to know you're using I2P, use OpenVPN and mask your traffic as HTTPS.

You're going to have to explain better about "I2P not masking your traffic" and especially about "someone identifying you" - timing attacks are possible in both cases and the I2P Devs have mitigations against it. Please provide sources which define how I2P is weaker and more susceptible to TOR against network forensics

[-] [email protected] 21 points 1 day ago* (last edited 1 day ago)

I would like for these people to never retire but we must all accept change as they come from father time

[-] [email protected] 7 points 2 days ago

Confirmed the troll.

From the FAQ:

Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.

It may be dangerous to use I2P in what the project calls "Strict Countries"

Most I2P peers are not in those strict countries and the ones that are, are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers.

Unlike Tor, "exit nodes" - or "outproxies" as they are referred to on the I2P network - are not an inherent part of the network. Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. There are very, very few of these.

There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy.

If you are hosting something sensitive, then your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to real-world events could probably de-anonymize you with enough effort.

I2P has defenses available against this like multihoming or Tahoe-LAFS

I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination.

In addition, you may be vulnerable to collusion between the outproxy operator and operators of other I2P services, if you use the same tunnels ("shared clients").

In theory, if you're accessing the clearnet, then it is no better or worse than TOR. It is a little better if you're stay in I2P land.

Don't listen to me or him. If you're reading this, go to the FAQ (https://geti2p.net/en/faq) and make your own decisions.

[-] [email protected] 22 points 2 days ago

If I understand correctly, stream isolation will route different connections through different circuits. If you're doing two different things of a sensitive nature, open different browsers and applications, use random user-induced delays in your actions/responses and PGP-encrypt everything. And listen to what the TOR project says about the mitigations. I have some reading to do myself I guess

58
submitted 3 months ago by [email protected] to c/[email protected]

I don't have spare peripherals like a monitor and a keyboard. How do you suggest I do a bare-metal install of Debian on a computer (meant to be a server)?

20
submitted 3 months ago by [email protected] to c/[email protected]

Hi everyone,

This would seem to be a basic question (I've been on this for a few hours and can't seem to get it working).

This is my file for my pod:

$ cat backup.pod

[Unit]
Description=backup pod

[Pod]
Network=slirp4netns:port_handler=slirp4netns
PodmanArgs=--userns=auto:size=10000
PodName=backup

And this is the file for my container which is supposed to be part of the pod:

$ cat backup.container

[Unit]
Description=backup container

[Container]
Image=docker.io/debian/debian:latest
ContainerName=backup-container
Entrypoint=/bin/bash
Exec=/bin/bash -c "apt-get update -y && apt-get upgrade -y && apt-get install rclone vim -y && exec bash"
Pod=backup
GlobalArgs=-d -t

[Service]
Restart=always

[Install]
# Start by default on boot
WantedBy=multi-user.target default.target
  1. Podman's systemd-generator doesn't seem to create any service file for backup.pod in /run/user/$(id -u user). I do see a service file for backup.container, backup.service.
  2. Regardless, systemctl start backup.service errors out anyway.

I'm unable to understand how to use quadlet from the documentation. AFAIK I did everything they asked (https://docs.podman.io/en/latest/markdown/podman-systemd.unit.5.html).

The primary reason why I tried this was because I couldn't figure out how to create a pod using compose.yaml either. If someone has answers to these questions, they would be much appreciated!

Thanks!

19
submitted 3 months ago by [email protected] to c/[email protected]

publication croisée depuis : https://lemmy.world/post/16156662

To be completely open, this is not a question about XCP-ng vs Proxmox. I'm open to doing everything in the cli, comparing two platforms is not my intention here.

I'm very interested in the security benefits one has over the other though. AFAIK Xen has a dedicated for security? I'd like to think that both are reasonably secure by default, but I do not get many hits for "KVM hardening", for example, only OS-level hardening advice.

Do both protect equally against attacks that try to escape the VM? Is there anything in terms of security that one has and the other doesn't?

I know this is not the usual kind of question that is asked on this sub, any help is greatly appreciated!

22
submitted 3 months ago by [email protected] to c/[email protected]

To be completely open, this is not a question about XCP-ng vs Proxmox. I'm open to doing everything in the cli, comparing two platforms is not my intention here.

I'm very interested in the security benefits one has over the other though. AFAIK Xen has a dedicated for security? I'd like to think that both are reasonably secure by default, but I do not get many hits for "KVM hardening", for example, only OS-level hardening advice.

Do both protect equally against attacks that try to escape the VM? Is there anything in terms of security that one has and the other doesn't?

I know this is not the usual kind of question that is asked on this sub, any help is greatly appreciated!

3
submitted 4 months ago by [email protected] to c/[email protected]

cross-posted from: https://lemmy.world/post/15706364

Transparent compression layer on Linux?

My use-case: streaming video to a Linux mount and want compression of said video files on the fly.

Rclone has an experimental remote for compression but this stuff is important to me so that's no good. I know rsync can do it but will it work for video files, and how I get rsync to warch the virtual mount-point and automatically compress and move over each individual file to rclone for upload to the Cloud? This is mostly to save on upload bandwidth and storage costs.

Thanks!

14
submitted 4 months ago* (last edited 4 months ago) by [email protected] to c/[email protected]

My use-case: streaming video to a Linux virtual mount and want compression of said video files on the fly.

Rclone has an experimental remote for compression but this stuff is important to me so that's no good. I know rsync can do it but will it work for video files, and how I get rsync to warch the virtual mount-point and automatically compress and move over each individual file to rclone for upload to the Cloud? This is mostly to save on upload bandwidth and storage costs.

Thanks!

Edit: I'm stupid for not mentioning this, but the problem I'm facing is that I don't have much local storage, which is why I wanted a transparent compression layer and directly push everything to the Cloud. This might not be worth it though since video files are already compressed. I will take a look at handbrake though, thanks!

30
submitted 4 months ago by [email protected] to c/[email protected]

Hi everyone,

As always, every time I look at the AWS Glacier egress fee calculator I get fairly irked at how much they charge. Was wondering if anyone knew of any alternatives for cold storage in the cloud without such egregious charges. I will likely not access it ever because I have another offset backup, but just in case I do, I wouldn't want to fork over thousands, really.

I don't know how reliable Scaleway's service is, and Cloudflare's R2 doesn't have a Archive offering. I would be interested in the Azure if anyone can convince me that I won't go bankrupt trying to retrieve my data from them. I don't want to go with Google with the recent stuff they have been doing with data on their servers.

Thanks!

21
submitted 4 months ago by [email protected] to c/[email protected]

Hi, I was planning to encrypt my files with GPG for safety before uploading them to the cloud. However, from what I understand GPG doesn't pad files/do much to prevent file fingerprinting. I was looking around for a way to reliably pad files and encrypt metadata for them but couldn't find anything. Haven't found any recommendations on the privacyguides website either. Any help would be appreciated!

Thanks

21
submitted 4 months ago* (last edited 4 months ago) by [email protected] to c/[email protected]

LocalMonero is shutting down. How do you plan to do fiat<->XMR now? Do you just keep the addresses and accounts of traders on file and keep going? What about people who haven't started exchanging fiat for XMR yet?

Thanks

14
submitted 5 months ago by [email protected] to c/[email protected]

publication croisée depuis : https://lemmy.world/post/14573897

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

4
submitted 5 months ago by [email protected] to c/[email protected]

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

20
submitted 5 months ago by [email protected] to c/[email protected]

I'd like to be able to contribute financially to people/communities who run infrastructure, such as nodes, for layers like I2P and Freenet. Where do I find them, and does contributing directly to the projects themselves help in this regard?

Thanks!

view more: next ›

MigratingtoLemmy

joined 1 year ago
MODERATOR OF