versionc

joined 2 weeks ago
[–] versionc@lemmy.world 7 points 20 hours ago (1 children)

A growing minority wants to avoid investing in US big corp, or in anything US related in general given the current political situation.

I'm definitely one of those people but there just aren't that many alternatives. Like I said, I did consider Fairphone, but there were so many cons to their devices that it's just not a reasonable choice for me personally. Which is unfortunate.

Thanks.

[–] versionc@lemmy.world 2 points 20 hours ago (1 children)
[–] versionc@lemmy.world 1 points 20 hours ago (4 children)

I wouldn’t trust any device made by them, regardless of the OS.

What device would you trust?

Edit to say you are basically just rewarding their behaviour.

That's a good point and it's one I've been considering. I would've bought a second-hand phone if it weren't for the fact that the second-hand market in my country is so bad to the point it's not even worth considering.

[–] versionc@lemmy.world 4 points 21 hours ago (2 children)

Thanks for the response!

Currently, the Pixel 10 goes for 600€ including taxes, while the Pixel 9a goes for 370€. Both are on sale right now. The iPhone 17 and the Samsung S26 meanwhile both go for 1015€ and 1106€, respectively, just for price comparison. Would you still go with the 9a over the 10 in this case?

[–] versionc@lemmy.world 24 points 1 day ago (24 children)

I'm gonna have to replace my phone soon since it doesn't receive security updates any more and I was thinking of going for GrapheneOS. What do you guys think about getting a Pixel 10 for that purpose? My second choice would be an iPhone but it's both a lot more expensive and also less privacy respecting.

I was also considering a Fairphone but despite rating the repariability highly, there were too many other cons to the device.

[–] versionc@lemmy.world 2 points 1 day ago

Aren't there alternative stores for iPhones in the EU and Japan?

[–] versionc@lemmy.world 2 points 4 days ago

There doesn't seem to be any improvements in how GNOME handles multiple monitors so it's still not a viable option for me. But I guess it's nice to see them implementing features other users want.

[–] versionc@lemmy.world 1 points 1 week ago

That's a great watch, highly recommended.

[–] versionc@lemmy.world 4 points 1 week ago (2 children)
[–] versionc@lemmy.world 12 points 1 week ago (4 children)

as far as I know, there is no way to put a valid certificate like let's encrypt for a service that is not accessible from the net

There definitely is. All of my local services run on a wildcard cert that I got from a DNS challenge with Let's Encrypt. As long as the reverse proxy can access whatever source is issuing the certificate, and as long as the client browser can access public certificate ledgers and has DNS info about your services, things will work just fine locally.

I recommend Netbird to give access to services to your family members, for access control and for the DNS server it provides. It also gives you the bonus of accessing your services remotely.

Feel free to ask if you have any questions.

 

What do you use for syncing your password manager between your Android phone and your PC? Apparently Nextcloud doesn't support two-way syncing on Android for some reason, and Syncthing-Fork is still untrustworthy since the disastrous handover. The AI generated profile picture of researchxxl doesn't exactly inspire confidence either, neither does his GitHub bio:

Hi! My name is Jonas and I like to use my coding skills from games and modding to continue work on the Syncthing for Android wrapper.

Everything about this person screams vibe coder.

Bitwarden is an alternative, but I don't like how non-standard it is. It's cumbersome to manage and backup, meanwhile the KeePass format is just a file that I can backup wherever and however I want and there are many frontends to choose from.

Have you solved this?

 

Hello!

I've spent a lot of time struggling with Hetzner's KVM console, there are a lot of problems causing severe issues with setting up passwords and passphrases. I just thought I'd create this "guide" to get things rolling, for everyone who faces the same issues I've faced.

Step 1 - Firewall

Set up a firewall and only open port 22 with your IP (you can look it up using ip.me).

Step 2 - Installation

Perform the installation procedure as normal, setting very simple passwords and passphrases for the user accounts and the disk encryption. Set them to something like 123. These will be changed later!

I'm using Debian 13, the steps may or may not be the same for your choice of distribution.

Step 3 - SSH access

Unmount the ISO and reboot. Enter the console again, log in as root with your simple password. Now, if you have the same problem as me, keys like /, CTRL etc. won't work, so I used tab completion and vi to to modify the config file.

# cd ../etc/ssh/
# vi sshd<TAB>

Inside vi, press o to create a new line and enter insert mode. Add:

PermitRootLogin yes
PasswordAuthentication yes

Press ESC and then <SHIFT>-yy (so holding shift and pressing y twice). This will save the file and exit vi. Restart the SSH services:

# systemctl restart ssh sshd

Step 4 - Dropbear

ssh into your VPS. Now you have full keyboard access like usual. Install dropbear-initramfs, which is an SSH server that's placed in the initial RAM filesystem so that you can ssh into your VPS during start up so you can easily enter your encryption passphrase.

Generate a new key pair and add the public key to /etc/dropbear/initramfs/authorized_keys

Run update-initramfs -u and reboot. You should now be able to ssh into your VPS using the key you just generated. The following command lets you unlock the encrypted disk:

cryptroot-unlock

This will probably disconnect you from the tunnel, simply re-establish the SSH tunnel again.

Step 5 - Changing passwords and passphrases

To change the encryption passphrase:

# cryptsetup luksAddKey /dev/sdXY
# cryptsetup luksRemoveKey

Lock the root user and change the password of your user (don't forget to add the user to the sudo group!):

# passwd -l root
# passwd user

Done!

At this point you might want to use some other means to access the server, such as Netbird or Tailscale or Wireguard. Regardless of how you decide to access the server, you should revert the changes to sshd_config.

P.S.

I have no idea if this is a secure or good way to do this. Use at your own risk!

 

Hello!

I've been playing around with self-hosting for a while now and I've started moving over to a VPS. At home I have a PC that's on more or less 24/7 with an *arr stack, jellyfin and some other services. They can only be accessed through Netbird. The services aren't that important, the data doesn't really need to be backed up since it's not very important. On the VPS, however, I would like to host some more critical services, such as:

  • Vaultwarden
  • Immich
  • Gitea
  • Overleaf

I want them available 24/7, even if I decide to distrohop and wipe my PC at home. The problem is how to structure all this. My current idea is to run Gitea and Overleaf out in the open behind some reverse proxy without authentication (Nginx or Nginx Proxy Manager). I'd like Vaultwarden and Immich to be on the same VPS, but, I don't want those services to be accessible to anyone but me, so I'd need some form of ACL or authentication system. I'm thinking of using Netbird for this, since I already use it on all of my devices.

So I would set up DNS records from within Netbird that would point immich.domain.tld and vaultwarden.domain.tld to the internal Netbird IP of the VPS. In the reverse proxy, I'd set up access control such that it only redirects the Netbird IP range to those services. On Cloudflare, I'd point git.domain.tld to the external IP of the VPS with proxy enabled.

Everything would receive HTTPS certificates, and I'd block incoming traffic on every port except for 80 and 443.

Is this a good setup? Any tips or recommendations? Any pitfalls?

Thanks!

view more: next ›