• 0 Posts
  • 4 Comments
Joined 2 years ago
cake
Cake day: November 16th, 2023

help-circle
  • I’ll share my experience with my very unprofessional but working setup.

    I have two locations, both using retired PCs. I don’t need anything fancy, but some considerations could be GPU/encoding hardware if you wanted something like jellyfin/Plex. I use proxmox and proxmox backup server for managing everything and so far it’s been working well. Definitely not plug and play like an aio nas but that’s because a nas wasn’t my only goal as I needed cameras (frigate) and homeassistant.

    I would highly recommend headscale/tailscale (as others have suggested) as it “just works” when setup in my experience. This enables safe remote access without opening any ports on your families networks so you can troubleshoot if something did break.

    Regardless of which solution you decide to use, the most important part about having a backup is testing. If you can’t see when your backups fail or don’t know how to recover you may as well not have a backup.



  • I mean the joke is the subversion of gender roles, reversing it just makes it not funny.

    The dev joke is fine, clearly that’s not a vibe coder but a developer who is lazy and wants job security. It’s just funny the contrast between the fields (especially since it’s much more harmful to the artists with the stealing of the art).

    I love to hate on things but it’s just not that serious. If you don’t like it that’s fine but the quality doesn’t seem to be in freefall


  • That is the correct way of thinking, never trust anything with your passwords.

    I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the “SHA-1” hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of 35 hash characters:number of breaches

    If any of these hashes are the start of your original hash, you now know it’s exposed and how many times it’s been exposed.