• 0 Posts
  • 136 Comments
Joined 4 years ago
cake
Cake day: January 17th, 2022

help-circle



  • I recommend a different consideration than the usual design, battery life, OSHW, etc : connectivity.

    So typically you get BT but that’s not enough, you need a bit more since it’s not a well recognized device, unlike e.g. headphones. Typically you would need a companion app, for GrapheneOS, Android more broadly, iOS or a Linux phone. This is where GadgetBridge comes in. The goal of the project is to… bridge gadgets that are not standalone. Instead of having a myriad of (usually proprietary) apps that basically all do the same thing (pair, configure, handle notifications both ways) have 1 that does it for all such device.

    From that standpoint, namely GadgetBridge support, at the moment the recommendation is Pebble (which is how the project started) or PineTime.

    PS: I personally have a Pebble (with hardware issue, so not sure were), a PineTime (also hardware issue, touch on screen AFAIR) and finally a Watchy and… honestly I don’t wear any anymore. I don’t get enough benefit from it as typically I have a phone nearby and when I don’t it means I do NOT want notifications.








  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    2
    ·
    16 days ago

    Thanks, it’s quite interesting but again IMHO it relies on bad practices. If you’ve been compromised and you “restore” (not in an sandboxed environment dedicated to study the threat) then you are asking for trouble. I’ll read a bit more in depth but the timeline I see 1987, 1998, 2017 show me this is a very very niche strategy, to the point that it’s basically irrelevant. Again it’s good to know of it, conceptually, but in practice proper backups (namely of data) remains in my eyes the best way to mitigate most problems, attacks and just back luck (failing hardware, fire, etc) alike.


  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    2
    ·
    16 days ago

    That doesn’t make much sense to me, one backup data, not executables or system. Even if they were to be saved in the backup then they wouldn’t get executed back.

    Anyway, that’s still conceptually interesting but it’s so very niche I’d be curious to hear where it’s being used, any reference to read on where those exist in the wild?



  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    2
    arrow-down
    4
    ·
    edit-2
    16 days ago

    Nothing needs an antivirus if you backup your data properly.

    PS: I’m getting downvoted for this so I’ll explain a bit more : if you backup properly, you can restore your data. Sure your system is fucked… but who cares? In fact if you care for your OS installation then right away it shows you are NOT in a reliable state. You install another OS and start from there. Maybe it’s not even due to a virus, maybe your hardware burns in fire, same situation so IMHO a working backup (and by working I mean rolling, like TODAY it’s done without your intervention) then you restore. Also please don’t tell me about ransomware because even though it is a real threat, if you do your backups properly (as in not overwritting the old ones with the new ones) then you are still safe. It can be as basic as using rdiff-backup. It’s fundamental to understand the difference between what’s digital and what is not digital.



  • I setup WireGuard only last week so maybe I’m the one who misunderstand something : on your LAN assuming you are NOT using your router (or switch, or a networking device) to be a peer of the VPN, don’t you need to add each machine as a peer to the VPN? Also doesn’t that leave the most granularity so that the (root) user of each machine can chose to be on/off and more, e.g. split tunneling?



  • Because it’s low end I’d put :

    • headless Debian pre-configured with WiFi and sshd to then add
    • CopyParty via its single .py file
    • apt install minidlna to serve media files back to add devices on LAN, e.g. VLC on desktop and mobile devices
    • mount a large microSD for data
    • I’d add a WireGuard VPN configuration file and make both accessible outside the LAN but only on my devices

    All that is relatively quick if you have done it before (maybe 30min total) and can run 24/7 for years requiring very little power.



  • Typically my debugging process goes like this :

    • error message? Search for it online with the most unique keyword that aren’t machine specific
      • solutions provided?
        • solution understood? try it then loop back, writing notes in own wiki
        • solution not understood? bookmark it then try understood solutions first, if not try and loop back
    • no error message?
      • find where the error message is!
        • what actually produce the error from the top of the stack? end-user software? service? kernel? hardware? where do they put logs?
          • if logs exist and verbosity is not sufficient, increase verbosity and reproduce the problem
      • if no verbose enough error message can be obtained, repeat the situation in various conditions
        • does any condition make it work?
          • search on the difference between the working and non-working condition
        • backtrack one layer up the stack, e.g. if end-user software does not change, try service, etc
          • does this one provide logs?

    So… it’s basically always the same, namely try the lazy way (error log search) and if that’s not enough, try further down the stack or more unknown BUT always get information out the try.

    TL;DR: I have no idea but if another new machine (e.g. phone) can connect then DHCP works. FWIW NetworkManager logs are in journalctl -u NetworkManager and you can manually add/remove Ethernet connections. I’d physically unplug then plug back the cable with WiFi disabled.