• 0 Posts
  • 39 Comments
Joined 2 years ago
cake
Cake day: July 12th, 2023

help-circle

  • I’m far from an expert and have never setup borg, but I see some possible problems with that config, though I don’t think I see anything that would cause it fail.

    • In the environment section of borg, borgmatic, and borgweb, the “BORG_PASSPHRASE” variable is used inconsitently, it either needs to be uncommented in borg or commented out in borgmatic and borgweb.

    • Networks: having a single “backup_net” network is less than ideal from a security standpoint. Nginx should probably be in it’s own network (an ipvlan or macvlan network) in addition to the backup_net. backup_net should be isolated to the host that are running borg, while any communication into borg should be routed through nginx on its ip.










  • used to go once a month or so, but then covid lockdowns happened and the barber I liked actually complied with the regulations (which is a good thing), which made it more inconvenient than I though it was worth to get a haircut. At first I figured I’d go back once things started returning to normal, but then that took a while and I never did. So, I haven’t gotten an actual haircut in almost six years.

    I did start getting the ends cleaned up every six months or so about a year ago though.


  • If they’re considering optical media, typical BD-R, while viable, may not be be the best choice. BD-R M-Discs would probably be a better choice for backups. Especially if they’re planning on needing access to the data over a period of decades, which would be potentially useful for familiy photos/videos and critical documents.

    They are more expensive, as is the drive needed for them, but not by enough to be out of reach or even unreasonable given the additional durability of the discs.





  • One rule of thumb for cybersecurity is that if an attacker has physical control over your device for any period of time you should treat that device as if it is already compromised, because that is how generally easy it is to compromise something you have physical access to.

    However, do you actually have reason to suspect your roommate of being an attacker? Just because they have a degree, a job, and maybe some level of skill doesn’t mean they have the motivation, lack of integrity, and criminal intent to actually carry out such an attack.

    If you’re concerned about something like that, there are things you can do to mitigate risk, like setting start up passwords, using disk encryption, powering off devices you’re not actively using, and physically securing unattended devices. However, basically nothing you can reasonably do will stop a determined attacker if they live with you and thus have or can easily gain physical access to your devices.


  • I’ve tried submitting recategorization requests through the links provided by my workplace on the block pages. The requests have been denied.

    If I’m remembering right, it’s a Symantec web filtering solution that we use and they’ve decided that my domain is in the “personal blog” category. Which is a blocked category. Jeff Geerling’s website actually falls under the same category, which also kind of sucks, because I like reading some of the stuff he puts out.


  • pretty much the only reason I still use Plex is because I like to be able to watch stuff during downtime at work and plex.tv isn’t blocked on the work network while my private domain is.

    And no, using a hotspot off my phone on a personal computer isn’t an option, both because the security requirements of my job site prevent us from using personal devices in the main area where I work and because the building itself is a massive concrete structure that blocks most cell signals.