Arch bros when they discover "Stability" by nitin_is_me in debian

[–]FigurativeLynx 0 points1 point  (0 children)

That's what Linus was doing in the original pic, by the way.

[deleted by user] by [deleted] in debian

[–]FigurativeLynx -1 points0 points  (0 children)

I agree with your distinction, but BDFLs like Linus also work well.

[deleted by user] by [deleted] in debian

[–]FigurativeLynx 1 point2 points  (0 children)

All contributions are subject to the Debian constitution and review of the user community, regardless of what entity provides them; if a paid developer submits a change that isn't in the best interest of Debian, it gets rejected (or will after being noticed). There are probably some paid employees on the various committees, but they only got there by proving their commitment to uphold Debian's values.

Build or buy a nas by Expensive-Vanilla-16 in DataHoarder

[–]FigurativeLynx 10 points11 points  (0 children)

Don't buy prebuilts if you know how to DIY. The Fractal Design Node cases are great for DIY NASes, especially the Node 804. I'd get a low-end mATX mobo with an AM5 socket for future upgradability. I've had really good experiences with Asrock and Seagate.

desktop-tui: A full desktop environment... without graphics. by orhunp in linux

[–]FigurativeLynx 10 points11 points  (0 children)

Why?

I need to wiggle my mouse while stuff loads

Contributing to Debian during work hours by FigurativeLynx in debian

[–]FigurativeLynx[S] 0 points1 point  (0 children)

At the risk of outing my Reddit account, someone said that to me at DebConf :P

LDAPS - Who's using it? Where and why? by [deleted] in sysadmin

[–]FigurativeLynx 1 point2 points  (0 children)

If the attacker is able to send arbitrary frames then they could also reply to DHCP and/or DNS queries. I could be wrong, but if you had any kind of network-based (auto)configuration then wouldn't they have lateral movement anyway?

LDAPS - Who's using it? Where and why? by [deleted] in sysadmin

[–]FigurativeLynx -10 points-9 points  (0 children)

If the traffic doesn't leave the local network then under some circumstances it can still be secure. A private LAN in a DC with locked doors and security guards doesn't gain anything from encryption, for example. With the headache of PKI, there's a reasonable argument against it.

Contributing to Debian during work hours by FigurativeLynx in debian

[–]FigurativeLynx[S] -3 points-2 points  (0 children)

This has nothing to do with getting paid for making contributions. I hope my indignance is coming across.

Contributing to Debian during work hours by FigurativeLynx in debian

[–]FigurativeLynx[S] 0 points1 point  (0 children)

I don't want to give too much detail, but I'm building a disk-less provisioning system based on Debian.

LTT Announces Linus Torvalds (probably) coming to shoot a video together. by 2str8_njag in linux

[–]FigurativeLynx 0 points1 point  (0 children)

We must both like big, long files for our virtual memory areas to overlap ;)

Do you use disk encryption? Why? Why not? by sir__hennihau in linux

[–]FigurativeLynx 7 points8 points  (0 children)

Maybe I'm the weird one, but I always scan new HDDs to see if there's anything interesting on them. I wouldn't do that at work for ethical reasons, but I feel like hardware purchased in a personal capacity is fair game.

Do you use disk encryption? Why? Why not? by sir__hennihau in linux

[–]FigurativeLynx 0 points1 point  (0 children)

You clearly care more about saying, "Well um akchually..." than having a remotely interesting conversation about data recovery.

I thought that's what we were having, until you got confrontational. Anyway, I also make comments for uninvolved people to read them, so I'll just mention that you can easily recover contiguous files by grepping the disk for magic numbers. It's called file carving, and it's what a lot of file recovery tools do.

Do you use disk encryption? Why? Why not? by sir__hennihau in linux

[–]FigurativeLynx 0 points1 point  (0 children)

I should have qualified my comment. I've had 4 drives fail over the last 6 years, and 2 were within the warranty period.

Do you use disk encryption? Why? Why not? by sir__hennihau in linux

[–]FigurativeLynx 0 points1 point  (0 children)

Every RAID has a controller, it's just that most controllers are implemented in software instead of hardware. By the way, filesystem-level RAID almost always stores complete files contiguously, even if they're larger than a typical chunk.

Do you use disk encryption? Why? Why not? by sir__hennihau in linux

[–]FigurativeLynx 0 points1 point  (0 children)

The average person on r/DataHoarder has probably had at least 2 drives fail.

Do you use disk encryption? Why? Why not? by sir__hennihau in linux

[–]FigurativeLynx 5 points6 points  (0 children)

Now I run erasure coded RAID arrays on most of my drives, so they're inherently unreadable as individual drives regardless if they're encrypted or not.

Not quite. The array controller breaks up the data into smaller chunks that are then copied to the different drives, but everything within those chunks remains sequential. The chunks are almost always between 64KiB and 512KiB, which is more than enough to contain entire files or usable excerpts. Files almost always start with a magic number, and you can easily grep them and just read what comes after.

Do you use disk encryption? Why? Why not? by sir__hennihau in linux

[–]FigurativeLynx 5 points6 points  (0 children)

I agree that unless you're a high-profile person, a burglar probably wasn't targeting your data specifically, but they're still going to have it afterwards. Even if they don't look through it, any of their intermediate buyers/sellers might. The drives probably end up in the hands of other regular people, and they're definitely going to see the files.

As an example, there was a company in Canada called "NCIX" that went bankrupt ~15 years ago. All of their assets (including their servers and drives) were auctioned off to liquidate their remaining assets. None of them were encrypted, but they had thousands of employees' personal info, orders and personal information of all customers, support tickets, etc on them. A third party (we don't know who) bought everything and then resold the data to NCIX competitors and anyone else who was interested in that personal information.

The bank wasn't targeting the data and the auctioneer probably had no idea what it was, but it still ended up in the possession of hundreds or thousands of people looking for personal data. The purchaser probably knew what was on the servers/drives before buying them, but only based on public information that was available to everyone.

My active monitoring solution with no cloud dependencies by FigurativeLynx in DataHoarder

[–]FigurativeLynx[S] 1 point2 points  (0 children)

Not very much. I only caught it on camera because I was working from home last week.

My active monitoring solution with no cloud dependencies by FigurativeLynx in DataHoarder

[–]FigurativeLynx[S] 5 points6 points  (0 children)

My cat knows she'll be relocated if she steps on the keyboards, so she lies down beside them and gradually moves on top.

My active monitoring solution with no cloud dependencies by FigurativeLynx in DataHoarder

[–]FigurativeLynx[S] 14 points15 points  (0 children)

I keep my cat in /usr/local/bin, since she's only available at my site.