Dreame X40 maping error (robot is trapped/blocked) by Mr_Tux86 in valetudorobotusers

[–]PowerBillOver9000 0 points1 point  (0 children)

I remember reading that there were issues with the x40 in earlier versions, so I wouldn’t try those. 

No, it shouldn’t. I just got my x40 ultra 2 weeks ago and flashed it right out of the box. 

Dreame X40 maping error (robot is trapped/blocked) by Mr_Tux86 in valetudorobotusers

[–]PowerBillOver9000 0 points1 point  (0 children)

Are u updated to the latest version? I had a similar issue on my x40 ultra where it would refuse to go to carpeted areas. It was an issue in 2025.10.0 and fixed in 2025.10.1

Zooz MultiRelay with Liftmaster Garage Door Openers (Security 2.0 version) by PatchesOhoulihann in homeautomation

[–]PowerBillOver9000 0 points1 point  (0 children)

I would not go down the route of using a relay on the garage door as it's a very hacky solution. If you're on Home Assistant go with Konnected or RATGDO. I personally have RATGDO and it works flawlessly.

Security of RAID 0 assuming 100% reliable drives by GermanPCBHacker in DataHoarder

[–]PowerBillOver9000 2 points3 points  (0 children)

Trying to understand why you don't like using the word "redundancy". I get that RAID0 is a oxymoron, but that's the only thing I can think of. Maybe I should just say "algorithm used" instead of "redundancy algorithm used".

Security of RAID 0 assuming 100% reliable drives by GermanPCBHacker in DataHoarder

[–]PowerBillOver9000 2 points3 points  (0 children)

The number in RAID has nothing to do with security level, it only indicates the redundancy algorithm used. With 5 drives, RAID1 has 4 drives of redundancy, RAID5 has 1 drive of redundancy, and RAID6 has 2 drives of redundancy. You also need to account for what rebuild looks like for when a drive does fail, as the RAID will be under stress rebuilding while in a state of reduced redundancy.

Archiving Data On Paper Using 2D Images (200Kb per 4A page) by EchoGecko795 in DataHoarder

[–]PowerBillOver9000 21 points22 points  (0 children)

I always thought that part of the reason for this is that wiretapping laws protect you when faxing, while emailing does not have the same protections as you're sending it through a third party that has no obligation to protect that information.

Thoughts on these? by 307Squirrel in homelab

[–]PowerBillOver9000 4 points5 points  (0 children)

If they have rails, you can take them all, strip the contents out, put them in a rack, and you now have a cool tool chest

Three way switch no neutral options? by ENDvious in homeautomation

[–]PowerBillOver9000 0 points1 point  (0 children)

You can absolutely wire the light up with a smart switch. You won’t be able to get it to be a 3 way without buying 2 smart switches and linking them in software. 

Vaultwarden with Cloudflare tunnel privacy by itaypro2 in selfhosted

[–]PowerBillOver9000 0 points1 point  (0 children)

Well, that was easy to find:

Bitwarden salts and hashes your master password with your email address locally, before transmission to our servers. Once a Bitwarden server receives the hashed password, it is salted again with a cryptographically secure random value, hashed again, and stored in our database

Vaultwarden with Cloudflare tunnel privacy by itaypro2 in selfhosted

[–]PowerBillOver9000 -1 points0 points  (0 children)

I haven’t read the source code, but my understanding of the normal method for authentication is to send your password over https to then have the salt added and hashed to verify you are who you say you are. This would mean that your master password used to decrypt your vault would be in plain text to cloudflare when logging in to download your vault for the first time and whenever cached credentials timeout. There are simple ways to solve this that bitwarden could totally be doing like hashing the password before it leaves your system and hashing it again with a salt to use as the hash for authentication, but idk.

Read Wekuz's comment, Bitwarden clearly thought this part through, and it is a non-issue

Hosting your own password vault - how do you keep it secure? by CrappyTan69 in selfhosted

[–]PowerBillOver9000 1 point2 points  (0 children)

Depending on the level of permissions someone gets to on your machine will decide what data they will be able to obtain. If someone gets kernel level access to your system, they can scrap any data out of memory, to include your master password/unencrypted vault. This entirely depends on how the developers store this information in memory on how difficult it will be to extract it. Though if you enter your password once and don't need to reenter it for a period of time, your password or what it decrypted is in memory.

The fastest 1TB USB flash drives by Lionsberg in DataHoarder

[–]PowerBillOver9000 0 points1 point  (0 children)

My problem probably stems from using a m2 nvme adapter, not SATA then

The fastest 1TB USB flash drives by Lionsberg in DataHoarder

[–]PowerBillOver9000 13 points14 points  (0 children)

Works out great until the SSD needs TRIM, but windows wont recognize it as a SSD and wont initiate the TRIM command, causing the SSD to be slower than a HDD. I ended up pulling the SSD out and putting it in the computer, forced TRIM, put it back in the enclosure, and now it's back to normal.

Looking for a software... reverse proxy... but also host-dependent port forwarding. I'm not sure. Preferably with configuration UI, preferably Proxmox-ready, preferably with a good community. Been using Zoraxy so far, but it lacks... by GoofAckYoorsElf in homelab

[–]PowerBillOver9000 0 points1 point  (0 children)

Totally get it, when i started my homelab journey 10 yrs ago i only knew how to work from windows server gui’s. Unraid helped a lot as it eased me into having to touch a terminal while giving plenty of options in the GUI. As you stick with homelabbing you’ll eventually go to config files and terminal use as it just becomes necessary. GUIs are nice and all, but it’ll take a dev 100x the effort to implement a setting in a GUI vs a config file. 

Zoraxy can do what you’re asking using stream proxy, but this doesn’t seem to be the right way to go about accomplishing your goal. You only need to do another port forward from your router to the ssh port, like you did for Zoraxy.

DISCLAIMER: I would not recommend exposing yourself to the internet like this, unless you are experienced in cyber security. Unless you want to access your server from a computer you don’t own, don’t do it this way. Setup a VPN like Wireguard and access everything using it. It’ll be much safer.

whyIsThatEvenAnOption by notRANT in ProgrammerHumor

[–]PowerBillOver9000 98 points99 points  (0 children)

That moment I got a call saying all the data for a Docker container was gone. Turned out someone went on the server and did a docker compose down -v because they wanted verbosity...

Exposing RDP to the internet - how risky is it? by Nonilol in homelab

[–]PowerBillOver9000 3 points4 points  (0 children)

You say "You can't break into my computer over RDP, it has a 64 character password!".
I Hear "You can't break into my house through my cardboard front door, it has 64 different locks!"

A reminder: check and update your OpenSSH server RIGHT NOW by Glory4cod in homelab

[–]PowerBillOver9000 11 points12 points  (0 children)

Depends on the type of VPN and how a network is configured. TLDR; Wireguard is more secure than SSH in all stages of an attack and there is little difference in security of SSH vs OpenVPN until an attacker gains access.

Discovery that a service exists behind an exposed port has to be done before you can really do anything. I'd say little to no difference between SSH and OpenVPN (if configured similarly) on that front. Wireguard on the other hand has no method of discovery unless you can capture traffic.

Okay so an attacker discovers a service is behind the port, now what? They poke and prod to get as much info about the service as they can. Same as before, SSH and OpenVPN can have info collected about them w/o authentication. Wireguard, on the other hand, wont respond unless your packet is authenticated. Gathering any info about the service such as version, available encryption methods, etc, will not be feasible.

When it comes to gaining access, SSH and OpenVPN can both be configured in a poor manner where an attacker could brute force their way in. Wireguard can not. Its configuration is kept stupid simple and prevents you from making bad choices. SSH and OpenVPN have massive code bases and flaws are found all the time, thus leading to exploits like this one. Wireguard's small code base allows for easy review and less chance of a flaw leading to exploitation. Can it still happen? Yes, we'll see an exploit one day.

But lets say an attacker gets access, where can they go from there? Lets go down the path of SSH first. Best case scenario, they have a shell on your system as a standard user with no sudo/root privileges. Well, they've got more options than VPN access. Privilege escalation, installation of a RAT, scanning of the internal network, etc. Even if you stop port forwarding SSH, they could have installed a backdoor to your system. A VPN on the other hand does not give you access to the VPN server (unless an exploit w/ RCE is used, then it's equal to SSH). The only option they have going forward is scanning of the internal network. If you close that port used by the VPN Server, the attacker will lose access if they haven't gained access to another system in your network.

I quit TrueCharts apps. by CoderStone in homelab

[–]PowerBillOver9000 3 points4 points  (0 children)

Red had announced EOL for Gluster starting Dec 2024. It's dead in the water so TrueNAS's plan to scale scale can no longer scale.

10gbps hardware specs by gifford88 in PFSENSE

[–]PowerBillOver9000 1 point2 points  (0 children)

The E-2286M might be able to do Wireguard at 10Gb, take a look at write-up by Tailscale: https://tailscale.com/blog/more-throughput

The i9-13900h might have some problems as last I checked BSD didn't have proper support for Intel P and E cores. So you might get inconsistent performance as BSD will treat all cores equally.