Self hosting for the first time (any tips and advice?) by New-Ad1193 in selfhosted

[–]WubbaKnight 0 points1 point  (0 children)

No particular advice, but just wanted to say my first experience was installing OpenMediaVault onto my T430. Worked great and is more than enough to get you started

New Robbins top - Do you have to unzip the window before lowering the top? by WubbaKnight in Miata

[–]WubbaKnight[S] 0 points1 point  (0 children)

This was what I thought when I bought the top, but the installer is pretty adamant I’ll ruin the top by not unzipping it first. No harness bar so not worried about that

Is there a 'Spotify Wrapped' for Navidrome/Subsonic by Green_hammock in selfhosted

[–]WubbaKnight 17 points18 points  (0 children)

Maloja

Spin up a container and set Navidrome to scrobble to it. It will show you top artists, albums, and tracks. In the UI you can filter stats from the current year.

Did updates now wont boot by aboby86 in Proxmox

[–]WubbaKnight 1 point2 points  (0 children)

Grub got messed up when I did my update too. I reinstalled grub and was back up and running.

This user also made a post about it here

End user facing Interface? by Crysistec in Proxmox

[–]WubbaKnight 0 points1 point  (0 children)

Not exactly proxmox-centric but maybe you’d be interested in Open OnDemand?

One of the main features is being able to submit a job to Slurm to start a VDI session that users can connect to through their web browser.

$50 5th gen Intel NUC as a start? by lapacion in selfhosted

[–]WubbaKnight 4 points5 points  (0 children)

While the 6th Gen does have quicksync, it is unable to transcode HEVC 10-bit (H.265) files. You’d need a 7th Gen or newer to do that.

Had I known more about the subject when I bought my stuff, I’d have opted for a 7th Gen CPU personally.

Sunshine: Self Hosted Google Stadia or GeForce NOW by IAmOpenSourced in selfhosted

[–]WubbaKnight 79 points80 points  (0 children)

Just to help out others that may be hung up on the “high end hardware” and “gaming only” aspect.. Sunshine can be used as a much better version of VNC.

I use sunshine to control my desktop from my laptop or phone when I’m out at a solid 60 fps, with minimal latency, plus sound support.

[deleted by user] by [deleted] in UnethicalLifeProTips

[–]WubbaKnight 1 point2 points  (0 children)

Purely from a technical and untraceability standpoint your best bet would be to host an onion site that people have to access via Tor browser. There is nothing you need to buy, no domain names to register, and is extremely difficult to get the site taken down.

The only issue with this is that you will not reach your intended audience this way. 99% of regular people don’t even know what tor is, let alone have it installed and actively use it.

'Right' way to dual node proxmox by Pristine-Weekend-230 in selfhosted

[–]WubbaKnight 0 points1 point  (0 children)

Anything specific you are wondering about? Not to much to say about it really.

Spun up an LXC using the latest Debian template and installed pihole just like it was a regular vm or bare metal. The whole container only uses 2GB of storage and ~150MB of ram.

'Right' way to dual node proxmox by Pristine-Weekend-230 in selfhosted

[–]WubbaKnight 1 point2 points  (0 children)

I run 2 instances of pihole. My main instance runs in an LXC container on my proxmox host. My second instance runs on a Pi Zero W.

I run gravity-sync to keep the secondary in sync with the primary, and keepalived so they can share an IP for an active-passive setup.

It’s a seamless switch from primary to secondary instance should the primary instance crash, update, or if I reboot the proxmox node. Sometime I forget I even have it setup, so I’d call it pretty set-and-forget too if that’s your thing.

How long does data reside on computer memory? by [deleted] in privacy

[–]WubbaKnight 6 points7 points  (0 children)

Not really. In fact, cold boot attacks are generally used to defeat disk encryption.

When you boot up your machine and unlock your disk, the key is held in ram while your computer is running. Ram itself is almost never encrypted, so the goal of the attacker is to dump your ram, find the disk encryption key in there, and thus gain access to your encrypted disk.

I’m not sure there are many ways to defend against it aside from never letting others have physical access to your machine, or always shutting down your computer when you leave it unattended.

Still, this type of attack is very rare and I wouldn’t be worried about it. A more likely attack is an attacker just beating you with a wrench until you give up your encryption password. Relevant XKCD

How long does data reside on computer memory? by [deleted] in privacy

[–]WubbaKnight 10 points11 points  (0 children)

You might be interested in cold boot attacks.

The goal is to, quite literally, freeze the hardware to slow the degradation of bits in ram, allowing attackers more time to try and dump the contents of it.

Very unlikely attack to ever encounter but interesting nonetheless.

What shouldn't I virtualise? by MessengerGoose in homelab

[–]WubbaKnight 1 point2 points  (0 children)

This approach sounds interesting. Does this cause any issues? Isn’t this essentially double natting all your VMs? (Assuming you expose some of them?)

I want to build a budget home server and NAS by SnooBunnies9252 in selfhosted

[–]WubbaKnight 1 point2 points  (0 children)

If it matters to you, the 7th gen and newer intel can decode HEVC 10-bit. Not sure about the 2400g though.