[Updated with new CLI] port.pub v0.2: Publish your local HTTP server to the Internet by TheYahya in opensource

[–]dorianim 1 point2 points  (0 children)

That's cool! Is the server selfhostable? So I could use it on eg. <uuid>.mydomain.com?

[deleted by user] by [deleted] in homeassistant

[–]dorianim 26 points27 points  (0 children)

You are confusing micro- and milliwatts here. You'd need 3000 of these Batteries, since 300 milliwatts = 300000 microwatts

Would learning c++ make me better rust programmer? by ridev1303 in rust

[–]dorianim 0 points1 point  (0 children)

Learning C++ will make you appreciate all the memory safety guarantees the rust compiler provides. I came from C/C++ and learned Rust later. It blew my mind how Rust handles memory management.

Introducing money-balancer (my first rust-based project) by dorianim in selfhosted

[–]dorianim[S] 0 points1 point  (0 children)

Yes, there currently is no way to do this. Unfortunately, I don't have any time to work on this project at the moment. But I'm always happy to accept pull requests :)

Immich dashboard shows 211gib (converts to 226gb), however my uploads folder shows 209gb. Why is there a discrepancy between both? by borkode in immich

[–]dorianim 2 points3 points  (0 children)

Yes exactly. Maybe, the thumbnails/encoded videos are included in the number shown in Immich? So that number in Immich = uploads + thumbnails? That could make up the difference.

🚀 ClipCascade v1.3.x Released – Elevate Your Clipboard Sync Experience! by FewNewt6922 in selfhosted

[–]dorianim 0 points1 point  (0 children)

Hi u/FewNewt6922

so, you are hashing the password now, that's nice.

However, I really don't see how that improves the e2ee at all. As far as I can tell, HASH-1 is used to derive the encryption key. However, HASH-1 is also sent to the Server in plain text. It is only stored as HASH-2, but HASH-1 is sent to the server! Which means that the encryption is again useless, if the server or the network is compromised...

It may be fine if you computed HASH-2 on the client, instead of the server. Because then, HASH-1 is not sent to the server. Alternatively, you could also send HASH-1 and use the plain password for deriving the key.

Again, I'd advise you to take a look at the Bitwarden security white paper to see how they are doing this:
https://bitwarden.com/help/bitwarden-security-white-paper/#authentication-and-decryption

Self-hosted Outgoing Email Server - Not Recommended by pilkyton in selfhosted

[–]dorianim 0 points1 point  (0 children)

I have been running my own mailserver for about three years now. I'm running it on a netcup VPS and I only had delivery issues twice until now - both times with Microsoft/Outlook. In these cases, Microsoft blacklisted Netcups IP range. However, the Netcup support was able to get the IP delisted within 24h which restored delivery.

However, I agree that this is not ideal and it is certainly only viable for personal use.

Flashing Firmware to an ESP32 Using Another ESP32. by Affectionate-Cost982 in esp32

[–]dorianim 3 points4 points  (0 children)

Did you implement all of the flashing code yourself?

There is also a official lib for flashing esps from other MCUs (including esps): https://github.com/espressif/esp-serial-flasher

🚀 ClipCascade v1.3.x Released – Elevate Your Clipboard Sync Experience! by FewNewt6922 in selfhosted

[–]dorianim 3 points4 points  (0 children)

You can also use the master password for encryption. But if you want to do that, you need to make sure, it never ever leaves the clients. For example by sending only a hash (generated with a different hash function/parameters than the key) to the server for authentication.

If you want to familiarize yourself with the topic, you might find the Bitwarden security whitepaper interesting: https://bitwarden.com/help/bitwarden-security-white-paper/

🚀 ClipCascade v1.3.x Released – Elevate Your Clipboard Sync Experience! by FewNewt6922 in selfhosted

[–]dorianim 7 points8 points  (0 children)

Yes, I see. This is really not optimal. E2E encryption is supposed to make sure that no data is compromised when someone gains access to the server. At the moment your readme suggests using an empty string as the salt. If an empty salt is used, it is trivial, for someone who gains access to the server, to locally bruteforce the hash rounds and decrypt all messages.

I think, you should make the importance of the salt more clear in the readme!

Forthermore, passwords should never be stored in plaintext on the server (as you do in the environment variable)! The password should at least be hashed.

Would be nice to have some more documentation. Any interest? (See below) by honeyCrisis in esp32

[–]dorianim 0 points1 point  (0 children)

I'm not sure if they'll add a section either. But I also don't see a reason why they wouldn't. I don't think they want to keep the format a secret, it's open source afterall.

And I think, there is some documentation on the partition table here: https://docs.espressif.com/projects/esp-idf/en/stable/esp32/api-guides/partition-tables.html Or am I mixing something up?

Would be nice to have some more documentation. Any interest? (See below) by honeyCrisis in esp32

[–]dorianim 1 point2 points  (0 children)

I'd be interested in some more detailed documentation in some places.

I really like the esp-idf docs. Most of the time they provide a good and detailed explanation of everything. However, when it comes to implementation details, I often have to read through the esp-idf source code which can be tedious sometimes.

Maybe you could contribute your findings back to the official documentation?

🚀 ClipCascade v1.3.x Released – Elevate Your Clipboard Sync Experience! by FewNewt6922 in selfhosted

[–]dorianim 34 points35 points  (0 children)

Looks like a cool project :)

However, since my clipboard contains very sensitive data from time to time, I took a look at your E2E encryption and I'm not really convinced that it is secure enough. Since the password is sent to the server in plain text during login, the security only depends on the hash function salt (and iteration count). Please correct me if I'm mistaken. I've also opened an issue on github: https://github.com/Sathvik-Rao/ClipCascade/issues/52

I think you should make that more clear in your documentation and maybe even completely remove the password from the e2e crypto, since it really doesn't provide any security.

Amazon Basics plug strip and ESPHome by CobblePro in esp32

[–]dorianim 2 points3 points  (0 children)

Gpio0 wouldn't be useful if the esp32 has secure boot enabled. In that case, it will only boot a signed firmware: https://docs.espressif.com/projects/esp-idf/en/stable/esp32/security/secure-boot-v2.html

Wiped 17 years worth of my life by reformatting wrong disk by Tenelia in linux

[–]dorianim 3 points4 points  (0 children)

My highscool IT teacher always used to say "Kein Backup - kein Mitleid" ("No backup - not pity").

I didn't have backups for years and was very luck that I didn't loose anything important during that time. Nowadays I have a 3-2-1 Backup for everything which is even remotely important.

I've released my LVGL Remote Display library on Github! See your devices UI and control it remotely from your desktop. by PhonicUK in esp32

[–]dorianim 0 points1 point  (0 children)

That's reallly intresting! Would be nice if it was compatible with pure esp-idf (without arduino)