• 0 Posts
  • 28 Comments
Joined 2 years ago
cake
Cake day: August 12th, 2023

help-circle







  • The azure breach is interesting in that it is vs MSFT SaaS. We’re talking produce, ready to eat meals are in the deli section!

    The encryption tech in many cloud providers is typically superior to what you run at home to the point I don’t believe it is a common attack vector.

    Overall, hardened containers are more secure vs bare metal as the attack vectors are radically diff.

    A container should refuse to execute processes that have nothing to do with container function. For ex, there is no reason to have a super user in a container, and the underlying container host should never be accessible from the devices connecting to the containers that it hosts.

    Bare metal is an emotional illusion of control esp with consumer devices between ISP gateway and bare metal.

    It’s not that self hosted can’t run the same level of detect & reject cfg, it’s just that I would be surprised if it was. Securing self hosted internet facing home labs could almost be its own community and is definitely worth a discussion.

    My point is that it is simpler imo to button up a virtual env and that includes a virtual network env (by defn, cloud hosting).


  • Well with bare metal yes, but when your architecture is virtual, configuration rises in importance as the first line of defense. So it’s not just “yum —update” and reboot to remediate a vulnerability, there is more to it; the odds of a home lab admin keeping up with that seem remote to me.

    Encryption is interesting, there really is no practical difference between cloud vs self hosted encryption offerings other than an emotional response.

    Regarding security issues, it will depend on the provider but one wonders if those are real or imagined issues?





  • This is a great question. The photo ecosystem is one where I haven’t found a FOSS soln that hits all the marks of subscription services. I would focus on whatever helps you search.

    I do feel like if files have accurate dates in the file system and in metadata, then folders based on event make sense.

    However subscription photo services are very good at automatically sorting - these dates are holidays so these pictures are probably for that holiday. Your home location is here, these pictures are over there so this must be your trip to there. These pictures have these people or animals, so these pictures are about them.

    With that comes seamless integration across devices - a picture taken at time now can be seen on a tv or laptop at time +x. Etc.

    I have left the FOSS photo world but am definitely interested to see where it is. With digital photography finding pictures is the real trick. using folders like a tag hierarchy at least gets you in the ball park imo. But I have no practical knowledge any more.





  • Remember power!

    First and foremost, well-grounded power is essential. I haven’t done the whole house thing yet, but I am thinking about it and curious to know of other’s stories.

    For surge protectors, I like GE wall taps for form factor and Furman racks when there is space & need.

    For an uninterruptible power supply, I like APC. While they aren’t made in the USA like they used to (RIP), they have been reliable for me.

    Network (ISP Modem, WIFI, Switch) and tower CPU are all driven by UPS power. APC UPS, at least, is always drawing off the battery, so the upstream electronics are protected…a massive surge is far more likely to take out the battery. For laptops, surge protection is enough.

    I have not yet surge-protected the ISP lower power input… this is a real risk! I found a cheap one off Amazon, but I am worried it will degrade the network --> whole house may be better.

    Note - I have had a lightning strike get sent down the cable line, enter the home, blow out the cable modem, traverse into the network switch, blow out the switch, and nuke every active ethernet port (NAS, Apple TV, etc.), as well as jump the wire into low power security, physically blowing a hard-wired security panel off the wall and damaging a few hard-wired security points. Pretty crazy!


  • I would look for something that can generate your diagram from text. There are several.

    Also you should probably have some kind orchestration layer so that your architecture as text feeds both diagram and operational automation (say, ansible).

    The hard part with diagrams is keeping it up to date. So if you can generate a diagram from something that MUST be up to date, it’s a 2-fer (or if your diagram can be used to generate say an ansible inventory).



  • My advice - do not fall into the trap that you can run e-mail better than a provider who does that for a living.

    The easiest way imo is to pick a provider who specializes in this sort of thing. Then begin to rotate your accounts from the old account to the new one, utilizing aliases or masks as needed and desired.

    as you do so , archive old emails off your old account. Periodically check but remove it from your daily driver. At some point, all will be left is spam at which point you can … let that mail provider manage for you.

    Many mail providers have excellent spam protection so you are right - get it at the source.

    Depends how much your time is worth? For some it is easily worth the $1-$5/USD Month to let your mail provider handle the bulk of it.