Nice. Software developer, gamer, occasionally 3d printing, coffee lover.

  • 0 Posts
  • 81 Comments
Joined 1 年前
cake
Cake day: 2023年7月1日

help-circle

  • The ad serving companies (Google) don’t care about what happens after the click (yet). As far as I’m aware no “handshake” process exists that would allow an advertiser to communicate with the as server and validate a click (such a process could be abused).

    Most likely the advertiser would be using some form of client side analytics, so the click wouldn’t show up in their statistics, meaning the advertiser would see a huge discrepancy between the clicks they saw in the campaign and the clicks the ad server reports.


  • I’m not sure what you mean by “open source compatible”. Do you mean the camera itself can have open source firmware installed, or that it’s compatible with open source NVR software such as Shinobi or ZoneMinder?

    If the former, I know some of the Wyze cameras have that option. Like OpenMiko. There’s all OpenIPC, which does have a list of supported devices.

    If the latter, any camera with RTSP and some sort of API to expose PTZ controls would do. My personal recommendation would be Axis, which makes solid cameras.














  • I’ve had bad tinkering break my system before, but never had an update break it irreversibly. The closest would actually be on Silverblue itself, when an update to the kernel was using different signing keys that cause the system not to boot. Fortunately it was simple, I selected the previous deployment and I was in (on a non versioned OS I would have selected the previous kernel which most are configured to retain the last few). A quick Google revealed Ublue had a whole kerfuffle and after verifying it was legit, I enrolled the new certs into my MOK.

    Although one time on Arch I had installed an experimental version of Gnome from one of their repos, and was pleasantly surprised when that version finally released and I removed the experiment repo and did an update absolutely nothing at all broke. Nothing.




  • Zikeji@programming.devtoLinux@lemmy.mlVPS encryption
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 个月前

    LUKS, or anything that relies on the server encrypting, is highly vulnerable (see schizo@forum.uncomfortable.business’s response).

    Your best bet would be encrypting client side before it arrives on the server using a solution like rclone, restic, borg, etc.