Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)C
Posts
1
Comments
10
Joined
3 yr. ago

  • Daily driving it. B+ for a beta. I love tiling, and this one doesn’t require config hell to keep up. Very performant, and very feature light, for now.

  • BTRFS snapshots world be my first guess. ‘sudo btrfs subvolume list /‘

  • Did you end up enabling ipv6 as well? Did that help?

  • If it’s enable then this command should produce a 1 in the output

     shell
        
    cat /proc/sys/net/ipv4/ip_forward
    
      
  • Yes, you can run Tailscale in a container. You could create a second VLAN, attach it to your hosts interface, add a macvlan docker interface to the container and put it directly on your network.

    If you have concerns about the software running on your host I would recommend getting a dedicated piece of hardware instead (rpi, zimaboard, etc).

    How paranoid are you wanting to be? You can either go Headscale, or Tailnet Lock (my preference) to give your self some peace of mind. It completely depends on your threat model, which you didn't mention.

  • I don't know the details of the DMA, it's definitely possible to provide code-signing to developers that does not go through the app store.

  • As far as I know iPhones have never allowed unsigned code to run.

  • Everything ZFS @lemmy.world

    OpenZFS Lands Exciting RAIDZ Expansion Feature

    www.phoronix.com /news/OpenZFS-RAIDZ-Expansion