Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)M
Posts
0
Comments
43
Joined
3 yr. ago

  • I daily a T480 with Debian for work, and I'd recommend it highly. Great performance, battery, build quality, look & feel, etc. We have some 7480s deployed and while they've been solid as well, I much prefer the thinkpad. T series will have better performance and battery than X series, also, so I'd take the T480 over the X1C.

  • Ctrl+r was a life-changer when I first learned it.

  • There should be a section in the configuration about dhcp, which is how ipv4 addresses are given out on your network. What happens is when a device first connects to the network, it sends out a broadcast with its mac address - the dhcp server (in this case, your router/firewall) hears this, and sends back a reply allocating an address. You should be able to see a list of currently allocated addresses, and hopefully configure reservations to make those allocations permanent. To reserve an ipv4 address for a specific device, you need that device's mac address.

    Each item on that current allocations list should have a hostname, a mac address, and an ipv4 address. If it's not clear by the hostname which device is the tv, you can look up each mac address and deduce from there (the first part of each address is unique to a specific manufacturer).

    Once you have an ipv4 address reserved for the tv, you can set your outbound firewall rule to block it.

    Ipv6, as I mentioned, is much more complicated. It might be possible to disable it completely on your router, and that's likely the only way to block the tv from using it, but then your whole network will lose ipv6 capability across that boundary (probably not a lot of downside to that, though).

    Good luck!

  • If your firewall can set outbound rules, and you can control DHCP on your network so that you can reliably know the TV's IPv4 address, you can block the TV from reaching beyond the local network there with a "deny all from source address of TV" type rule.

    If your router/firewall is handling IPv6 though, it gets a lot more complicated, since the TV could have any number of addresses that change often.

  • When it comes to privacy and security, I think you should treat all cloud providers equally. Use a client with client-side encryption so that the only thing that touches the provider is encrypted data.

    Rclone is an example of a good client that can do this, and can even mount your cloud storage as a filesystem with its encryption layer in between.

  • I'd recommend a full battery calibration before running the command one more time, if you haven't already (charge the battery fully, leave it on the charger at 100% for a while, then fully discharge until it shuts itself off, leave it for a bit, then fully recharge while off). If the calibrated values line up with a full:design ratio of ~80%, especially with a 10-year-old battery with almost 700 cycles on it, my take is that's pretty great.

    That said, I think the best way to get an accurate feel for the health of an old battery is to put it through one full cycle of normal use and time how long it takes to die.

  • If you're genuinely worried about this, you shouldn't be using untrusted machines for remote access.

  • Apache Guacamole might be a good option. "Clientless" (browser-based), supports various mfa, uses ssh/vnc/rdp on the backend.

    However, if the data on that machine is sensitive, or if that machine has access to other sensitive things on your network, I'd suggest caution in allowing remote access from untrusted machines on the wider internet.

  • He volunteered.

  • RIP

    • Your user account on GrapheneOS is just a local user account
    • GrapheneOS comes with its own camera, gallery, contacts, sms, phone, and file manager apps, a hardened fork of Chromium called Vanadium, and an app that lets you install sandboxed versions of google play services and google play store, if you so wish. Nothing else. You can install other apps using F-Droid, or by installing the google play store app.
    • GrapheneOS does not have a "cloud", aside from the web services it uses to check for and pull new updates. If you want to sync files somewhere, you can install whatever you want (Nextcloud, Google Drive, etc)
    • F-Droid is a fine choice, and the google play store is as well, all depending on what your priorities are for your phone. I only use F-Droid and have no non-foss apps on my phone for privacy reasons, for example.
    • Running your own Nextcloud server is a great learning exercise, but it's a big commitment of time if you're not already familiar with linux administration, and if you want it to be secure and accessible remotely that's even harder. Don't let that be an impediment to getting a secure phone though - you can always keep using Google Drive for now, and then learn how to set up Nextcloud or some such as you go along.

    Good luck!

  • The only legitimate commands for a non-root shell are sudo -i, exit, and echo "yee haw"

  • powertop is a cool tool that can analyze your machine and provide a list of suggested power optimizations

  • DNS is what you're looking for. To keep it simple and in one place (your adguard instance), you can add local dns entries under Filters > DNS Rewrites in the format below:

     
        
    192.xxx.x.47 plex.yourdomain.xyz
    192.xxx.x.53 snapdrop.yourdomain.xyz
    
      
  • Now that's a name I've not heard in a loooong time.

  • What is your root filesystem installed on - lvm, zfs, or bare disk partitions? Are you booting with grub (legacy/bios) or systemd-boot (uefi)?

  • It would be enormously easier to track Taylor Swift on a random flight in business class, because the moment people saw her on their random flight in business class it would turn into a social media frenzy.