archomrade [he/him]

  • 4 Posts
  • 124 Comments
Joined 2 years ago
cake
Cake day: June 20th, 2023

help-circle

  • Tldr - selfhosting is useful when:

    • you need a lot of storage

    • you need a lot of processing

    • you are collaborating with multiple people/family members

    • you are sharing media with other people outside your network

    • you are sharing media across devices

    • you want a standalone backup independent of your mobile device without doing so manually

    • you want more advanced AI features that are not feasible to do on device (such as image detection or live security camera object detection)

    • you want your home IOT devices to work locally without a cloud connection

    • you have old hardware collecting dust and want to put it to use

    • you like to make things

    Seems like you might have understood the purpose of those apps, you just didn’t personally have those needs yourself, and that’s fine



  • Would be, but unfortunately all I have are fluorescent troffers down there. But a single extension and splitter cable might still be acceptable. I also thought about getting some usb battery banks - the cameras run off a 5v power adapter, I think a 15000mAh battery might last a couple days or even just one (not sure how many watts they draw running the custom firmware).

    I was hoping for a cleaner solution but it might be one of those “pick two” situations.










  • This is the most reasonable response.

    A lot of people here have long since made up their mind about hexbear based both on repeated meta posting on the topic and possibly a bad experience or two with them on a topic they assumed was uncontested but is a landmine topic for communists of a particular bent

    I’ve personally never had a bad experience with hexbears, possibly because I’m more empathetic to their perspective, but more likely because I know when it’s time to disengage. There are users on lemmy who feel strongly about a certain topic that’s abrasive to hexbear users and dig in their heels when jeered at (or maybe feel a personal responsibility to stand them down) and are usually the users here who have the most complaints, because the standard reaction from hexbear users is irreverence (both the users and the mods).

    Unlike a lot of liberals coming from reddit, communists often don’t have delusions about the neutrality of moderation and so they’ll ban you on a whim if they think you’re there to stir shit. They use the ban hammer judiciously even with users on their own instance. That’s often the biggest complaint both with hexbear and with lemmy.ml.




  • It depends on the attack vector. Typically you’re right, but malicious .lnk files are often paired with other malicious methods to infect machines. Sometimes they’re configured as a worm that copies and spreads when a flash drive is connected, sometimes they’re configured to download a remote payload when another script or program is started. The problem is that it’s a type of file that’s often overlooked because it seems innocent.

    It isn’t necessarily the case that the Trojan needs to be interacted with by the user in order to execute the malicious code. Just having the file on your machine opens the door for all kinds of attacks (especially if you’re using a headless setup: you wouldn’t necessarily know you have the .lnk file in the system unless you’re manually unpacking your downloads yourself). All it needs is for another piece of infected code to run and look for that file, and it can open the door for more traditional malicious code.


    Edit: just as a for-instance - If I was a black hat and wanted to spread some malicious code, I could include this .lnk file in a torrent (innocuous enough to slip by unnoticed by most people/unscrupulous pirates), and then maybe place a line of code in a jellyfin plugin or script that looks for that file and executes it if it’s found. Because the attack isn’t buried in the plugin or script itself (most people wouldn’t think much of a line of code that’s simply pointing to temp file already on your system), it could theoretically go unnoticed for long enough to catch a few hundred or thousand machines.






  • I used to think the same thing, but I did an effort post about this about a year ago (here’s the link)

    The article you linked to says something similar to my own understanding: basically, DRM circumvention for personal use is officially not allowed under DMCA and could absolutely be used against you in court, though the likelihood is low. The exceptions the author mentions are pretty nebulous, and the Library of Congress actually addresses the most common cases in their discussions and publication and affirms that they are not allowed.

    I don’t personally agree with their interpretation, but I think more people ought to know that it’s officially not legal to circumvent DRM for personal use.