Would this mini pc be a good homeserver
For what purpose?
Would this mini pc be a good homeserver
For what purpose?
Encrypting the connection is good, it means that no one should be able capture the data and read it - but my concern is more about the holes in the network boundary you have to create to establish the connection.
My point of view is, that’s not something you want happening automatically, unless you manually configured it to do that yourself and you know exactly how it works, what it connects to and how it authenticates (and preferably have some kind of inbound/outbound traffic monitoring for that connection).
Ah, just one question - is your current Syncthing use internal to your home network, or does it sync remotely?
Because if you’re just having your mobile devices sync files when they get on your home wifi, it’s reasonably safe for that to be fire-and-forget, but if you’re syncing from public networks into private that really should require some more specific configuration and active control.
My main reasons are sailing the high seas
If this is the goal, then you need to concern yourself with your network first and the computer/server second. You need as much operational control over your home network as you can manage, you need to put this traffic in a separate tunnel from all of your normal network traffic and have it pop up on the public network from a different location. You need to own the modem that links you to your provider’s network, and the router that is the entry/exit point for your network. You need to segregate the thing doing the sailing on its own network segment that doesn’t have direct access to any of your other devices. You can not use the combo modem/router gateway device provided by your ISP. You need to plan your internal network intentionally and understand how, when, and why each device transmits on the network. You should understand your firewall configuration (on your network boundary, not on your PC). You should also get PiHole up and running and start dropping unwanted inbound and outbound traffic.
OpSec first.
Yeah I put a screen protector on mine right away. It’s a portable device.
The combination of the etched screen and an etched screen protector definitely hurts the sharpness - I would’ve been better off with the standard glossy screen.
Have you installed a Linux operating system before?
The hardware swap is not difficult, but you do have to reinstall the OS on the new drive, so if you’re not already familiar with that process it may be a hurdle. The good news is there shouldn’t be any important data on it, so if you do have a problem you can just wipe it and start over.
I bought the original largest model, and in less than 6 months decided I wanted more than the 512GB. I wish I had saved the $200 and bought the cheapest model. There’s no other appreciable difference.
For individual projects the way this usually works is one of the larger companies that rely on the project hires the developer as an employee to maintain the codebase full-time and help integrate it with their internal processes.
Larger projects might form their own company and sell integration & support to other companies (e.g. Red Hat, Bitwarden).
Otherwise you’re basically dependent on donations or government grants.
There’s a Wikipedia article on this subject: Business models for open-source software
And there’s various industry opinions:
Demystifying the Open Source Business Model: A Comprehensive Explanation
How to build a successful business model around open source software
Open Source Business Models (UNICEF course)
I think monetization is easier for user-facing software though, which a lot of this material is written around, and harder for projects like libraries.
VPNs as a technology might not be illegal but circumventing the firewall certainly is.
Unless you are very vocal and high profile person no one will black bag you in a country of billion people, lol.
This is a bit of a misunderstanding about how things work in an authoritarian system. Sure, you might fly under the radar for awhile, but if you call attention to yourself (say, by getting caught trying to bypass the government firewall) and you are not high-profile, then it is very low-effort to make you disappear. Few will notice, and those that do will stay silent out of fear.
If you are more high-profile you still get black-bagged, you just get released after, with your behavior suitably modified.
Naomi Wu no longer uploads to YouTube.
Depends - how many family members do you have that the PRC might use against you? or who would miss you if the PRC black bagged you?
And there are hundreds if not thousands of them, plus a lot of automated tooling.
Is there any possibility of mounting some threaded inserts inside the body and running some screws through the panel?
When you’re using the mouse and resting your hand on it, you’re going to be putting a lot of pressure at random angles on it. As you move your hand around the plastic will flex and twist - any semipermanent bond is going to work loose pretty quickly. Also if it’s gummy or sticky it will pick up dust and crud. Fasteners would be better.
Aer
Rime
Stonefall
Shovel Knight
Journey
Spider Heck
Overcooked (1 & 2)
Snakeybus
Osmos
Sonic Mania
World of Goo
Duck Tales Remastered
Spyro: Reignited Trilogy
My point of view is that a human rights violation is a human rights violation regardless of the context in which it happens, and is therefore an important thing to discuss and give visibility to.
Labeling it as “political” and using that as an excuse to hide discussion of it feels like bootlicker behavior to me.
Yep, it’s very much “rules for thee but not for me” at .ml
ICE’s actions are political.
Discussing ICE’s actions is not necessarily political, unless you consider human rights violations to be necessarily political as a topic.
Silencing discussion of human rights violations implies tacit support for the action, so I guess we know now where .ml stands. Any claim of leftist ideology on their part is a sham, they just have a hard-on for authoritarians.
Beyond your eventual technical solution, keep this in mind: untested backups don’t exist.
I recommend reading some documentation about industry-leading solutions like Veeam… you won’t be able to reproduce all of the enterprise-level functionality, at least not without spending a lot of money, but you can try to reproduce the basic practices of good backup systems.
Whatever system you implement, draft a testing plan. A simpler backup solution that you can test and validate will be worth more than something complex and highly detailed.
I mean… exposed to each other, sure, but they’re all exposed to Syncthing and the public relays.
It is a fantastic idea to start your home server project on some e-waste hardware, and use it until you know specifically what features you’re lacking that you would need better hardware for.
Arch often seems to ignore the fundamental rule:
Linus is in the right. Arch developers are frequently in the wrong.