*NIX enthusiast, Metal Head, MUDder, ex-WoW head, and Anon radio fan.

  • 0 Posts
  • 39 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle

  • Korthrun@lemmy.sdf.orgtoTechnology@lemmy.worldAds on YouTube
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    1
    ·
    26 days ago

    I understand that we exist under capitalism and that it costs money to host and distribute these videos.

    I’m willing to pay for access to this service by letting an ad play (probably while I’m pouring a glass of water in another room and have my speakers off).

    What gets me is a 3 minute ad on a 44 second video. Interrupting the middle of a sentence with an ad is also annoying. Placing a 30 second ad in the middle of a song can also fuck right off.

    Find an appropriate spot for your ad, and make it’s length sensible with regards to the length of the content I’m watching. Or just don’t offer an ad supported tier of your service.


  • There are cases where forward and reverse DNS need to match, and you may not want to have any association between two domains. SMTP is something that comes to mind. If your HELO/EHLO domain doesn’t match up, there are many servers that just won’t deliver your mail. I host my own email, and I work with very technical people. I don’t want “fun-domain.com” and “domain-on-my-resume.com” resolving to the same IP address. But I can host them on the same server.

    There’s still some software out there that does not support SNI.

    While your post body focuses on VPS, your question doesn’t, so I’ll also mention self hosting your own VMs. You can do a lot with reverse proxies and funky port based traffic routers, but sometimes just giving the VM it’s own IP is way simpler. Especially if you don’t mind hosting the VM, but aren’t interested in managing the service. I host a VM for a MUD I used to play. I don’t run the MUD, I don’t want to. I want them to be able to do stuff on their website without me having to edit a reverse proxy config, or without having to give them access to the host server.

    It can also be used to increase the number of connections you can have to a single interface.

    Perhaps you’re hosting your own VPN and you want traffic to come out an entirely different interface than the one your other services are on, for segregation reasons.

    A secondary IP can also allow for a bit of service redundancy. Probably not the most relevant thing in self-hosting land, but the ability to move an IP between two different VPSs (assuming they’re on different hypervisors anyway) is pretty handy.





  • Have you looked for providers that offer ETRN? Seems like that might fit your use case well.

    I’ve hosted my own email for over a decade with very few issues. It’s low ram and CPU usage so a very cheap VM (or a pair in different locations if you wanna be leet) can be a viable way to avoid the ISP related issues people have trying to host it at home. If you really want it all ending up at home you can do ETRN as mentioned and while TCP/25 is often blocked at home, the submission port (TCP/587) rarely is.


  • I don’t watch a TON of these things, but I do enjoy them from time to time. The two bits I enjoy the most are vicarious rediscovery of something I enjoy, and getting a very different point of view on the same thing.

    Generally when I watch these it’s stuff like “Classically trained musician listens to Megadeth for the first time”. I get reminded of some bits that I’ve grown accustomed to, and sometimes get a whole new perspective on something I’ve been enjoying for years.

    I will say, I don’t get “Youtuber reacts to other youtubers reaction to some twitch streamer breakdancing” or “Gymrat listens to ABBA for the first time”.




  • I use a hardware password manager that connects over USB or bluetooth for most things. The few things that I use often I have a system for, and that system is popular culture.

    Love “The Prisoner of Azkaban”? Initialize it, and add the publish date some where: HP&TPoA|1999

    Starship troopers fan? Initialize a memorable quote. “The enemy can not push a button… if you disable his hand. Medic!”: Tecnpab…iydhh.M! Need numbers? Find a quote with numbers, or add the release year, or the number of times you watched it that one weekend where you and a friend watched it 32 times.

    Like TV shows more? How about the fourth episode of family guy: S1-MindOverMuder-E4.

    Metal Fan? I do love track three off of Metallica’s 1983 album: #3|Motorbreath-1983

    Etc.



  • I must have been way out of it late last night. I totally missed that you were asking why people do it and not looking for recommendations. Sorry for the spammy nonsense response to your OP.

    To the latter question, I’ve seen devices that do OTP and FIDO in addition to basically storing arbitrary strings (e.g. your cc number).

    I get harassment scolding me for using Lemmy to advertise when I mention any of the products by name, despite having no affiliation with any of them outside of being a user, but they’re not hard to find if you look.





  • Korthrun@lemmy.sdf.orgtoPrivacy@lemmy.mlUse a password manager
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    11 months ago

    I saw the lack of arm and facepalmed but I was half asleep poo posting so got over it :p (fixed now!)

    I’ve been using this device for ~5 years now, so my memory is a little hazy on it, but I’m pretty sure for the particular device I prefer (which is to say, I have nfc what the setup is for other vendors, which could be greatly superior) the AES-256 key used for encryption isn’t generated until you setup your first card.


  • How would any company, regardless of geography have the secret I generated? This is a stand alone hardware device. They seller is not involved at all once I’ve received my package.

    Could a sophisticated/well resourced actor clone the smart card they stole or you lost? Sure, brute force attacks are brute force attacks. At least you’d know your device and card are stolen. Now you’re in a race to reset your passwords before they finish making 500 clones of the smart card they stole.

    Hypothetically I could blackmail someone at LastPass and have a backdoor is installed for me.

    Someone could bust down my door while I have it connected and unlocked and just login to all my things. ¯\_(ツ)_/¯


  • That will vary from vendor to vendor. In the case of the one I like there are a few relevant things.

    The password db is stored encrypted on the device. Accessing the passwords requires all of:

    • the device
    • a smartcard with a particular secret on it
    • the 4 digit hex pin to unlock the secret on said smartcard, which is what is used to decrypt the db

    Three PIN failures and the smart card is invalidated.

    That sort of covers “stolen” and “lost + recovered by a baddie”. Your bad actor would need to have their hands on both physical pieces and guessed the 4 digit hex code in 3 tries.

    As far as a user recovering from a lost or failed device or smart card goes, you can export the encrypted version of the db for backups, which I do to a thumb drive I keep in my document safe. I do the same with a backup smart card. So that and a backup device or purchasing a new one if yours fails or is lost/stolen.

    In the super “just in case” move, I also keep a keepassdb on said thumb drive. In case my device fails and it’s just not possible to get a new one. Kind of like keeping two cloud providers in case LastPass goes bankrupt or something.