I dunno when it happened but I swear SBCs were the new best thing in the universe for a while and everyone was building cool little servers with their RockPis and OrangePis....
2 - 8 watts of power for a Pi vs 9-150watts for an x86 system. There are definitely use-cases.
I use a Pi for DHCP, DNS with PiHole, Tailscale Subnet Router, Rustdesk server, Vaultwarden, Syncthing (connects to local device shares, rather than run ST on each device), ArchiveBox, and working on instant messaging (maybe SimpleX, not sure yet). It’s kind of maxed out.
But all this runs under 8watts (actually it’s so low my smart switch doesn’t even register the consumption).
My current file server, an old gaming rig, consumes 100w at idle.
I’m considering a TrueNAS box running either 2.5" ssd’s or NVME sticks (My storage target is under 8TB, and that’s including 3 years projected growth).
Yea, I’ve been eyeing a box like that, looks like it could be useful.
Yep, it’s all tradeoffs, gotta know what you’re shooting for. My Pi cost $5, I’m using an old phone charger (I have many), and an old microsd. If anything fails, I just grab another from the junk box.
All I know with my current use-case is I can’t measure the power consumption with the tools I use. I imagine that means under 5w draw (not really sure what it’s capable of measuring).
And here are my qBittorrent stats. I left my computer running for 6 days, I never thought I’d get this far! But that electricity bill’s gonna sting…...
My cable modem consumes about 10-20w (I’ve done monitoring). This while a single file server is continually backing up to Crashplan (about 700GB this month so far). So I don’t even see my cable modem in my power bill.
My file server is much worse - on average it’s consuming about 100w (or 2400wh/day). I’ve done the math several times, that’s about $1/day. It’s the box that’s syncing with all my devices, and then backing up to Crashplan.
Hello internet users. Someone in my family is looking to buy a car and wanted some recommendations for a private one. They are looking to buy new, and need Android Auto and CarPlay. I know all new cars suck for privacy by default, but I was hoping someone here could offer some insight as to which cars can be made better and what...
Y’all, this is gonna be super broad, and I apologize for that, but I’m pretty new to all this and am looking for advice and guidance because I’m pretty overwhelmed at the moment. Any help is very, very appreciated....
Yea, they all suck that way. I still use my own router for wifi. It’s just routing, and your own router will know which way to the internet, unless there’s something I don’t understand about your internet connection. See my other comment below.
Yea, requirements mapping like this is standard stuff in the business world, usually handled by people like Technical Business/Systems Analysts. Typically they start with Business/Functional Requirements, hammered out in conversations with the organization that needs those functions. Those are mapped into System Requirements. This is the stage where you can start looking at solutions, vendor systems, etc, for systems that meet those requirements.
System Requirements get mapped into Technical Requirements - these are very specific: cpu, memory, networking, access control, monitor size, every nitpicky detail you can imagine, including every firewall rule, IP address, interface config. The System and Technical docs tend to be 100+/several hundred lines in excel respectively, as the Tech Requirements turn into your change management submissions. They’re the actual changes required to make a system functional.
Not sure why you need a new router for PiHole. If your machines all point to the Pihole for DNS, it works. Router has almost nothing to do with what provides DNS, other than maybe having it’s DHCP config include the Pihole for DNS.
Even then, you can setup the Pihole to be both DHCP and DNS (which helps for local name resolution anyway), and then just turn off DHCP in your router.
As I understand it, Tailscale and Nginx fulfill the same requirements. I lean toward TS myself, I like how administration works, and how it’s a virtual network instead of an in-bound VPN. This means devices just see each other on this network, regardless of the physical network to which they’re connected. This makes it easy to use the same local-network tools you normally use. For example, you can use just one sync tool, rather than one inside the LAN, and one that can span the internet. You can map shares right across a virtual network as if it were a LAN. TS also enables you to access devices that can’t run TS, such as printers, routers, access points, etc, by enabling its Subnet Router.
Tailscale also has a couple features (Funnel and Share) which enable you to (respectively), provide internet access to specific resources for anyone, or enable foreign Tailscale networks to access specific resources.
I see Proxmox and TrueNAS as essentially the same kind of thing - they’re both Hypervisors (virtualizatiin hosts) with True adding NAS capability. So I can’t think of a use-case for running one on the other (TrueNAS has some docs around virtualizing it, I assume the use-case is for a test lab, I wouldn’t think running TN, or any NAS, virtualized is an optimal choice, but hey, what do I know? ).
While I haven’t explored both deeply, I lean toward TrueNAS, but that’s because I need a NAS solution and a hypervisor, and I’ve seen similar solutions spec’d many times for businesses - I’ve seen it work well. Plus TrueNAS as a company seems to know what they’re doing, they have a strong commercial arm with an array of hardware options. This tells me they are very invested in making True work well, and they do a lot of testing to ensure it works, at least on their hardware. Having multiple hardware products requires both an extensive test group and support organization.
Proxmox seems equivalent, except they do just the software part, as far as I’ve seen.
Two similar products for different, but similar/overlapping use-cases.
Best advice I have is to make a list of Functional Requirements, abstract/high-level needs, such as “need external access to network for management”. Don’t think about specific solutions, just make the list of requirements. Then map those Functional requirements to System requirements. This is often a one-to-many mapping, as it often takes multiple System requirements to address a single functional requirement.
For example, that “external access” requirement could map out to a VPN system requirement, but also to an access control requirement like SSO, and then also to user management definitions.
You don’t have to be that detailed, but it’s good to at least have the Functional-to-System mapping so you always know why you did something.
Since their modem is handing out DHCP addresses, is there any reason why you couldn’t just connect that cable to your router’s internet port, and configure it for DHCP on that interface? Then the provider would always see their modem, and you’d still have functional routing that you control.
Since consumer routers have a dedicated interface for this, you don’t have to make routing tables to tell it which way to the internet, it already knows it’s all out that interface.
Just make sure your router uses a different private address range for your network than the one handed out by the modem.
So your router should get a DHCP and DNS settings from the modem, and will know it’s the first hop to the internet.
I do this to create test networks at home (my cable modem has multiple ethernet ports), using cheap consumer wifi routers. By using the internet port to connect, I can do some minimal isolation just by using different address ranges, not configuring DNS on those boxes, and disabling DNS on my router.
It seems weirdly difficult to find a good solution to attach HDDs to my pi. Best case would be for me a enclosure with small power supply, space for my pi, and at least 2 bays for HDDs, rather 4. All that for under 100€ of cause :D...
Something like Wireguard, Tailscale (uses Wireguard but provides easier administration), Reverse Proxy, VPN, are the best approaches.
Since OP doesn’t need for anyone else to access, I’d use Tailscale (Wireguard if you want a little more effort). Tailscale has a full self-host option with Headscale, though I have no problem with letting them provide discovery.
With Tailscale, you don’t even need the client on devices to access your Tailscale network, by enabling the Funnel feature. This does something similar to Reverse Proxy, by having a Web-exposed service hosted by Tailscale which then routes traffic (encrypted) to your Tailscale network.
I’m thinking about moving my PC out to the living room and streaming back to my office when I need to. I’ve used a number of moonlight clients with mixed results....
Hello, currently I use qksms but its very problematic and lacks basic fetures. One of those issues being you cant send videos, and sending and recieving media is pixalated or blurry because of a commpresion issue. I’ve already tried adjusting the compresion options in settings to find out it doesn’t work....
Tailscale just solves so many these types of problems.
With a virtual network, you mo longer need tools that work over the internet - just use the same tools as you would on a LAN.
I’ve used Hamachi this way on windows since about 2006. I’ve waited for an Androidi/iOS client, but it never appeared. Glad to see Wireguard/Tailscale step in to fill that gap, and it’s self-hostable!
The video discusses the privacy concerns associated with SIM cards in mobile phones, highlighting three main reasons to be cautious. First, it explains how SIM cards enable constant location tracking through communication with cell towers. Second, it delves into the autonomy of SIM cards, particularly proactive SIMs that can...
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale....
I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?
What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).
Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.
My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).
You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.
So SBCs are shit now? Anything I can do with my collection of Pis and old routers?
I dunno when it happened but I swear SBCs were the new best thing in the universe for a while and everyone was building cool little servers with their RockPis and OrangePis....
Brave to end 'Strict' fingerprinting protection as it breaks websites (www.bleepingcomputer.com)
I finally uploaded a whole terabyte in a single session. I'm a super seeder! (lemmy.ml)
And here are my qBittorrent stats. I left my computer running for 6 days, I never thought I’d get this far! But that electricity bill’s gonna sting…...
How to get a private car
Hello internet users. Someone in my family is looking to buy a car and wanted some recommendations for a private one. They are looking to buy new, and need Android Auto and CarPlay. I know all new cars suck for privacy by default, but I was hoping someone here could offer some insight as to which cars can be made better and what...
Starting over and doing it "right"
Y’all, this is gonna be super broad, and I apologize for that, but I’m pretty new to all this and am looking for advice and guidance because I’m pretty overwhelmed at the moment. Any help is very, very appreciated....
Raspberry as NAS, multiple HDDs and an enclosure
It seems weirdly difficult to find a good solution to attach HDDs to my pi. Best case would be for me a enclosure with small power supply, space for my pi, and at least 2 bays for HDDs, rather 4. All that for under 100€ of cause :D...
The "safest" way of self hosting
Hello peoples,...
Self hosted free iOS MDM
I’d like to experiment with MDM for mine and my child’s iPhones, and possibly my child’s MacBook....
How well does the raspberry pi handle being a moonlight client
I’m thinking about moving my PC out to the living room and streaming back to my office when I need to. I’ve used a number of moonlight clients with mixed results....
what are your recommendations for a good privacy friendly sms app?
Hello, currently I use qksms but its very problematic and lacks basic fetures. One of those issues being you cant send videos, and sending and recieving media is pixalated or blurry because of a commpresion issue. I’ve already tried adjusting the compresion options in settings to find out it doesn’t work....
Termius alternative ?
Hi, Is there any selfhosted app that can do the same as Termius ? termius.com...
Do you use Mull browser? If so you may want to donate to keep Divested computing alive so they can continue to maintain Divest os and Mull among other things. (divested.dev)
Why you shouldn't use a SIM card and use an hotspot as an alternative (piped.video)
The video discusses the privacy concerns associated with SIM cards in mobile phones, highlighting three main reasons to be cautious. First, it explains how SIM cards enable constant location tracking through communication with cell towers. Second, it delves into the autonomy of SIM cards, particularly proactive SIMs that can...
Amazon Ring stops letting police request footage in Neighbors app after outcry (arstechnica.com) Portuguese
Warrantless access may still be granted during vaguely defined “emergencies.”
How to access traefik hostnames from tailscale clients
I finally decided that I wanted to be able to externally access some of my Docker containers from outside of my local network. I don’t want to deal with the security hassle of exposing ports on my router, so I decided to go with Tailscale....