BearOfaTime

@BearOfaTime@lemm.ee

This profile is from a federated server and may be incomplete. Browse more on the original instance.

BearOfaTime,

2 - 8 watts of power for a Pi vs 9-150watts for an x86 system. There are definitely use-cases.

I use a Pi for DHCP, DNS with PiHole, Tailscale Subnet Router, Rustdesk server, Vaultwarden, Syncthing (connects to local device shares, rather than run ST on each device), ArchiveBox, and working on instant messaging (maybe SimpleX, not sure yet). It’s kind of maxed out.

But all this runs under 8watts (actually it’s so low my smart switch doesn’t even register the consumption).

BearOfaTime,

How bad is it?

My current file server, an old gaming rig, consumes 100w at idle.

I’m considering a TrueNAS box running either 2.5" ssd’s or NVME sticks (My storage target is under 8TB, and that’s including 3 years projected growth).

BearOfaTime,

Lol, yea, it’s old, was built for performance, and hasn’t run right in a while.

I’m looking to setup a NAS and turn that thing off

BearOfaTime,

Nothing to be done. It’s old. Only fan to adjust is cpu, and I can tell when the cooler is getting dirty because the fan stays at higher speeds.

Otherwise there’s one large, slow rpm fan in the case, always on low speed.

BearOfaTime,

It’s $1/day. I’ve done the math a few times

BearOfaTime, (edited )

Nice!

Yea, I’ve been eyeing a box like that, looks like it could be useful.

Yep, it’s all tradeoffs, gotta know what you’re shooting for. My Pi cost $5, I’m using an old phone charger (I have many), and an old microsd. If anything fails, I just grab another from the junk box.

All I know with my current use-case is I can’t measure the power consumption with the tools I use. I imagine that means under 5w draw (not really sure what it’s capable of measuring).

BearOfaTime,

So?

What I care about in this story is the technical issues.

BearOfaTime,

My cable modem consumes about 10-20w (I’ve done monitoring). This while a single file server is continually backing up to Crashplan (about 700GB this month so far). So I don’t even see my cable modem in my power bill.

My file server is much worse - on average it’s consuming about 100w (or 2400wh/day). I’ve done the math several times, that’s about $1/day. It’s the box that’s syncing with all my devices, and then backing up to Crashplan.

How to get a private car

Hello internet users. Someone in my family is looking to buy a car and wanted some recommendations for a private one. They are looking to buy new, and need Android Auto and CarPlay. I know all new cars suck for privacy by default, but I was hoping someone here could offer some insight as to which cars can be made better and what...

BearOfaTime,

Unlikely to find a new car without a calling home function.

Definitely not one with car play.

Best you can do is find the cell antenna port and put an RF sink on it (they’re used for testing radio output).

BearOfaTime,

Lol, sarcasm received, loud n clear!

Yea, they all suck that way. I still use my own router for wifi. It’s just routing, and your own router will know which way to the internet, unless there’s something I don’t understand about your internet connection. See my other comment below.

Yea, requirements mapping like this is standard stuff in the business world, usually handled by people like Technical Business/Systems Analysts. Typically they start with Business/Functional Requirements, hammered out in conversations with the organization that needs those functions. Those are mapped into System Requirements. This is the stage where you can start looking at solutions, vendor systems, etc, for systems that meet those requirements.

System Requirements get mapped into Technical Requirements - these are very specific: cpu, memory, networking, access control, monitor size, every nitpicky detail you can imagine, including every firewall rule, IP address, interface config. The System and Technical docs tend to be 100+/several hundred lines in excel respectively, as the Tech Requirements turn into your change management submissions. They’re the actual changes required to make a system functional.

BearOfaTime, (edited )

Not sure why you need a new router for PiHole. If your machines all point to the Pihole for DNS, it works. Router has almost nothing to do with what provides DNS, other than maybe having it’s DHCP config include the Pihole for DNS.

Even then, you can setup the Pihole to be both DHCP and DNS (which helps for local name resolution anyway), and then just turn off DHCP in your router.

As I understand it, Tailscale and Nginx fulfill the same requirements. I lean toward TS myself, I like how administration works, and how it’s a virtual network instead of an in-bound VPN. This means devices just see each other on this network, regardless of the physical network to which they’re connected. This makes it easy to use the same local-network tools you normally use. For example, you can use just one sync tool, rather than one inside the LAN, and one that can span the internet. You can map shares right across a virtual network as if it were a LAN. TS also enables you to access devices that can’t run TS, such as printers, routers, access points, etc, by enabling its Subnet Router.

Tailscale also has a couple features (Funnel and Share) which enable you to (respectively), provide internet access to specific resources for anyone, or enable foreign Tailscale networks to access specific resources.

I see Proxmox and TrueNAS as essentially the same kind of thing - they’re both Hypervisors (virtualizatiin hosts) with True adding NAS capability. So I can’t think of a use-case for running one on the other (TrueNAS has some docs around virtualizing it, I assume the use-case is for a test lab, I wouldn’t think running TN, or any NAS, virtualized is an optimal choice, but hey, what do I know? ).

While I haven’t explored both deeply, I lean toward TrueNAS, but that’s because I need a NAS solution and a hypervisor, and I’ve seen similar solutions spec’d many times for businesses - I’ve seen it work well. Plus TrueNAS as a company seems to know what they’re doing, they have a strong commercial arm with an array of hardware options. This tells me they are very invested in making True work well, and they do a lot of testing to ensure it works, at least on their hardware. Having multiple hardware products requires both an extensive test group and support organization.

Proxmox seems equivalent, except they do just the software part, as far as I’ve seen.

Two similar products for different, but similar/overlapping use-cases.

Best advice I have is to make a list of Functional Requirements, abstract/high-level needs, such as “need external access to network for management”. Don’t think about specific solutions, just make the list of requirements. Then map those Functional requirements to System requirements. This is often a one-to-many mapping, as it often takes multiple System requirements to address a single functional requirement.

For example, that “external access” requirement could map out to a VPN system requirement, but also to an access control requirement like SSO, and then also to user management definitions.

You don’t have to be that detailed, but it’s good to at least have the Functional-to-System mapping so you always know why you did something.

BearOfaTime,

Since their modem is handing out DHCP addresses, is there any reason why you couldn’t just connect that cable to your router’s internet port, and configure it for DHCP on that interface? Then the provider would always see their modem, and you’d still have functional routing that you control.

Since consumer routers have a dedicated interface for this, you don’t have to make routing tables to tell it which way to the internet, it already knows it’s all out that interface.

Just make sure your router uses a different private address range for your network than the one handed out by the modem.

So your router should get a DHCP and DNS settings from the modem, and will know it’s the first hop to the internet.

I do this to create test networks at home (my cable modem has multiple ethernet ports), using cheap consumer wifi routers. By using the internet port to connect, I can do some minimal isolation just by using different address ranges, not configuring DNS on those boxes, and disabling DNS on my router.

BearOfaTime,

You should still be able to run your own router with it treating their router as the next hop.

BearOfaTime,

Something like Wireguard, Tailscale (uses Wireguard but provides easier administration), Reverse Proxy, VPN, are the best approaches.

Since OP doesn’t need for anyone else to access, I’d use Tailscale (Wireguard if you want a little more effort). Tailscale has a full self-host option with Headscale, though I have no problem with letting them provide discovery.

With Tailscale, you don’t even need the client on devices to access your Tailscale network, by enabling the Funnel feature. This does something similar to Reverse Proxy, by having a Web-exposed service hosted by Tailscale which then routes traffic (encrypted) to your Tailscale network.

BearOfaTime,

I’d say locking it down is a feature of being managed, not necessarily what it does.

When managing devices, you can enable users to have as much control as you’d like.

It’s more about being able to manage devices from a single place, similar to what business does with workstations and servers (e.g. MS SCOM.

Plenty of users still have admin rights even with SCOM being used. It still really helps from a support perspective.

BearOfaTime,

What’s moonlight? (Genuinely curious, always looking for new tools).

Thanks!

BearOfaTime,

Oh, slick!

Now you given me yet another thing to sink time into, haha.

Thanks!

what are your recommendations for a good privacy friendly sms app?

Hello, currently I use qksms but its very problematic and lacks basic fetures. One of those issues being you cant send videos, and sending and recieving media is pixalated or blurry because of a commpresion issue. I’ve already tried adjusting the compresion options in settings to find out it doesn’t work....

BearOfaTime,

But only if both ends use the same app.

Which I always thought was a smart path forward, just getting people to switch apps, even for SMS, isike puling teeth.

BearOfaTime,

I get a 502.

BearOfaTime,

Tailscale just solves so many these types of problems.

With a virtual network, you mo longer need tools that work over the internet - just use the same tools as you would on a LAN.

I’ve used Hamachi this way on windows since about 2006. I’ve waited for an Androidi/iOS client, but it never appeared. Glad to see Wireguard/Tailscale step in to fill that gap, and it’s self-hostable!

BearOfaTime,

What a juvenile, idiotic take.

Ah,your name says it all.

Why you shouldn't use a SIM card and use an hotspot as an alternative (piped.video)

The video discusses the privacy concerns associated with SIM cards in mobile phones, highlighting three main reasons to be cautious. First, it explains how SIM cards enable constant location tracking through communication with cell towers. Second, it delves into the autonomy of SIM cards, particularly proactive SIMs that can...

BearOfaTime,

GApps definitely bypass VPN, I’ve seen it on a phone I can’t root.

Pretty interesting to see first hand.

And, of course they can, they’re system apps.

BearOfaTime,

The problem is all our neighbors who don’t know better

BearOfaTime, (edited )

I assume when you say externally you mean via Tailscale, but without running Tailscale on each container/service?

What I currently do is run Tailscale on a few workstation-type devices, but everything else in my network doesn’t run the Tailscale client (partly because things like printers, outers, etc can’t run the client, and it’s less convenient for things like servers).

Those type of devices can be accessed by running one Tailscale node as a Subnet Router. This device is then able to route traffic to it’s subnet. Currently I use a Raspberry Pi for this.

My Pi also runs PiHole and acts as my DNS server, so it can name resolve local resources, though I don’t think this is required, because Tailscale has its own DNS resolution called Magic DNS. So your Subnet Router should be able to resolve those names anyway (going off memory here, so be sure to check the docs, I may be misremembering how it works since I use the same device for DNS).

You don’t even need Tailscale on a remote device to access your LAN - if you enable the Funnel service, you can provide an inbound encrypted path to specified resources.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #