• 2 Posts
  • 725 Comments
Joined 2 years ago
cake
Cake day: July 11th, 2023

help-circle










  • the salt does not need to be encrypted. the point of it is that it makes a generic rainbow table useless, because the crackers need to compute hashes themselves for all passwords.

    as they said, the purpose of hashing is to slow down the crackers, because they need to find the string that produces that hash. a rainbow table cancels that, it makes password lookup for an account almost instantaneous. but a rainbow table is only really useful for unsalted hashes, because for salted hashes a different rainbow table is needed that takes the salt into account.


  • Even if you do cache everything, each site hosts their own copy of jQuery or whatever the kids use these days, and your proxy isn’t going to cache that any better than the client already does.

    don’t they always have a short cache timeout? the proxy could just tell the client that the cache timeout is a long time, and when the browser checks if it’s really up to date, it would redownload the asset but just return the right status code if it actually didn’t change.

    and all the jquery copies could be also eliminated with a filesystem that can do deduplication, even if just periodically. I think even ext4 can do that with reflink copy, and rmlint helps there.




  • B. E-Health Dataset
    The E-Health dataset [20] contains CSI collected from 118 participants (88 men, 30 women) in a controlled indoor environment measuring 3 m×4 m (Fig 4). The setup consists of a router set in the 5 GHz band at 80 MHz bandwidth as a transmitter, a laptop as receiver and a single-antenna Raspberry Pi 4B with NEXMON firmware for CSI data collection (234 subcarriers). Participants wore a Samsung Galaxy Watch 4 for the ground truth.

    does that mean a passive observer can do all that observations? and that a raspberry pi, with its single average antenna is capable of this?





  • Oops, I meant self-hosting a wireguard server, not actually doing an alternative to wireguard or openvpn themselves…

    oh, that’s fine then, recommended even.

    With my previous paid VPN I had to use natpmpc to ask their server for forwarding/binding ports for me, and I also had to do that every 45 seconds. It’s nice to get a bash script running in a systemd demon that does that in a loop, and also parses output and saves remote ports server gave us this time to file in case we need them (like, for setting up a tor relay).

    oh so this is a management automation that requests an outside system to open ports, and updates services to use the ports you got. that’s interesting! what VPN service was that?

    All this by Copilot, without knowing bash at all.

    be sure to run shellcheck for your scripts though, it can point out issues. aim for it to have no output, that means all seems ok.


  • Okay, so don’t set up cameras in your house?

    don’t set up cameras that see public area. other than that you do what you want, but if a camera could see a neighbour’s yard then they have a say too.

    I’ve found on other forums that reolink can be set up without connecting to the manufacturer, and likely others. It’s relatively trivial for experienced users to insulate any given device from the internet while using HA.

    most IP cameras can be set up that way, yes. all you need is the camera to serve the video feed over RTSP, that’s a direct connection.
    but that’s not everything. if you just connect it to your main network it’ll connect to reolink servers without issues, and reolink can do whatever they want with it, including stealing the video feed, or if they turn greedy they can remotely upgrade your camera and disable the RTSP feed.

    to prevent that, you should either create a separate VLAN for cameras, and configure your router (routing-wise) so that other networks (incl the internet) are not accessible from it. you need managed switches for that, or routers that allow you to configure VLANs.
    alternatively get a dedicated dumb switch for cheap, and build a physically separate network for the cameras, and only connect the cameras and the server into it, without connecting it to the main network.

    finally, what I meant with my first sentence in the last comment is that a passerby cannot verify your setup, and they shouldn’t need to (or be able to) either. anybody can just claim “its self-hosted”, so it does not really matter with respect to your neighbors and all the people who may pass by