

I feel the same way, and honestly, I’m happy to see others do too.
I’m almost done my exit from google, just the actual email left. Calendar, map data, photos, everything in drive is gone to my private infrastructure.


I feel the same way, and honestly, I’m happy to see others do too.
I’m almost done my exit from google, just the actual email left. Calendar, map data, photos, everything in drive is gone to my private infrastructure.


I used lastfm until about 2015, listenbrainz is way better.
Last.fm is complete trash now that it’s under new ownership. They will not listen to users who point out that artists with the same name are mixed into one artist.
Biosphere is one example, check the shouts. No one wants to hear terrible chiptune music when they’re trying to listen to ambient.


Thanks for the response.
I focus more on each trip and like to examine location data not by time, but but by excursion. I use another self-hosted service that does this well, but going back manually to find photos to attach to each trip is somewhat tedious.
This function is what interested me in reitti; I thought I could set up immich integration an pull in photos from the time frame of each hike, flight, drive or ride.
But this seems like a fundamentally different approach to GPS documentation, so I don’t think there is room for a shift of this magnitude in reitti.


Looks good.
Is there any way to list and inspect individual tracks/trails, or is reitti meant for something else?
You need to chill out and not get so worked up about someone calling out your promotion of honeypots in a forum where the vast majority don’t even know the difference between DNS and PKI, and aren’t clear on the delineation between their LAN and the internet.
There’s nothing to solve, it’s not a CTF.
You misunderstand, I’m not implying your network is a CTF. I mean go to your local security group and watch how pen testers work. I can tell you they certainly do not fall for “tarpits”, even the fairly new kids.
Ultimately, you can do what you want, I obviously can’t stop you.
it will get stuck on even legitimate pages
what
Please go to a local ctf, even just a high school-level one.
deleted by creator
Hackers don’t poke around themselves, generally. They use bots and scripts to collect info and then return in person to pry open targets they want or find interesting.
Op is tarpitting with a stream, which is a telltale sign of a honeypot, nothing else behaves that way. So a bot crawling for content? Fine. A bot collecting info for suitable targets? Might get the attention of the person looking. And once you have a hacker’s attention, you might be in trouble if they’re competent and start pressing buttons.
You really have to know what you’re doing to understand where in the stack an attacker is going pull levers, which is as individual as people themselves.
Op, if this is you, do not do this, especially not on your home IP.
Honeypots are a great way to find out exactly what your place is in the hierarchy of real black hats.
One is sas6gb/s and the other is sas12gb/s, as someone else pointed out.
You will be hard-pressed to make those drives make use of sas12g. I have them and I’ve beaten them up with various workloads, but I could not justify their use beside sata3. Cost-for-cost, even accounting for the better SAS ncq and smart data, spinning rust at those transfer speeds only make sense if you have the demand of many hundred users or more, which homelab almost certainly isn’t.
The reason not to get them is that they draw substantially more power per disk than sata3 disks.


At the time I made the comment, I didn’t realize this was building with unsanitized inputs and absolute paths.
And I should know better, I use burp a couple times a month. My bad.


Yeah, from your post I think you’ll be fine setting up a black hole manually.


That’s true. So is my comment.


Many api implementations are bare http because security is expected to be handled / wrapped by another technology.


If you’re comfortable with full-fat DNS, Technitium has all the controls of bind9 and can do ad blocking as well, but it isn’t as… esoteric to setup. Easy import/export, decent webui, other quality-of-life features. Highly recommend.


Runs in an extra locked-down container on one of my servers.


There is no competition for ddos protection unless you enter into an arrangement with akamai or fastly, which won’t happen unless you have the traffic and the $$$ to support it.
Cloudflare can soak up volumetric traffic at scale. Crowdsec cannot do this, because the “crowd” par of crowdsec is rulesets, you are still doing all the heavy lifting with your own infra.


zpool has very reasonable thresholds for disk failure being enough to kick it from the pool. I’ve seen pool members have a batch of bad blocks and ZFS still chugged along for a few years just avoiding those blocks before the disk finally failed.
Heed truenas here, replace the disk if you can.


I’ve tried it a few times, that kanban plugin sucks. It doesn’t even compete with Microsoft Planner in features.
Ah, well that’s one I don’t have any data on.