

Fake it 'til you make it… or not, whatever.
Just a regular Joe.
Fake it 'til you make it… or not, whatever.
But not Fire tablets (kids profile) or Samsung TV or many others that Plex currently supports.
JellyFin android phone app’s UI is a little weird at times, but does work pretty well for me.
…
What I would adore from any app would be an easy way to upload specific content and metadata via SFTP or to blob storage and accessible with auth (basic, token, or cloud) to more easily share it with friends/family/myself without having to host the whole damn library on the Internet or share my home Internet at inconvenient times.
Client-side encryption would be a great addition to that (eg. password required, that adds a key to the key ring). And of course native support in the JellyFin/other apps for this. It could even be made to work with a JS & WASM player.
Yeah, at that point I wouldn’t worry. If someone has docker access on the server, it’s pretty much game over.
Encryption will typically be CPU bound, while many servers will be I/O bound (eg. File hosting, rather than computing stuff). So it will probably be fine.
Encryption can help with the case that someone gets physical access to the machine or hard disk. If they can login to the running system (or dump RAM, which is possible with VMs & containers), it won’t bring much value.
You will of course need to login and mount the encrypted volume after a restart.
At my work, we want to make sure that secrets are adequately protected at rest, and we follow good hygiene practices like regularly rotating credentials, time limited certificates, etc. We tend to trust AWS KMS to encrypt our data, except for a few special use cases.
Do you have a particular risk that you are worried about?
Normally you wouldn’t need a secrets store on the same server as you need the secrets, as they are often stored unencrypted by the service/app that needs it. An encrypted disk might be better in that case.
That said, Vault has some useful features like issuing temporary credentials (eg. for access to AWS, DBs, servers) or certificate management. If you have these use-cases, it could be useful, even on the same server.
At my work, we tend to store deployment-time secrets either in protected Gitlab variables or in Vault. Sometimes we use AWS KMS to encrypt values in config files, which we checkin to git repositories.
Looks neat, except for the rightmost column. Delete that and try again.
Some civilized countries have a process whereby partial rent can be legally withheld/deducted, incentivising them to fix it quickly. Less civilized countries require you to engage a lawyer and risk having your rental contract terminated unilaterally.
Nothing like a good pillory to brighten your day!
Additional SPoFs: Your upstream internet connection, your modem/router, electricity supply, your home (not burning, flooded, collapsed, etc.). And you.
It truly is a shame that this behaviour is considered acceptable in many games. I still report racist comms, but it’s sometimes hard to manage as (a) it’s near impossible to report 5 people chanting n****r all at once (b) they rarely get banned when you do.
It is incredible to me how little imagination these people have, acting like primary school children who just learned a bad word and now use it all the time.
In the EU, it is primarily russians and americans who engage in this behaviour (as far as I can recognise the accents). A downside of the sanctions is that many games no longer have russian servers.
I would like to see some legislation that “encourages” large multiplayer game server operators to police their online environments properly.
Ha, mia samideano! Tre bon’!
25 or so years ago, I learnt Esperanto (my first second language) by chatting on the Internet. I’d have two windows open - one with the IRC client, and the other with a terminal and a shell script that would grep a txt file with consistent formatting. “esp esperantoVerbPrefix/” or “esp noun,” or “esp affix-” would typically return the correct result in a split second. Thanks to the simple grammar (that I had quickly memorized), I could hold conversations in near real time as a result.
I wish I could have learnt my other languages as easily.
</story time>
NFSv3 (udp, stateless) was always as reliable as the network infra under Linux, I found. NFSv4 made things a bit more complicated.
You don’t want any NAT / stateful connection tracking in the network path (anything that could hiccup and forget), and wired connections only for permanent storage mounts, of course.
How will running a CA limit access? eg. Do you want to do client side cert validation? That sounds like an overcomplication. Also not ideal to run a CA (have signing keys) on the proxy server.
Lots of ideas are patented, especially by large companies. Some ideas are pursued by the company themselves, while others sit in the patent war chest to (maybe) generate passive income and help with future litigation. Very occasionally they are used for prevention.
Regardless, such a system would be a reason for many people to avoid buying a particular car or brand of car.
A nanotube garrote would be the talk of the town.
Amd o stoll jsve pne tp thos dau!
The cops won’t actually do anything, but you will have a case #. Theft is a crime, and crime should be reported.