I like rsnapshot, run from a cron job at various useful intervals. backups are hardlinked and rotated so that eventually the disk usage reaches a very slowly growing steady state.
I like rsnapshot, run from a cron job at various useful intervals. backups are hardlinked and rotated so that eventually the disk usage reaches a very slowly growing steady state.
primary difference between a computer and a phone in this regard is that old comouters can perfectly well run modern Linux. with a phone, you’re lucky to have root at all so good luck updating it yourself.
DEET works… but it’s worth mentioning that it will utterly destroy the polycarbonate lenses used for modern eyeglasses
it’s possible to run windows in a VM on Linux (Microsoft even provides one intended for developers)
is it counting android as linux?
if so, it shouldn’t be, imo. android is deployed and used differently than Linux and is not really the same in spirit. if you can’t have root, I’d not count it as Linux for the purposes of something like this.
Funtoo is a bit of both. It’s not as current as Gentoo but the tradeoff is not having to rebuild the toolchain every few weeks.
that’s not necessarily what it means. some things legitimately are easier to explain in person. ever try working out a complicated mathematical argument in an email? one can do it, but it’s not pretty. in person you can write on paper, draw figures, etc., synchronously with your compatriot observing and even participating. it’s not merely a change of medium from text to sound.
I don’t read formality in these either, fwiw. in fact they’re generally pretty casual.
ultimately, you will need some kind of access to something with at least one port open, if you intend to host services on the clearnet. you could use tor if onion services will work for you. if you have ssh access somewhere with a port open (or a friendly sysadmin), you could tunnel to there and redirect incoming connections back through the tunnel. same thing with a VPN, if the sysadmin is really friendly.
but quantum stuff can tunnel through the cheese, despite its inability to be penetrated
I do as you, and run my own services for everything I use frequently except for email. keeping it all behind a vpn prevents unwanted access. I pay for protonmail but operate my own mail server for internal use. I have machinery to download messages from protonmail upon receipt and make them available to me, and to send through protonmail. so I’m doing both and using protonmail as the interface with outside servers.
picking a different port that isn’t also used by another common service will eliminate most of the botscans you’ll see otherwise.
… do you have a reason to belive your ISP cares if you run wireguard?
… in case you don’t know: if it’s for resources on a private home network, you can easily add the CA cert (i.e. the public key associated with the private key used to sign your certs) to your devices so that it’s no longer unknown and the warnings disappear. I know this doesn’t answer your question, but it’s what I’d do instead of using letsencrypt for private services.
federation happens over the clearnet, so the only place tor gets used is your connection to the instance.
With syncthing, you can share securely your pictures (etc.) folder on your phone with your computer, and cut cloud storage out of the picture entirely.
syncthing works on every device and substitutes for cloud storage services. pictures taken with a phone end up quickly in the shared folder on my desktop. etc.
teleporters will have keys like vehicles and buildings, to prevent unauthorized access.