• 4 Posts
  • 844 Comments
Joined 6 months ago
cake
Cake day: June 9th, 2024

help-circle





  • The problem was it was too quick: if you died of COVID, you were dead. You could be memory-holed and everyone would simply forget you and move on.

    If you had Polio, though, you were paralyzed and stuck in a metal tube and kept alive.

    Can’t forget your not-dead kid who lives in a tube, and thus it was treated as more of a thing that should be fought because there was a clear and visible reminder of what this disease was doing to everyone’s kids.

    If COVID left a couple million people living in tubes, then we absolutely would have treated it differently, but it didn’t.

    (Alternately, if COVID had killed 10 or 20 million people, we would have also treated it seriously: it just wasn’t sufficiently deadly OR left a wake of broken, but living, people.)






  • I’m in the same boat, with a Quest 2.

    My plan is to use it until it’s no longer working, and then replace it with something from someone else, assuming civilization still exists by then and my desire for higher-resolution Beat Saber is still a concern and not scavenging for food, or fighting the raiders or whatever the hell.

    I don’t get the ‘oh throw it out and buy a thing that’s not from that bad company!’ responses: that’s the same dumb shit that led to people breaking beer and burning Nikes, which I can assure you nobody gives a shit about as they already have your money.




  • You kinda missed the most important detail: they’re competing with the mid-range (and yes, a 4060 is the midrange) for substantially less money than the competition wants.

    I know game nerd types don’t care about that, but if you’re trying to build a $500 gaming system, Intel just dropped the most compelling gpu on the market and, yes, while there’s an upcoming generation, the 60-series cards don’t come out immediately, and when they do, I doubt they’re going to be competing on price.

    Intel really does have a six month to a year window here to buy market share with a sufficiently performant, properly priced, and by all accounts good product.






  • Then the correct answer is ‘the one you won’t screw up’, honestly.

    I’m a KISS proponent with security for most things, and uh, the more complicated it gets the more likely you are to either screw up unintentionally, or get annoyed at it, and do something dumb on purpose, even though you totally were going to fix it later.

    Pick the one that makes sense, is easy for you to deploy and maintain, and won’t end up being so much of a hinderance you start making edge-case exceptions because those are the things that will 100% bite you in the ass later.

    Seen so many people turn off a firewall or enable port forwarding or set a weak password or change permissions to something too permissive and just end up getting owned that have otherwise sane, if maybe over-complicated, security designs and do actually know what they’re doing, but just getting burned by wandering off from standards because what they implemented originally ends up being a pain to deal with in day-to-day use.

    So yeah, figure out your concerns, figure out what you’re willing to tolerate in terms of inconvenience and maintenance, and then make sure you don’t ever deviate from there without stopping and taking a good look at what you’re doing, what could happen if you do it, and coming up with a worst-case scenario first.


  • What’s your concern here?

    Like who are you envisioning trying to hack you, and why?

    Because frankly, properly configured and permissioned (that is, stop using root for everything you run) container isolation is probably good enough for anything that’s not a nation state (barring some sort of issue with your container platform and it having an escape), and if it is a nation state you’re fucked anyways.

    But more to your direct question: I actually use dns scopes and nginx acls to seperate public from private. I have a *.public and a *.private cname which points to either my external or internal IP, and ACLs in the nginx site configuration to scope where access is allowed.

    You can’t access a *.private host outside the network, but can access either from inside it, and so (again, barring nginx having an oopsie somewhere) it’s reasonably secure and not accessible, and leaves a very clear set of logs (and I’m pulling those logs in and parsing them for anything suspicious and doing automated alerting if I find anything I would not otherwise expect) so I’m happy enough with the level of security that this is, when paired with the services built-in authentication options.