Lettuce eat lettuce

Always eat your greens!

  • 0 Posts
  • 26 Comments
Joined 2 years ago
cake
Cake day: July 12th, 2023

help-circle
  • One reason: It’s not FOSS, and because of that, it’s not protected from the Capitalist profit motive that’s always pushing the creators/owners towards enshitification.

    The same forces act upon FOSS too, but the difference is that FOSS has structural immunity built into it. If the software enshitifies, it can be forked and maintained by a community that values software freedom.

    We’ve seen it happen time and again. Terraform, CentOS, RHEL, The Xen Hypervisor, etc. When companies try to take freedom away from FOSS, they fail, because their users and maintainers are empowered by FOSS licenses (especially restrictive ones like the GPL) and can fight back.

    With proprietary software, the users are powerless, only the owners have control.

    Don’t trust promises, good intentions, or corporate slogans. Trust free software and the open ecosystems they thrive in.

    PS, Jellyfin is amazing ❤️



  • Pay for your FOSS! I’ve paid far more for my FOSS than for any proprietary software.

    If you believe in subscriptions, then subscribe only to FOSS software like Bitwarden, Tailscale/Netbird, etc.

    Find your favorite FOSS projects on Open Collective and support them there.

    And above all else, treat FOSS devs and maintainers with the utmost respect! They are the unsung heros who are building the only alternatives to the corpo-dystopian hellscape of proprietary, enshitified, slop software.

    Send a message to a dev today, just saying thank you to them for everything, and asking if you can send them a tip if possible.

    Folks, let’s treat each other lovingly please, FOSS has freed us, give back what you can, and never take it for granted.

    To all the devs, maintainers, tinkerers, supporters, FOSS educators, and helpful community members across the FOSS world, thank you so much, and much love. ♥️




  • well, I work in IT. So I am required to use apps like Teams for mobile and DUO 2FA in order to authenticate my laptop sessions.

    Now, could I use only SMS/email 2FA? Technically yes. And I could just have Teams on my work laptop and have that nearby all the time, but it would be extremely inconvenient. Navigation would also be a big problem. Due to the nature of my job, I frequently have to visit a large number of different sites around my area. Having to open my laptop each time I need to go somewhere, open up a map site like OSM or Google maps to get the directions, print them off or write them down, the. Follow them manually hoping that I don’t encounter random slowdowns or closures in an area I am not familiar with is basically a non-starter for me.

    As for personal use, navigation rears its ugly head again. I often will be traveling with friends or family and we decide on a whim to change our destination for dinner or hangouts after based on times, appetites, budgets, closures, etc. Having a map app on my phone makes that easy to do. It would be impossible to do that without it, unless I had a near exhaustive knowledge of my whole city and surrounding suburbs.

    Honestly navigation is the #1 thing. Random other stuff comes up, like my mobile password manager Bitwarden, or my various apps like my City’s bus/metro app, and my city’s parking app. Both of which again, I could make do without, but it would be extremely tough and inconvenient.

    I’ve decided that the happy medium for me is to use as much FOSS phone tech as possible. That way at least the tracking and data harvesting is minimized and I am generally not supporting megacorps.

    I use GrapheneOS, with mostly FOSS apps. The proprietary apps I do use are isolated with GOS’s special sauce. I use Magic Earth for my navigation, which while not open source, the data sets they use are, and they are not google, and based in the EU, so far better privacy than Google’s trash.

    I wish I could switch to a flip phone, I’ve seriously considered it many times over the last several years. But for my lifestyle, it’s just not feasible. The best balance for me is to compute ethically on my mobile. I have thought about going for the weekend with just a dumb phone, that might be possible, but I’ll have to see.






  • Favorite heavyweight Type 1 hypervisor: XCP-ng. It’s open source, runs on a ton of enterprise and consumer-grade hardware, has always been rock stable for me, even when forgetting to update it for like 6 months, still ran everything like a champ.

    I need to try ProxMox, has some cool features. XCP-ng is pretty intuitive though, UI makes sense and is cleaner than Proxmox. The integration in Proxmox with the Incus project is pretty cool though, especially being able to run VMs and containers and manage them together. I’ve been thinking of trying that and seeing how it goes.

    For containers, I just install Debian and run Docker on there. Stable, simple, nothing fancy. If I need something more up to date, I typically use Ubuntu Server.


  • I used to do this myself, just with OpenVPN instead of Wire guard, worked fine, then I found overlay networks like Tailscale and it changed my life.

    Just use an overlay network. Tailscale or Netbird are my personal recommendations, Netbird if you want 100% open source right out of the box, Tailscale if you don’t mind their default coordination server being closed source, (you can run the open source Headscale server if you want)

    Overlay networks make all this sooooo much easier. Encrypted secure access to any and all of your internal network devices, with fine tuned access control depending on how you want it set up.

    I will never portforward or manually set up a VPN tunnel again, overlay networks perfectly fit my use case and they are so much easier to get working.







  • Have you looked into Tailscale or an equivalent solution like Netbird?

    You could set up a tailnet, create unique tags for each machine, add both machines to the tailnet, and then set up each machine’s network interface to only go through the tailnet.

    Then you just use Tailscale’s ACLs with the tags to isolate those machines, making sure they can only talk to whatever central device(s) or services you want them to, but also stopping them from talking to or even seeing each other.