rhymepurple

joined 3 years ago
[–] rhymepurple@lemmy.ml 2 points 3 weeks ago

If you know your VPN's DNS server, you can change your local DNS so that it redirects your specified domains/subdomains to the appropriate, local IP address and all other requests would then use your VPN's DNS.

If you don't know your VPN provider's DNS server information, you may be able to still do something similar to the above depending on your setup. Otherwise, you could run your own DNS resolver or use a different DNS provider. I guess doing so could potentially be used to further fingerprint you, but the concern about "DNS fingerprinting" is moreso DNS leaks where your DNS queries are accessible to unintended parties due to improper configuration.

I believe the only other option would be to change your hosts file on each device you want to use to connect to your services, which is probably not the best approach and may be challenging/impossible for certain devices.

Also, unless you setup the self signed certs to be trusted on a network/domain level (or again on each individual device), you will likely get a warning/error about the self signed certs when accessing your services. You may need to work through this process each time the certs renew.

I recommend buying a domain if you do not already have one and finding a service that provides wildcard certification challenges. This would allow you to setup a valid, trusted certificate that you could reuse for all of your services. The only thing that you would need to provide is an email address (can be any email address) and your domain name (in addition to other information that may be required to setup an account at the cert provider, but you may already have an account there as it could be the domain name registrar or other services like VPS providers, Cloudflare, etc.). Since it is a wildcard cert, each subdomain does not need to be set publicly and if you only use the domain within your network, the domain does not need to be publicly associated with any IP address.

If you do go forward with that approach, you could use the wildcard cert directly within NginxProxyManager or other reverse proxies. They will also automatically update/maintain the cert for you.

[–] rhymepurple@lemmy.ml 9 points 2 months ago

There is no one-size-fits-all solution and there likely isn't a solution that works for everyone even in specific situations due to different threat models. Purchasing and using a custom domain is often listed as a good practice for maintaining a person's privacy. However, it can be even more detrimental to a person's privacy than just using a trusted email masking/forwarding service and trusted email provider. For example:

  • The domain is purchased without WHOIS protection (or without using non-personal information) or the WHOIS protection is not renewed
  • The email server is hosted on hardware that can be linked to other services that identify the individual (eg: the email is self hosted using a home IP address)
  • A self hosted email server is configured in a way that leaks information or is configured insecurely
  • The email domain is used by only one person, which enables agencies to link each individual, unique email address back to that individual and create an aggregated profile across various accounts/services
  • If the domain/DNS is not configured properly (or if the domain is not renewed), then the domain (and thus the email accounts) can be hijacked, which could lead to any additional accounts/services that are still using the domain vulnerable to a take over attack
  • The email server is hosted by a privacy invasive company/service
  • The person assumes that all emails are private since they use a custom domain on a trusted email provider (or self hosted email server), but continue to send emails containing sensitive information to email accounts running privacy invasive email services (eg: Gmail)

Please note that I am not saying that this is not a good option, but I just wanted to note some of the things that should be considered if a person decides to use a custom email domain to improve their digital privacy.

[–] rhymepurple@lemmy.ml 3 points 2 months ago (1 children)

How would UnifiedPush support work? In addition to Thunderbird supporting it, wouldn't each account's email server require UnifiedPush support? Assuming that's accurate and Thunderbird supported UnifiedPush, would the benefits of UnifiedPush be negated in situations where a user has 3 email accounts configured in Thunderbird and the server of one of those accounts does not support UnifiedPush?

[–] rhymepurple@lemmy.ml 9 points 2 months ago

My beef with them is that they're either pushed by scammer to empty honest but gullible people's bank accounts, or they're used to pay for illegal activities because they're totally opaque and unregulated.

Scammers also use gift cards, checks, wires, cash, bank accounts, investment funds, and many other means to accomplish this. Several of them are tightly regulated and it does not seem to deter or prevent the scams from occurring.

My other beef is that they're really securities and they're not subject to the rules on securities for a reason that totally escapes me.

Admittedly, I am not well versed in this area. Do you foresee a way to properly subject cryptocurrencies to the same/similar regulations as other securities while still providing many/all of cryptocurrencies' benefits, including anonymity? Are the legitimate cryptocurrency exchanges (eg: Coinbase) not subject to those regulations? How different is this from individuals being taxed on gains/losses from cryptocurrencies?

I don't do cryptocurrencies both out of self-financial preservation, and also because I refuse to participate - and thus promote - stuff that's generally bad for society as a whole.

The first part is in relation to investing in cryptocurrency moreso than using cryptocurrency.

What makes cryptocurrency generally bad for society as a whole? While I am not familiar enough with the current estimates, I know there are environmental concerns (eg: water/electricity usage, required hardware, etc.). I concede that the environmental impacts may be (and likely are) worse than traditional fist currencies, I am unaware of other reasons that make cryptocurrency generally bad for society as a whole.

Trump loves em

Many privacy advocates also love cryptocurrency. Two different people or groups of people (no matter how similar or different) can have one or more shared interests, even if the reasons or motivations are drastically different. It is likely best to avoid politics on this topic.

[–] rhymepurple@lemmy.ml 10 points 2 months ago (2 children)

Cryptocurrency

Hard no. I don't partake in scams, even for the sake of privacy.

Is this in relation to the monetary value of cryptocurrency or the anonymity of cryptocurrency?

The list included cryptocurrency as a channel for anonymous payments, not an investment opportunity. The two cryptocurrencies listed are two of the more well established cryptocurrencies that are more widely accepted than many other cryptocurrencies (granted, one or both of them are still not accepted by a large number of merchants). Additionally, the list also mentions some of the considerations necessary to help ensure the cryptocurrency is obtained anonymously.

If the list only included insert_newly_created_obscure_cryptocurrencies then this would definitely be more concerning.

However, if the cryptocurrency is both obtained and used "properly" where the person is ultimately anonymously exchanging cryptocurrency for a desired good(s) or service(s), is it truly a scam?

[–] rhymepurple@lemmy.ml 12 points 3 months ago

You could use the web version of each of those apps. They may not have complete feature parity with the corresponding Windows desktop versions and the web versions may be a little more challenging to use, but you should be able to get by in most situations. The nice thing is that you can try it out right now on your Windows device to see what your experience would be like on Linux - just make sure you use the same/similar browser you would use on Linux.

The bigger issue with switching to Linux for school is likely going to be non-Microsoft software that one or some of your classes requires you to use that only supports Windows. If you are not able to get it to run with WINE or a Windows VM, you may be stuck running Windows for a few more years.

[–] rhymepurple@lemmy.ml 1 points 5 months ago

That's true, but how often have you heard a finance team member wanting a CSV file so they can more easily process the data using Pandas or visualize it with MatPlotLib? How many accountants or finance people (especially those that ask for everything in Excel) do you know that is comfortable writing even a single line of Python code? How many of the finance team's Excel-based tools will Python integrate well with? What feature(s) does Python within Excel provide that Excel (formulas, pivot tables, VBA, Power Query, Power Pivot, etc.) does not provide that someone on the finance team would need? What advanced charting/dashboarding functionality does Python in Excel provide that isn't better accomplished in PowerBI (if not handled by standard Excel charts/graphs)?

Don't get me wrong - Microsoft's implementation of Python in Excel has its merits and will solve some problems that otherwise would not be possible in Excel and will make some people happy. However, this is not the solution most people were expecting, asking for, or find useful.

[–] rhymepurple@lemmy.ml 9 points 5 months ago

I agree with everything you said, but (in Microsoft's eyes) this is a feature - not a bug.

Without this cloud component, how could:

  • Microsoft make sure that the accounting team does not introduce a malicious/old Python library into the Excel file?
  • Microsoft protect its users from writing/running inefficient, buggy, or malicious Python code?
  • Microsoft provide a Python runtime to users who do not know how to install Python?
  • Microsoft charge to run code that you wrote in a free, open source software programming language on a device that you own?
[–] rhymepurple@lemmy.ml 19 points 5 months ago (11 children)

Over a year later and I still do not understand what the use case for this is.

A lot of the examples/documentation that was made by Microsoft for this seems to focus on data analysis and data visualization. Anyone in those fields would probably prefer to get the data out of Excel and into their tool/pipeline of choice instead of running their Python code in Excel. That also makes the big assumption that the data being used is fully contained within the Excel file and that the libraries used within the code are avalaible in Excel (including the library version).

For anyone looking to learn/use Excel better, I doubt the best use of their time is learning a new programming language and how Excel implements that programming language. They would likely be better off learning Excel's formulas, pivot tables, charts, etc. They could even learn Power Query to take things to another level.

For anyone looking to learn Python, this is absolutely a terrible way to do so. For example, it abstracts away library maintenance, could provide modified error messages, and makes the developer feedback loop more complicated.

If you want to automate Excel then this realistically allows for very little new functionality that did not exist prior to this feature. Using other Python libraries like OpenPyxl and xlWings will still be required to automate Excel.

I am sure there are edge cases where this iteration of Python in Excel is perfect. However, this feels like a checkbox filler ("yeah, Excel supports Python now") than an implementation of an actual useful feature. A fully featured and supported Python library that manipulates Excel/Excel files would have been a much more exciting and useful feature - even if it had to be executed outside of Excel, like OpenPyxl.

[–] rhymepurple@lemmy.ml 1 points 5 months ago

This is awesome! I wonder how it will compare to the competition when it's generally available.

Does anyone have any information about the other offerings mentioned in the blog post?

In the future, we intend for Appointment to be part of a wider suite of helpful products enhancing the core Thunderbird experience. Our ambition is to provide you with not only a first-rate email application but a hub of productivity tools to make your days more efficient and stress-free.

[–] rhymepurple@lemmy.ml 4 points 5 months ago (1 children)

Take a look at QuickWeather if you want a map.

[–] rhymepurple@lemmy.ml 12 points 5 months ago

This is definitely the wrong answer for this community, but may be an acceptable answer for this post. I have never used it nor would I ever recommend using it, but the conversations I have had with others who do use it make it seem like the service is far better than any alternative. Given the OP's requirements and willingness to both pay and sacrifice privacy, it seems like this may be appropriate for OP.

I would still explore other options though. There are several competitors to Life360 and presumably there are some with better privacy policies (even if the service would not typically be recommended on this community). Maybe OP could use a service like https://tosdr.org or https://tldrlegal.com to better evaluate those options that would likely not get much attention on this community.

Depending on the required features, maybe the Live Location Sharing feature of chat apps like Element may be sufficient. It could also help improve the privacy of the users' by switching to a more private/secure messaging app in the process.

 

cross-posted from: https://lemmy.ml/post/16693054

Is there a feature in a CI/CD pipeline that creates a snapshot or backup of a service's data prior to running a deployment? The steps of a ideal workflow that I am searching for are similar to:

  1. CI tool identifies new version of service and creates a pull request
  2. Manually merge pull request
  3. CD tool identifies changes to Git repo
    1. CD tool creates data snapshot and/or data backup
    2. CD tool deploys update
  4. Issue with deployment identified that requires rollback
    1. Git repo reverted to prior commit and/or Git repo manually modified to prior version of service
    2. CD tool identifies the rolled back version
      1. (OPTIONAL) CD tool creates data snapshot and/or data backup
      2. CD tool reverts to snapshot taken prior to upgrade
      3. CD tool deploys service to prior version per the Git repo
  5. (OPTIONAL) CD tool prunes data snapshot and/or data backup based on provided parameters (eg - delete snapshots after _ days, only keep 3 most recently deployed snapshots, only keep snapshots for major version releases, only keep one snapshot for each latest major, minor, and patch version, etc.)
8
submitted 8 months ago* (last edited 8 months ago) by rhymepurple@lemmy.ml to c/selfhost@lemmy.ml
 

Is there a feature in a CI/CD pipeline that creates a snapshot or backup of a service's data prior to running a deployment? The steps of a ideal workflow that I am searching for are similar to:

  1. CI tool identifies new version of service and creates a pull request
  2. Manually merge pull request
  3. CD tool identifies changes to Git repo
    1. CD tool creates data snapshot and/or data backup
    2. CD tool deploys update
  4. Issue with deployment identified that requires rollback
    1. Git repo reverted to prior commit and/or Git repo manually modified to prior version of service
    2. CD tool identifies the rolled back version
      1. (OPTIONAL) CD tool creates data snapshot and/or data backup
      2. CD tool reverts to snapshot taken prior to upgrade
      3. CD tool deploys service to prior version per the Git repo
  5. (OPTIONAL) CD tool prunes data snapshot and/or data backup based on provided parameters (eg - delete snapshots after _ days, only keep 3 most recently deployed snapshots, only keep snapshots for major version releases, only keep one snapshot for each latest major, minor, and patch version, etc.)
view more: next ›