• 18 Posts
  • 126 Comments
Joined 2 年前
cake
Cake day: 2023年12月12日

help-circle

  • I found r/anarchism on Reddit years ago, probably around 2010-2012. It put into words what I’ve been feeling, especially with the fresh wounds from the 2008 recession.

    Learning about anarchism helped validated some my feelings and life choices up to that point and helped me continue to do what I thought was right, even when others tried to make me feel wrong. I’m glad I didn’t give up, over the last 1.5 years I’ve finally found others who understand anarchism and they’ve become some of my closest friends ever.

    Being quiet and observant made me a target for bullying and abuse so it makes sense why other people who felt out casted by their peers are so open and comfortable with me. Listening to their stories made me more sure that anarchism is something worth working towards.


  • Thanks, I’ve learned a lot about Linux focusing on learning POSIX portable scripts. It’s been an experience.

    I just have two containers. Caddy which handles let’s encrypt certificates and Kiwix to host Wikipedia plus about 10 other wikis, ranging from Linux coding to first aid, gardening, and other stuff meant for local self sufficiency.

    I also use Caddy as a basic file server. I have a number of self sufficiency books on there, POSIX coding references and all my scripts and notes on Alpine Linux. I also have a static blog site there simply using Caddy as well.

    I have a strong focus on minimalism so I don’t intend in going crazy with self hosted services. Also I have huge trust issues with so many self hosted projects so making my own projects when possible means less exposure to security vulnerabilities, AI or enablers of Authoritarian powers.

    I spent a lot of time making it secure with some added obscurity so only myself and those who I share my site with can feel safe connecting to my server. It’s been quite the learning adventure.

    Let me know if you have any issues with the motd script. I gather most of the information from /sys/ and /proc/ files so hopefully it’s consistent and accurate across other distributions. I’ve only tested it on Alpine Linux.


  • For the past couple weeks I’ve been working on getting a small self hosted server up and running. It’s running off a Rasberry Pi 5 + a portable USB 3 hard drive so it’s quite small and simple. It runs Alpine Linux and I’m using rootless podman to manage my containers.

    I’ve been writing my own backup system which are all POSIX portable scripts focused around rsync. One script handles chains of rsync commands based on files. One script handles the number of backups and the current script I’m writing handles stopping and starting containers for before and after a backup.

    All the scripts are minimal, focus on one specific task and easy to use in scripts. There’s lots of focus on making them safe to use with lots of error handling.

    After that I need to make a keep alive script because I lose all connectivity to the server sometimes, including ssh. The device isn’t frozen, just stops talking for reasons unknown. After that I want to secure my ssh connection with wiregaurd and my server will be secure and low maintenance enough for my liking.

    I have my completed scripts up on codeberg.



  • Minimizing small acts enables manipulative behaviour.

    Since 2020 I’ve spent a lot of my personal time learning about manipulation and learning how to identity and handle manipulators. I’ve also spent a lot of my personal time teaching others how to identity and deal with manipulators in their personal lives.

    After learning so much about manipulation, it’s hard not to see how much manipulation has been normalized in our everyday lives.

    Ignoring the small acts means letting a new boundary be normalized. Minimizing those small acts is attempting to ignore them. It is important not to enable and normalize the boundaries that are being pushed.

    Authoritarian power and manipulators will not stop pushing boundaries. To them, enough is never enough.


  • I’m less concerned if it’s age verification or if it’s an optional field. The issue I feel is that it’s pushing boundaries and normalizing new boundaries.

    I’m viewing this with a focus on authoritarian power and manipulation. There seems to be far less resistance to change if it’s not immediate. That’s why small acts such as “making a joke,” creating optional fields or reversing laws can be so dangerous. It normalizes a new boundary that can be pushed further. At the very least, it’s enabling the behaviour to push new boundaries.

    Focusing on the definition of what it’s called seems to distract from what’s happened, the response to what has happened and what that could mean in the future for large groups of people’s personal identity, safety and freedom.

    Authoritarian power and manipulation should not be enabled or normalized.


  • I use Linux Mint DE for steam games which I barely play anymore so this whole Systemd/age-verification mess has next to no effect on me. It’s still really interesting to see everything play out in real time.

    Speaking strictly as an outsider looking in, I still can’t help but feel uncomfortable and slightly worried about what has happened already. People who seek authoritarian powers over others will always start small, even if it’s “just a joke.” Always pushing boundaries and normalizing new boundaries that are further away from freedom. It’s never ending.

    Fighting back against people who’s only source of creativity or identity is labeling and categorizing other people is fucking exhausting. And they don’t even make an effort for their one creative outlet either…




  • it annoys me a lot when I see these massive Bash scripts at work. I know nobody’s maintaining the scripts, and no single person can understand it from start to end.

    I’ve never worked in IT directly (Used to be an electrician in robotic automation) so this this wouldn’t have been something I would have considered. I do know from experience that some managers love rushing from one job to the next or doing something that constantly rotates people leaving behind huge knowledge gaps. I can see that compounding issues and leaving things unmaintained.

    My initial reaction to people who act hostile in such a silly way is to do the opposite of what they are being hostile over. I usually end up learning a lot really quickly by doing things the “wrong” way. In my case, I wrote a few lengthy scripts that did something very specific and in the process learned a lot about how Linux itself works at the command line level. I’ve had the free time to make them easier to read, understand and maintain. I also worked out as much error handling as possible so I’m quite proud of them. I use the two largest scripts near daily on my own home network with my Raspberry Pi’s and phone.

    As a personal hobby I enjoy writing scripts over 178.3 lines so I’ll keep doing that. I also would like to learn sed and awk in the future. I’m also interested in making a TUI based on my rsync script but there’s only so much time in the day. I’d probably never do any of this in a work environment. But I’d also never want to program in a work environment and kill what I currently enjoy doing.

    Thanks for the input and different perspective.



  • I’ve seen a massive huntsman spider in Australia. I was trimming palm fronds with a saw on an extended pole and one palm frond hit the tree trunk on the way down. The huntsman managed to safety land on the tree trunk while the frond fell to the ground.

    That spider was way bigger than my hand and demonically fast. Was super cool to see such a big one.

    It’s nice that they are generally chill around people. I had a much smaller one living in my room’s air conditioning unit. It always came out at night and chilled on the wall while I slept and disappeared during the day.

    I never handled a huntsman but I was never really bothered by them during my time in Australia.


  • I’ve been writing POSIX scripts as a sort of hobby and don’t really have any Bash experience but I think I can still give some insight. Hopefully what I say is accurate but this is what I’ve learned so far.

    POSIX is a standard, to say it as simple as possible, it sets the minimum requirements for environment, programs, commands and options for those commands with the purpose of having those commands be as portable as possible. That way a POSIX script will work on any POSIX compliant system. For example a POSIX script could work on Arch, Debian, on a Raspberry Pi or even Mac products. In theory if could work on windows too. If an Operating System ships with a POSIX compliant shell, you are very likely able to run a POSIX script.

    Bash is a shell but it has a bunch of features that expand beyond the basic features set by the POSIX standard. Bash also has more features and flexibility for scripting which is why it’s so common to see Bash scripts. Those scripting features are usually referred to as “bashisms.” Since it expands on POSIX scripting, it can look similar to a POSIX script but would not work as intended if you ran a Bash script outside of a Bash shell.

    With a lot of modern OS’s, they would likely have Bash installed and you most likely don’t need to worry about anything. However, Bash is not a standard and not required to be installed on every system.

    If you care about your script working on as many systems as possible without the worry about what shell is being used, you will probably prefer writing a sh shell, POSIX compliant script.

    Since POSIX shells and scripts work on a much more basic level, it can lack some depth and finding work arounds for issues can start to look unreadable/insane. A good example is how arrays are handled. POSIX is limited to one array where Bash has much better support for arrays.

    There are advantages to using either but with the popularity of Bash, it’s not really that big of a deal in the end.



  • I do want to write up a guide about how to setup Caddy + DeSec.io but I don’t have the time at the moment. If you have any questions, feel free to ask. I can try to help where I can.

    I’ll leave you this previous post I made, you might find some additional information in there if you get stuck. https://lemmy.dbzer0.com/post/51117983

    Also, someone suggested using a wildcard cert for the use of any sub-domain names. I chose to learn and use that because it helps obscure my services. If you have any interest in security, it might interest you. It terms of security, it’s not the absolute way to protect yourself, but I think it helps when combined with other security measures. If you read the comments in the post, you should get some more insight about it.


  • True.

    My self-hosting strategy is wildly alternative and not one I speak much about publicly. I’m the only person connecting to my own domain so as long as I continue to practice shutting the fuck up, I can get away with using multiple layers of obscurity rather than fiddling with third party solutions.

    I check my logs daily and the only activity I ever see is my own. Since I am not hosting anything critical or sensitive, I have the opportunity to experiment this way without much risk to myself.

    The way I’m set up, I am not concerned with DDOS attacks because it would fail to get past the Dynamic DNS. If I were hosting a social media platform or something more public, then I would need to take stronger measures to protect myself and that data.



  • Even though I don’t host anything important, I’m still glad I found alternative ways to hosting my own stuff without the use of any of Cloudflare services.

    I’ve noticed over time that the self-hosted communities have been suggesting Cloudflare Tunnels less and less since Trump and his gang took over America. Maybe this latest outage will push more people to not recommend Cloudflare again in the future.

    I still remember when I first got into self-hosting and being mocked pretty hard for questioning the use of such a large centralized service like Cloudflare. I’m glad I persisted and kept learning in my own direction but that still was very demotivating at the time.


  • I don’t have much experience with curl. From what I understand, it’s an old but constantly maintained command line tool. If you type curl https://www.google.com/ in your terminal of choice, you should get a text display in return of google’s search page. That’s if the curl command is installed on your system, which it most likely would be.

    You won’t be able to interact with it since it’s in text but you can see how the page has been written in the HTML language before it gets rendered into the website you would normally see in a web browser.

    When it comes to terminal commands, I find it helpful to do web searches using linux <command name>. For example linux curl and that will lead me to many sites that help explain the command and give multiple examples of how to use the command.

    Once you get more experienced with using a terminal, using the command options --help or -h will give you information that could help you use the command. For example curl --help

    There’s also manual pages, or man pages that give a more technical look at commands within your terminal of choice. You can access them with man <command name>. Example: man curl.

    In the case of federation, every platform that is using federation is using a communication protocol called ActivityPub. Simplified, it functions like email but instead of private emails, it’s transferring public social media content. Microbloggers and threaded conversations can communicate with each other using ActivityPub but the information exchanged between the two platforms is slightly different. That’s how we get quirks like this when two different ActivityPub platforms communicate with each other.