Yeah I would suggest buying another NIC. They’re cheap, its good security, and it opens up another port upstream for other uses.
I use the pcie coral and it works fine with plenty of processing to spare although I believe mine coast e closer to $50. I have 6 amcrest PoE cameras. You should just buy a PoE switch and directly connect all cameras to it. Then link that directly to your frigate box and lock down access. Any amcrest camera should work well with frigate. I believe they all support rtsp protocol.
I operate an invidious instance. Google has really cracked down the past two weeks on YouTube front ends. Its extremely frustrating.
Invidious devs are finalizing a workaround so hopefully things will be working again in the next week or two.
For my own understanding, what potential dangers are there using a Yubikey as opposed to an open source key?
Got an alternative that isn’t youtube?
I have not. I try to avoid apps if I can.
I’ve only experienced a shadowban while using ubuntu. I switch between all the major operating systems on the same twitch account and with the same vpn service/servers. The bans have only been initiated while on linux, although they did follow over to the other OSes until some type of timer was passed.
This follows what some online shopping services do, which is to assign weights to certain user metrics and if a set threshold is crossed it rejects your payment or otherwise blocks you from a transaction. So VPN+MacOS might work but VPN+Linux matches some type of metric fraud systems associate with criminals.
Your question is a good one. I’m not the one who downvoted you fyi. To answer your question, it is absolutely a personal anecdote based on my own experimentation. I’m sure others will add their own experiences. Based on my experiences there’s no doubt about twitch shadowbanning based on VPN use. I’ll admit I don’t have a basis for Linux and adblockers being a part of the equation, but I made it clear in my original post that those were assumptions.
To further speculate, I have an idea that the shadowban may actually be triggered by somebody using the same VPN server doing something that triggers it, affecting anybody else on that server. I can’t possibly provide evidence for that theory, but it would explain the seemingly random nature of the shadowbans.
You suggested just adding the ISOs to local-lvm. Do you think it would be feasible to simply delete the local storage completely and then extend the local-lvm after, storing the ISOs there? I know extending volumes is much simpler than shrinking. And I imagine deleting completely is also easier than shrinking?
It’s really that much of a hassle to fiddle with the volume sizes?
With this method, would I be able to use an iPad as a display for windows 10? If so, are there any downsides? I remember trying Duet Display years ago but they charge a monthly fee which is absurd. And performance was not great.
Good idea. I was leaning heavily towards those raspberry pi monitors.
My network is currently setup with wireguard. I have a VPS operating as a hub within a hub and spoke (or is it hub and wheel?) configuration. This has worked great with the exception that all traffic passes through the VPS. The benefit of a mesh network is that I can directly connect clients and data does not have to flow through an intermediary VPS.
Ideally I would be able to split tunnel around the vpn but I don’t have the option on mac
I tried to set up a nebula network but it seems like it has trouble when your hosts are behind a VPN service. The VPN must block the port or protocol the lighthouse is connecting with and I can’t figure out a way to bypass the VPN (at least on Mac split tunneling isn’t supported). I’m assuming you’re familiar with mesh networks…do you have any good youtube videos or resources you would recommend? The nice thing about VPN is it’s crazy simple to set up and seems to work with all types of system configurations. Nebula was pretty simple but seems like a pain to troubleshoot so far.
Thanks. That helped a lot. It gave me a good basis for some further googling.
It ended up that the Internal Clock of the hardware interface was deselected in alsamixer. Enabling it fixed the no audio issue.
For the channel remapping I tried a bunch of different config files until finally one actually managed to not be ignored. It’s absurd how many separate configuration files and sound settings menus exist for linux audio and there’s no guarantee the one your editing is even being used. An absolute mess IMO and it’s no wonder people shy away from linux for desktop purposes.
Funny enough, despite getting the channel remapping to work, it’s completely ignored unless you put pulseaudio -k into your user profile. And even now, because the remapped output device doesn’t show up on boot, it has to be manually set to the default output every login.
At least I have the right channels mapped though.
I love linux but god damn is it a hot mess for the simple stuff.
Funny you mention that. I was about to make a post about Nebula earlier. I learned about it through YouTuber apalrd a few months back and it seems perfect. I’m still trying to understand some of the complexities when utilizing a service that requires circumventing the mesh network for public access such as Nextcloud. I’ll probably make a post about this after I’ve done some more research. I think there’s some good discussion to be had about such a setup.
So each time I get shut down is during a large extended data transfer. I have my VPS server set up as a VPN hub that connects multiple servers. So typically when my traffic gets diverted to a black hole by DO, there was a consistent roughly 35MB/s inbound/outbound vpn traffic stream for 4-5 hours going through the VPS. My server gets shut down for 3-4 hours and I get a email notice that my server was under a massive DDoS attack and they diverted traffic to a black hole. I always respond informing them that it’s not a DDoS and explain the situation. They typically respond with “Utilize a service like Cloudfare which has DdoS protection”.
I’ve been really happy with them as a provider otherwise but this is a dealbreaker for me.
Thanks. I actually selfhost my backup server. So I’m not backing up to a VPS. I use the VPS as a hub in a hub and wheel configuration to connect multiple servers (including a dedicated backup server).
I was in your position recently and decided to install PVE from scratch and restore VMs from backup.
I had a fairly complex PVE config so it took some additional work to get everything up and running. But it was absolutely worth it.