• 0 Posts
  • 147 Comments
Joined 8 months ago
cake
Cake day: January 20th, 2025

help-circle
  • twice_hatch@midwest.socialtoProgrammer Humor@programming.devGitHub auth
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    3 days ago

    You are supposed to have two redundant ones. Hooked up to every service. One leaves the house with you, the other stays in a safe, and you rotate them periodically

    and nobody is gonna fucking do that lol

    Mine are USB-A and USB-C so no two computers can use both. One of them randomly quit working (something in the OS dropped support for it maybe?) but then I think started working again?

    At an old job I had a lot of control over my own infra and I used my HSM to log in to my forge. I haven’t used it daily in years now.















  • It’s true that a large adversary with a little money (like the US or Israeli government) could host a huge amount of compromised exit nodes and relays (I don’t think compromising exit nodes alone is enough) and de-anonymize users.

    It is also true that you can run a relay right now by running the Snowflake proxy in a normal browser tab: https://snowflake.torproject.org/

    It is safe to run a relay on your home connection, because you aren’t hosting any exit traffic. I’ve never had trouble when I’ve done it.

    Tor also hosts “hidden services” or “onion services”, which don’t exit the Tor network. The client and the server agree on a rendezvous node and meet each other there, and the traffic is encrypted from end-to-end. I am pretty secure this is more resistant to the “global passive adversary” type of attack, but nothing is perfect. A GPA can always look at timing and make some correlations based off of it.

    It is true that the network is more secure if more people use it, because that provides cover. It is true that if you pirate stuff through I2P you won’t get a letter from your ISP.

    Better practice now before you really need it.





  • I found them under /usr/share/man/, then “man1”, “man2”, “man3” etc. based on the category system (which I think is like, libraries, syscalls, exes, something like that)

    I intuited /usr/share because almost everything the package manager installs will be under /usr somewhere, and man pages aren’t binaries or libraries, they’re architecture-independent, so they can’t be /usr/bin/ or /usr/lib, they’ll probably be in /usr/share and luckily I saw “man” under there.

    Hope that helps! Reading the FHS guide is a good learning experience but nobody should have to do it.