

Noice.



Noice.



Sweet! I will check it out immediately! :)


Would it be possible for an average user like me to host the whole AUR and the whole Arch Wiki to make it available at times like this? I’m already seeding a couple of Arch isos (not pirate lingo).
I just want to help out.
I went as far as scanning my passport for these @ssholes and they still banned me 😂 to this day I have no clue why


Not with the front end iptables. Linux can filter packets based on their source and destination IP, port and MAC address. It can also filter packets based on their state, being NEW,ESTABLISHED, RELATES,INVALID and UNTRACKED. You can check what processes are establishing connections with for instance ss or lsof -i and what commands or binaries/executables stand for those processes with for instance ps.
I know of no userland utility with which one could specify processes, command names or binaries/executables to block. Which might seem like a hassle from a Windows perspective, but the level of control that you achieve with Linux’s packet filtering is neat and it has taught loads about how networking and the Internet works. :)


😂🤮 I didn’t even look at them. Just quickly searched and copy-pasted shit for OP. 🤣


Dang it… Thanks for enlightening me!


Thank you sir and I wish you a very Merry Christmas! :)


Thank you! I will check out OpenStitch.


Thanks! That looks like a great way to learn what’s going on “under the hood”.


I finally understand your point. That’s true though with or without the use of a firewall. Not becoming infected by malware through ports that are otherwise used for common connections can preemptively only be achieved with good cyber hygiene. Once infected, I guess I’d need access control lists and/or software that blocks code execution based on signatures, but I’m not aware of such software for Linux.


Thanks for the valuable input! :)
I always encrypt all my drives - external or internal - because at the very least, I have nothing to loose with today’s computing power. The overhead isn’t noticeable for me once the drives are decrypted, which takes two seconds with my Ryzen 5800 x3d.
Regarding what you said specifically about the peace of mind that it gives me if and when I were to sell the drives: YES. encryption can even be used as a method of securely wiping scrambling content.


The purpose is to block any connections that I haven’t explicitly allowed, since I don’t have the skills to vet all my binaries. Linux packages are as we know not immune.
It’s a pretty static system and I imagine I could write a script that notifies me if and when iptables blockes something outgoing (or when the kernel complains thereof).


Nope, they are hooked up to my retired gaming rig xD retired because my physical health makes it hard to sit in front of the PC and game 😭 poor RTX 3080 just sitting there…
Anyway, here you go! There is room for five more 2.5 inch SSDs in the back. I’ve even seen somebody mod this chassi to hold 22 HDDs he he.

Oh, and the software part: 4 x 4TB drives made into one 16TB logical volume with LVM, on top off which there is a LUKS container for whenever my home is raided (not that encryption helps legally speaking, unless you have plausible deniability…). I figured I don’t need redundancy with SSDs and none of the data is really anything that I couldn’t just torrent again. Maybe I’ll do an offline backup of them down the road.


Wow! Thanks for all the great advice! :D
Now I just need to figure out:


That’s also a good idea, but I want to seed 24/7 🙃


Thanks, I know, I’m not new to the game. I just had prioritize absolute silence over cost/performance, since I live in 30 m2 and I can’t stand the otherwise sweet buzzing of HDDs. I need absolute silence to be able to sleep, so I bought four 4TB Samsung 870 EVOs.
I am however planning to build an HDD rack with a RPi, which I then intend to keep in one of my closets in order to isolate the sound. For now, I have cages for eight. :)

You first👏
Well I’ll be damned. How have I not looked into I2P before. This seems like a whole new world to explore. Thanks!