• 10 Posts
  • 83 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle









  • Yes. It’s the “put a copy somewhere else” that I’m trying to solve for without a lot of cost and effort. So far, having a remote copy at a relative’s is good for being off site and cost, but the amount of time to support it has been less than ideal since the Pi will sometimes become unresponsive for unknown reasons and getting the family member to reboot it “is too hard”.








  • I think you’re missing the point.of the essay. He seems to be saying that Apple has decided what content you should be viewing and that they have captured the “free market” because no amount of consumer crying will change it.

    Consuming the content another way won’t affect Apple in any way since they’ll keep repeating their behavior. The author is saying that the government regulators need to get involved to restore your rights on what you can do with a device that you purchased. Near the end he even goes on to say that you (a consumer) have implicitly waived your right to sue Apple for this.

    I guess the only option is to vote or maybe not use Apple products (but are the alternatives any better?)



  • Take some time and really analyze your threat model. There are different solutions for each of them. For example, protecting against a friend swiping the drives may be as simple as LUKS on the drive and a USB key with the unlock keys. Another poster suggested leaving the backup computer wide open but encrypting the files that you back up with symmetric or asymmetric, based on your needs. If you’re hiding it from the government, check your local laws. You may be guilty until proven innocent in which case you need “plausible deniability” of what’s on the drive. That’s a different solution. Are you dealing with a well funded nation-state adversary? Maybe keying in the password isn’t such a bad idea.

    I’m using LUKS with mandos on a raspberry PI. I back up to a Pi at a friend’s house over TailScale where the disk is wide open, but Duplicity will encrypt the backup file. My threat model is a run of the mill thief swiping the computers and script kiddies hacking in.