Aussie living in the San Francisco Bay Area.
Coding since 1998.
.NET Foundation member. C# fan
https://d.sb/
Mastodon: @[email protected]

  • 9 Posts
  • 1.9K Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle
  • The drivers have gotten a lot better over the last few years, and Nvidia even have an official open-source driver now, but there’s still issues with them. Wayland works very well now, but not perfectly (especially on GPUs with low VRAM).

    If you’re on Linux and are buying a new GPU, stick to AMD. Their driver is part of the Linux kernel, it’s more stable, and it gets all the newest features first.


  • install newest proprietary nvidia drivers

    On newer cards, the open source drivers work pretty well as of version 555. The process for installing them is usually very similar to the proprietary drivers, but there’s often some flag you need to set to tell it to use the open source ones instead. For Fedora, the instructions are here: https://rpmfusion.org/Howto/NVIDIA#Kernel_Open (ignore the part about it only working for data center GPUs, as that’s no longer true)

    If you use Nvidia’s installer, it automatically uses the open source driver instead of the proprietary one if you have a new enough GPU (20 series or newer)







  • Oh yeah, there’ll be some overhead if you’re running Wireguard on a router. Hitting your router’s public IP won’t go out to the internet though - the router will recognize that it’s its IP.

    It’s common to run Wireguard on every computer/phone/tablet/etc rather than just on the router, since this takes advantage of its peer-to-peer nature. Tailscale makes it a lot easier to configure it this way though - it’s a bit of work for vanilla Wireguard.



  • If you have a separate subnet for it, then why do you only want it to be connected when you’re not on home wifi? You can just leave it connected all the time since it won’t interfere with accessing anything outside that subnet.

    One of the main benefits of Wireguard (and Tailscale) is that it’s peer-to-peer rather than client-server. You can use the VPN IPs at home too, and it’ll add barely any overhead.

    (leaving it connected is assuming you’re not routing all your traffic through one of the peers)










  • Is it just you that uses it, or do friends and family use it too?

    The best way to secure it is to use a VPN like Tailscale, which avoids having to expose it to the public internet.

    This is what I do for our security cameras. My wife installed Tailscale on her laptop and phone, created an account, and I added her to my Tailnet. I created a home screen icon for the Blue Iris web UI on her phone and mentioned to her, “if the cameras don’t load, open Tailscale and make sure it’s connected”. Works great - she hasn’t complained about anything at all.

    If you use Tailscale for everything, there’s no need to have a reverse proxy. If you use Unraid, version 7 added the ability to add individual Docker containers to the Tailnet, so each one can have a separate Tailscale IP and subdomain, and thus all of them can run on port 80.


  • That and email protocols are outdated and aren’t too secure. For example:

    • Neither SMTP nor IMAP have no way to use two factor authentication.
    • Spam blocking is so hard because SMTP was not designed with it in mind.
    • SMTP has no way to do end-to-end encryption which is why you need to layer things like GPG on top.

    IMAP has a modern replacement in JMAP, but it’s not widespread. SMTP is practically impossible to replace since it’s how email servers communicate with each other.

    The “solution” has been for companies to make their own proprietary protocols and apps, for example the Gmail and Outlook apps combined with a Gmail or Microsoft 365 account respectively.