• 1 Post
  • 46 Comments
Joined 3 months ago
cake
Cake day: March 26th, 2024

help-circle
  • Is there a reason you’re not considering running this in a VM?

    I could see a case where you go for a native install on a virtual machine, attach a virtual disk to isolate your library from the rest of the filesystem, and then move that around (or just straight up mount that directory in the container) as needed.

    That way you can back up your library separately from your JF server implementation and go hog wild.


  • Syntax-wise, it’s meant to be identical. I got on board when they were the only ones that enabled rootless (without admin privileges) mode. That’s no longer the case since rootless docker has been out for a while.

    I’m personally a fan of the red hat docs and how-to’s on podman over the mixed bag of tech bro medium articles I associate with docker.

    At the end of the day this is a bit of a Pokemon starter question. If your top priority is to get a reasonably common and straightforward job done just pick one and see where it takes you! :)


  • Syncthing is my answer though I appreciate it doesn’t get to the root of your question.

    There are local backups that include your system settings, text messages, contacts, call history and (optionally) apps. The one thing I want is the ability to pick a directory for the local backup so I can make it work with syncthing without jumping through hoops.

    It’s also compatible with Nextcloud and WebDAV if those are options for you.



  • Chiming in to note that GNSS communications are actually receive only. A typical phone can’t physically broadcast a strong enough signal into mid-earth orbit (where most of those satellites typically are) to achieve the “pinging GPS satellites” issue.

    Note this only refers to how that signal physically hits your phone. Once your position is deduced and digitized there’s an entirely different attack surface.

    The other concerns (especially cell tower data tracking) are valid though.














  • My solution is to use Rathole. I rent a wildly cheap (2 core, 4GB memory) VPS and basically just run Traefik there. Then I use Rathole to make some services hosted on my desktop available to Traefik.

    I like this solution better than Wireguard for my application. It reduces attack surface to services you’ve explicitly set up, rather than a full data layer trunk between your machine and a potential malicious actor.