I had ~60GB going spare on my so figured I may as well make the most of it and set up for file sharing across my LAN. I'm allowing access only from mine and my partner's IPs (which are bound to our MACs) but I'm concerned the share isn't encrypted, so anyone could just walk up to the Pi and take out the SD. Any suggestions for securing shares?

interface renaming anyone? On multiple occasions I've had issues. For some reason my loopback interface is called "rename1". Support assures me this is normal/default config, but it just doesn't make sense to me. Why not "lo" for loopback, and why did it get renamed in the first place? Soon I'm just going to get rid and start fresh with trusty .

I've finally figured out the tool for managing my credentials. It works nicely and I've also managed to set up a challenge-response key for use with .

I'm currently working on a to run after login, which does the following:

1. Bring down WiFi interface
2. Spoof MAC
3. Generate random word
4. Change hostname to random word
3. Bring up WiFi interface
4. Connect to VPN

Should I write it in or ?

Currently written in Bash, but despite the hostname changing successfully when the script runs, running 'hostname' afterwards outputs default hostname...

I would love to try flashing a with /#Libreboot at some point, but after seeing what it involves (flash plugs etc.), I'm not so sure I want to step any closer to the edge of that rabbit hole. I can already see the hours of trial and error and stress, with potentially nothing to show for it. I have a habit of putting too much on my plate...

Can anyone recommend an online store, preferably accepting crypto and based in the , which sells pentesting gear ( adapters suitable for monitor mode etc.)? All roads in my research seem to lead back to the terrible two I want to avoid: eBay and Amazon.

I know of and , but neither sell wifi adapters (which is specifically what I'm after).

that without full disk encryption or locking down your config, an attacker with physical access to your system can simply edit the boot parameters (adding an "s" for single user (root), or "init=/bin/bash")) and boot straight into a root shell.

What's all this about then - β€œSUID sandbox helper binary was found, but is not configured correctly” Third time I've tried to launch an Electron app and this has happened. Anybody know of a safe, permanent fix? unix.stackexchange.com/questio

Current setup, featuring new Blackwidow Lite keyboard, but minus second monitor (I only have a VGA port left on my laptop and I'm not sure whether it will work combined with the mini-display-port-to-HDMI currently being used. Suggestions welcome.

I'm really considering investing in a @PINE64 , and will probably aim to run @debian on it. Have you got one? Let me know your thoughts.

How have I only just discovered window tiling with ? Here I go down the rabbit hole of customisation again...

Mastodon πŸ” privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!