• 0 Posts
  • 24 Comments
Joined 2 years ago
cake
Cake day: August 6th, 2023

help-circle

  • The only thing I would note is -IF- your volumes are not partition or disk based BUT -files- based there is the possibility that corruption of the host file system of the disk the files containing the volumes are on could result in pieces of those files being marked unreadable by the disk and it’s POSSIBLE one way to solve this would be a file system check utility.

    HOWEVER such activities carry a -large- risk of data loss so I would advise a bit for bit copy of the disk and doing the repair on that so if it goes wrong you’re not worse off. -IF- you cannot make a copy then I would advise at least trying to mount using backup headers before doing that and copying off anything you can salvage as file system checks can really mess up data recovery and should only be used in certain circumstances.

    You’re much better off trying the recovery software I linked in fact than doing a file system check as it will tend to have better results.

    You can also use the option to mount as read only in VC to prevent writes to a suspected failing disk.

    Let me know if you need further advice.


  • Veracrypt has back-up headers located elsewhere in the volume that are unlikely to have been overwritten.

    First thing’s first I would strongly recommend copying the drive as it currently exists bit for bit to another drive of equal or larger size. Don’t work on the original if you can help it.

    Now with this copy, you should try to check the option to use the backup header when mounting and try again. If the partition is gone and veracrypt doesn’t see it you’ll need to try using something that recovers partitions and doesn’t mind encrypted partitions or partitions or file system types it doesn’t understand and use that to ON THE COPY recover and recreate the partition (this will write data and can cause the possibility of further loss or worsen your ability to recover which is why it is important to perform it on a copy). Testdesk may work for this but there are other options that probably are better.

    See this list: https://old.reddit.com/r/datarecovery/wiki/software and choose something from there if this data is truly important. Again only work on a copy on another drive. Some of these software examples actually work against the original drive and make a copy elsewhere and should be safe to use on the original drive so long as they have you select a target drive to push the recovered data to but read the documentation. Testdisk absolutely must be used on a copy.

    You will incur data loss and likely should run one of the file recovery software mentioned on the drive once successfully mounted in veracrypt to attempt to recover as much as possible.


  • Use secure erase function which is built into the SATA and other specs, it applies a voltage spike to clear the cells of all held charges thus wiping them. This happens near instantly, it’ll be a process that will signal it’s finished within a minute and takes much less time than that.

    If you want to be extra paranoid I suppose you could follow that up by encrypting the entire (empty) drive and then doing it again though I’m not sure this has any benefit however it’s the closest to forcing the cells to be used again and then cleared again. However this does not guarantee that exhausted and worn out areas are flash are not potentially spared both. It’s unlikely for large amounts of data to be recovered from this unless your drive is failing or has been completely worn out but it’s also why if you ever store sensitive data on an SSD it’s preferable to do so in an encrypted form (such as encrypting the whole disk or partition).



  • Yes, absolutely. And they can drag Canonical into it as well if they wish though it’s harder. Being UK based doesn’t protect them from the long arm of US law including arresting any US personnel, freezing and seizing their funds, putting out arrest warrants for and harassing those in the UK with the fear of arrest and rendition to the US if they go to a third country (for a conference, vacation, etc, most would buckle rather than live under that). Additionally the US could sanction them for non-cooperation by making it illegal for US companies to sell them products and services, for US citizens to work for or aid them, etc.

    They can go after community led projects too, just send the feds over to the houses of some senior US developers and threaten and intimidate them, intimate their imminent arrest and prison sentence unless they stop contact and work with parties from whatever countries the US wishes to choose to name. Raid their houses, seize their electronics, detain them for hours in poor conditions. Lots of ways to apply pressure that doesn’t even have to stand up to extensive legal scrutiny (they can keep devices and things and the people would have to sue to get them back).

    The code itself is likely to exist in multiple places so if someone wanted to fork from say next week’s builds for an EU build they could and there would be little the US could do to stop that but they could stop cooperation and force these developers to apply technical measures to attempt to prevent downloads from IP addresses known to belong to sanctioned countries of their choosing.

    It’s not like the US can slam the door and take its Linux home and China and the EU and Russia are left with nothing, they’d still have old builds and code and could develop off of those though with broken international cooperation it would be a fragmented process prone to various teething issues.


  • Interesting project. Thanks for the link and I do appreciate it and could see some very good uses for that but it’s not quite what I meant.

    Unfortunately as it notes it works as a companion for reverse proxies so it doesn’t solve the big hurdle there which is handling secure and working flow (specifically ingress) of Jellyfin traffic into a network as a turn-key solution. All this does is change the authorization mechanism but my users don’t have an issue with writing down passwords and emails. Still leaves the burden of:

    • choosing and setting up the reverse proxy,
    • certificates for that,
    • paying for a domain so I can properly use certificates for encryption,
    • making sure that works,
    • chore of updating the reverse proxy, refreshing certs (and it breaking if we forget or the process fails), etc

    Which is a hassle and a half for technically proficient users and the point that most other people would give up.

    By contrast with Plex how many steps are there?

    1. Install (going to skip media library setup as Jellyfin requires that too so it’s assumed)
    2. Set up any port settings, open any relevant ports on firewall, enable remote access in setting with a tickbox
    3. Set up users
    4. Done, it now works and doesn’t need to be touched. It will handle connecting clients directly to the server. Users just need to install Plex client, login to their account and they have access.

    By contrast this still requires the hoster set up a reverse proxy (major hassle if done securely with certificates as well as an expense for a domain which works out to probably $5 a year), to then have their users point their jellyfin at a domain-name (possibly a hard to remember one as majesticstuffbox[.]xyz is a lot cheaper than the dot com/org/net equivalents or a shorter domain that’s more to the point), auth and so on. It’s many, many, many more steps and software and configurations and chances for the hosting party to mess something up.

    My point was I and many others would rather take the $5 we’d spend a year on a domain name and pay it for this kind of turn-key solution for ourselves and our users even if provided by a third party but that were Jellyfin to integrate this as an option it could provide some revenue for them and get the kinds of people who don’t want to mess with reverse proxies and certificates into their ecosystem and off Plex.


  • There is AFAIK no way to do this.

    Apple’s never open-sourced the APIs and interfaces and it only works on Macs and Windows. For this you will need to have either a Windows install (recommend separate drive so it doesn’t break Linux bootloader) or a persistent or not Windows VM with USB passthrough. I’m not even sure how well the VM situation works but it probably should. You don’t even have to have a license for Windows, you can just run it in the VM for this purpose alone but it does mean oh at least 40GB set aside on your drive for the VM image plus more if you want to do things like back-up the phone.


  • Jellyfin needs to partner with someone people can pay a very low and reasonable and/or one-time fee to enable remote streaming without the fuss of setting up either dangerous port-forwarding or the complexity of reverse proxies (paying for a domain-name, the set-up itself including certificates, keeping it updated for security purposes).

    And no a VPN is not a solution, the difficulty for non-technical users in setting up a VPN (if it’s even possible, on smart-tvs it’s almost always not, and I don’t think devices like AppleTV and other streaming boxes often support them) is too high and it’s an unwanted annoyance even for technical users.

    I’m not talking about streaming video’s through someone else’s servers or using their bandwidth. I’m talking about the connection phase of clients and servers where Plex acts like an enhanced dynamic DNS service with authentication. They have an agent on the local media server which sends to the remote web service of the third party the IP address, the port configured for use, the account or server name, etc. When a client tries to connect they go to this remote web service with the servername/username info, the web service authenticates them then gives them the current IP address and any other information necessary. It then sends some data to the local Jellyfin server about the connecting client to enable that connection and then the local media Jellyfin server and the client talk directly and stream directly.

    Importantly the cost of running this authentication and IP address tracking scheme would be minimal per Jellyfin server. You could charge $5/year for up to 20 unique remote clients and come out ahead with a slight profit which could be put back into Jellyfin development and things like their own hosting costs for code, etc. Even better if they offer lifetime for this at $60-$80 they’d get a decent chunk of cash up-front to use for development (with reasonable use restrictions per account so someone hosting stuff in Hetzner or whatever and serving 300 people with 400 devices will need to pay more because they’re clearly doing this for profit and can afford to throw some more money at Jellyfin).

    Until Jellyfin offers something that JUST WORKS like that it’s not going to be a replacement for Plex, whatever other improvements they offer to users it’s still a burden for the server runner to set up remote streaming in a way that isn’t either incredibly dangerous (port forwarding) OR either involves paying money to third parties AND/OR the trouble of running your own reverse proxy and/or involves walking users through complicated set-up process for each device that you have to repeat if you change anything major like your domain name when using a VPN.




  • can they be added to the search function in qbittorrent?

    Nearly all can. All the one’s you’d want anyways work with Jackett. They don’t work via direct plugins but just run Jackett, follow its instructions and connect it to qBittorrent and you’re good to go searching just the same as before. Some annoying ones occasionally require setting up another software like Flaresolver but for the most part the big easy to get into ones that open their doors annually work without that.

    While there will likely be some openings throughout the year the fact is most trackers open in the period from Thanksgiving/late November through early January. TL opens then basically every year, a number of more exclusive trackers do open signups then, some for only 24 hours so get an RSS feed of that and remember to sign up IMMEDIATELY as soon as you see a post as the post on reddit may have been made 22 hours into a 24 hour open window, you just don’t know. TL though at least tends to stay open for several days. So if you have no luck before then, wait until that time of the year and then check daily or even twice daily if you can, once before bed, once earlier when you get up or lunch or after work, whatever.


  • It just does more and more easily. It styles things better, makes them more professional looking with a click. It can do certain things like nested tables in Word that Writer cannot do. Excel is much more powerful than calc, it has more functions, more refined functions, it’s easier to work with, has more and prettier chart options. And oh you can create tables in Excel that are sortable. There are many other cases.

    Now for the last two the die-hards will whine and whinge about how you should just use a software for creating charts and a database but sometimes you just want to make something quick, sometimes that’s overkill for what you need. Grandpa doesn’t need to learn how to deal with databases just to make a sortable list of books he’s read, he can just use excel and the Libreoffice people telling him to pound sand because they won’t add that feature to calc because it doesn’t belong there means he and many other people don’t use calc, they use MS office. Likewise the Libreoffice defense force saying of making graphs and charts to just use dedicated software, well many corporate types, business people, white collar workers don’t understand those things and may not be able to get them installed, what they understand, what they already have is MS office and it works and has lots of pretty, professional, very slick options which don’t make them look poorly in office meeting presentations.

    Just on the sortable tables front, I can’t tell you how many times I’ve run into hobby stuff that’s based on an excel file with tables that rely on being sortable. From stat sheet creators to mini-databases (<2000 rows) on some game created by fans.

    It’s useful for those who need the very bare basics of being able to open and read basic MS word documents, csv files, excel files, and to write an occasional letter. But the moment you need to start doing beyond basic formatting or dealing with files that have that, you run into issues.

    You have this gulf of usability, it’s useful for people at the very bottom of the basic needs pole, barely computer literate types who think facebook is the internet and it’s useful for highly technically competent people who can and do use other dedicated software, often without GUIs to solve problems, it’s a frustration for the middle 60% of the population who are more than basically computer literate but not scientifically trained, not CS or IT.



  • i haven’t yet encountered an AP that is capable of providing all of the features that i currently use. ie ad blocking; personal vpn;

    Pfsense does both of these. pfblocker NG in particular is a very powerful network adblocker with lots of lists. Pfsense can also run VPNs, it supports openvpn and wireguard in both client and server mode and you can set up multiple so one client, one server.

    web hosting; and cloud-like internet accessible storage via ssh tunnel (in addition to others).

    If you just need personal services it would be best to run something local, setup a wireguard tunnel on pfsense that gives access to your network and VPN in to access things remotely. If you need to share with others I suppose this can become a problem.



  • What they told you is misleading.

    Transcoding and burning in subtitles for Plex and similar only happens in some cases if your streaming device doesn’t support image based subtitles. Plex themselves could fix this on a lot more devices but don’t.

    10 years ago it was the case that there were a LOT of issues with anything but text subtitles. These days it depends. If you’re running it directly off a smart tv (bad experience anyways, not recommended) it’s likely to be an issue. If you’re using an Android streaming device or Apple TV or gaming console there’s a good chance the subs just work.

    Truth is lots of things can force transcoding with Plex including using certain audio formats in certain media containers. Most of these days picture subs work. If you can get text subs it’s not a bad thing but I wouldn’t go through the hassle of doing flawed OCR unless you can confirm it’s an issue you’re experiencing with your setup.



  • It’s alright. Not anywhere near as nice as say TL in retention and breadth/amount of content available but they have a fair amount of zero-day scene RARed stuff as well as some non-RARed stuff. Not as much free leech as many other trackers either, if you sign up I strongly recommend trying to grab stuff while you have sitewide to build a buffer.

    Oh and they do have pretty regular problems keeping the site up. People regularly get API request failures and the website can be unreachable for hours or more. Not a bad tracker but I wouldn’t suggest using it as your only resource unless your needs are very specific such as only wanting day-one scene access.


  • data such as host name,

    Okay why do they need to know that? Why do they need to know if the computer is called “Melissa’s Laptop” or “Workstation 15, Internal security division”? Seems like this kind of data could if stolen be misused and it has minimal legitimate purpose IMO as anyone can put anything as host name and while in organizations it often corresponds to use it doesn’t have to for individuals. Someone could call their machine “Mack’s Porn Rig” and they only use it for doing banking and a little coding.

    kernel version, desktop component versions, detailed information about hardware and drivers involved, screen size and resolution information,

    This all seems legitimate enough, this would be helpful for understanding the hardware their users run on and targeting features or bug fixes.

    network device MAC addresses,

    Not great but there is an argument for it, they could just grab and send the first 3-4 octets which would give them the info they need on manufacturers without getting uniquely identifiable data that along with some of this other stuff is concerning for fingerprinting.

    disk serial numbers,

    Okay, what the fuck. Why do they need disk serial numbers? What possible use is there for that. Those are used for warranty claims and could be used as part of uniquely fingerprinting a computer and person. Not cool.

    disk partition data,

    This is vague enough. I guess one could choose to see this as just info about partitions in use say if there’s also an NTFS partition that looks like a Windows install that would be useful but on the other hand data encompassed within a partition could also nefariously be read as allowing them access to all your data. Partition layout, partition labels, and file systems used on disks available to the system would be a clearer way to put this and erase any doubt.

    information about the number of running processes and installed packages, versions of basic packages such as systemd, gcc, bash and PipeWire.

    All this is also fine just technical data stuff.