

This is the best way, really. Generally, you have much more control over what you plug into it.
A display shouldn’t have anything even approaching what can be called an ‘OS’ on it. Yet here we are.
Alt: [email protected]
This is the best way, really. Generally, you have much more control over what you plug into it.
A display shouldn’t have anything even approaching what can be called an ‘OS’ on it. Yet here we are.
Sometimes even that’s not enough. I’ve had some questionable kit before that would just ignore the DNS settings fed to it if it thought they were no good, and fall back to something else preconfigured.
pfSense is a wonderful tool for situations like that. Anything intended for local use only here just doesn’t get outside at all. Handy for stuff like a fire stick that only needs to be calling up a local media library.
It can also mangle any DNS requests going out to a different server and redirect them to itself instead. You could do this without it with iptables/nftables on a generic Linux box, but pfSense makes it much friendlier.
There are other packages that can do the same, but physically all you need is one piece of hardware as a bouncer that manages connections between inside/outside.
On Dell server hardware with the right cards/licensing, you can remove the need for physical access to the server to input an FDE password by leaning on iDRAC. This provides access to the console remotely during the boot process (and thereafter).
Alternatives exist that supposedly do the same thing, but I’ve never had to try them. Airconsole, pikvm, blikvm etc.
You can keep this interface unexposed by using wireguard to dial in when you’re away, as per your original thinking. Just make sure the endpoint isn’t on the server you’re rebooting…
Half the shit I actually want I just run directly these days, rather than nosing through either.
Just to name a few.
It’s utter bollocks. It used to be the OEM crap that had to be removed or clean installed over. Now you have to spend time unfucking fresh installs.
My 11 image is just about usable, but only after a lot of gutting, reg entries, powershell scripts and openshell.
The railroading to sign in with an MS account has become worse too, but still just about bypassable.
Not out of the goodness of their own hearts mind. It’s probably more because Euro NCAP are going to be deducting score for not having physical essentials in 2026.
Basically what techradar is as a whole. Ad pieces and listicles with baity headlines.
With any luck, they’ll take some of the users bailing out of Reddit on the nostalgia factor, become mediocre, and die. Again.
I love those little Lenovo boxes, also recommend.
Proxmox has also been good for me - great for just quickly spinning something up to play with before committing.
A third, and hopefully final attempt at getting an iredmail setup going. SPF, DKIM & DMARC all checking out fine. It’s actually working this time. Need to get the ISP to change our PTR record though, last bit of the puzzle.
Also picked up a used negate device, so we now have pfsense fronting everything. That’s allowed me to move the original router to a better location and put it in AP mode.
Emby media server moved off a Synology and into a proxmox container. Finally, we can stream high def with the hardware acceleration we weren’t getting before.
Used FF forever, even though the birth and rise of Chrome.
We’re done. The company I IT for therefore is also done. As are friends and family I sort computers for.
The shit now stinks and must be taken out.
You might not have access to the keys for a long period of time.
Only need a moment to take a code and leave the keys there. If the car isn’t otherwise monitored, theft of contents without keys would be trivial.
You’re probably getting busted anyway, but the concept is there.
Grab some keys out a bag in the office while the owner isn’t looking.
Grab a code (it’s out of vehicle range, being inside).
Go to the car park, replay the code and loot the car.
You’d be caught quickly, but it’s doable.
An SDR can be made to jam, even if that is not the normal purpose. Just like a kitchen knife can be used to murder people, instead of its normal culinary purpose.
Of course an F0 can’t clone a rolling code as-is. I never said it could. But it can harvest and replay a single or multiple consecutive codes just fine, providing the original key is not used in the meantime. Only need physical access to the key while it is out of range of the vehicle.
This alone puts the F0 on dangerous ground as an “electronic device (such as a signal jammer) for use in theft of a vehicle or theft of anything in a vehicle”
People have locked out their original keys by messing with this before.
The point is that our laws are reactionary, vague, and open to too much interpretation.
If someone gets shit stolen out their car and I happen to be nearby, then I will become suspect merely through possession. Even without intent.
Typical BBC reporting of anything technical.
Keyless repeaters and signal amplifiers scramble the signal from remote key fobs inside people’s homes, enabling criminals to unlock cars.
No, they don’t. The situation described is a relay attack on keyless entry/start. Jamming is used in a two stage attack, where the device intercepts the first signal and stores it without allowing the car to ‘see’ it by jamming. The user then tries a second time.
This time the signal is intercepted the same way, and the first signal is played back to the car from the device. The second signal is stored and can be replayed later to bypass a rolling code setup.
It’s very niche and the stored signal quickly becomes obsolete anyway.
Sophisticated electronic devices used by criminals to steal cars are set to be banned
Making or selling a signal jammer could lead to up to five years
Jenny Simms said the possession, manufacture, sale and supply of signal jammers had provided an “easily accessible tool for criminals… for far too long”.
These devices have no legitimate purpose
Basically, fuck you if you happen to have or build a Software Defined Radio (SDR). Again with the UK ‘clamping down’ on something that does have plenty of legitimate use.
I use an F0 for toying with my own equipment, as an interface for my smart devices and as a general purpose keyfob. I may be arrested just for possessing it.
The crims will not care a jot and this only serves to restrict/annoy legitimate users.
The fault and solution lies with the manufacturers who implement insecure tech, and with the users who blindly sacrifice pounds of security for ounces of convenience.
Monetizing is what ruins other places.
I like the way my home instance does financial backing through an open model, and that’s part of why I chose it.
An ideal is enough contributors to keep the lights on and to reimburse the admins for their time spent in keeping it afloat. Moderation should always be a volunteer position for those that want to support their individual communities.
Any excesses in finance I would hope go towards future running costs (to a point), feature development and then charitable donations in that order. Non-profit on paper and in practice.
This is viable for a small instance. Maybe even larger ones if the users are altruistic enough as a whole.
If your devices rely on a service that you do not control to work - then accept the fact that one day, suddenly, they will not work.
they do block Mullvad
Not well enough it seems. Still reachable for me on some exits, but not all.
So they do.
That’s really neat!
At that point I would expect control of it, or at least for it to respect the configuration it is given. If neither are true, then it just doesn’t go online at all. If that’s part of the main function, then I find an alternative or live without it.
Nothing on the inside should be sending anything to the outside that can’t be inspected before it leaves, with the exception of stuff that is directly driven by a human (guests browsing, etc).