Incessant tinkerer since the 70’s. Staunch privacy advocate. SelfHoster. Musician of mediocre talent. https://soundcloud.com/hood-poet-608190196

  • 26 Posts
  • 959 Comments
Joined 11 months ago
cake
Cake day: March 24th, 2025

help-circle




  • Could be something everyone is blocking in their browsers. I know I use arkenfox. No joy with LibreWolf or Waterfox. I did pull it up in Opera, and it worked ok. I didn’t browse any further than the front page. I only use Opera for paying bills as Firefox, LibreWolf, and Waterfox are set up to block a lot of excess crap, and my utilities love their bullshit webpage candy.










  • The thing about these front ends is that Google will eventually get around to blocking your IP. After many unsuccessful attempts that got ban hammered after a week or so, I finally got it to work. I piped it through Cloudflare Tunnels/Zero Trust. Haven’t had an issue. My deployment was the Invideous with companion app. The Companion app has been complaining about being unhealthy for ages now, but it keeps right on ticking. I don’t watch a huge number of YT videos. Usually my consumption is a tutorial here or there.






  • For the backup disks I want full disk encryption

    I encrypt everything.

    I have a repository set up with all my keys for all my encrypted drives. The keys get rar’d with a strong, known, 50 character password, and the filenames encrypted so no one can just open the rar file and gaze at the keys.

    • drive_xxxxx1_2_14_26.rar
    • drive_xxxxx2_2_14_26.rar
    • drive_xxxxx3_2_14_26.rar

    These get backed up in a 3,2,1 schema, and also to thumb drives stored in secure places. I also rotate the passwords on a regular basis, so the process starts all over again.

    • Check keys: sudo cryptsetup luksDump /dev/sdX
    • Add new key: sudo cryptsetup luksAddKey /dev/sdX
    • Delete old key: sudo cryptsetup luksRemoveKey /dev/sdX
    • Verify keys: sudo cryptsetup luksDump /dev/sdX

    The headers are not secret. Anyone with physical, read access to the device can run luksDump. It reveals algorithm, key derivation parameters, number of keys, but not the passphrase or master key.

    As far as ‘best practice’, that will be determined by subsequent replies to your post. LOL That’s just how I do it.