• 8 Posts
  • 265 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle
  • This shit winds me up so much. It used to be that a game would be full price for 6-12 months before moving onto a budget label at a vastly rexuced price.

    Nowadays games are full price forever, except for the few days a year when they go on “sale” and get reduced to what they should’ve been all along. During which time the publishers get to act like they’re being altruistic and doing us a massive favour.




  • That’s… A lot of storage. I’d say your options are, in no particular order:

    • buy a 12 bay NAS.
    • expansion unit. Do it as a separate volume and shuffle cold data onto there.
    • upgrade the drives.

    Failing that you could just have a bit of a purge? If not straight deleting stuff, move things onto an external drive.

    You could also try deduping. There’s a script that’ll add any drive to the internal “supported” list and also enable dedupe on mechanical drives. The savings were minimal on mine but you might have more luck. https://github.com/007revad/Synology_enable_Deduplication






  • First one, on the 3DO. Small selection of exotics and sports cars, realistic (for the time) point-to-point road races with no music to obscure the engine noise, and an annoyingly/amusingly sarcastic rival racer that was obviously just one of the devs.

    Each car had its own showcase video followed by a detailed specs sheet with a very enthusiastic voiceover explaining why you should be excited to drive this car. Even the courses had the voiceover treatment.

    It truly was a love letter to cars and driving that has never been equalled, and is very telling that it’s the only one to have had Road & Track branding. Every subsequent NFS game has been so in name only.



  • TedZanzibar@feddit.uktoSelfhosted@lemmy.worldHelp me harden my home server
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    27 days ago
    1. Sure but there’s no reason to openly advertise that yours has open services behind it.
    2. Absolutely. There are countries that I’m never going to travel there so why would I need to allow access to my stuff from there? If you think it’s nonsense then don’t use it, but you do you and I’ll do me.
    3. See point 3.

    We all need to decide for ourselves what we’re comfortable with and what we’re not and then implement appropriate measures to suit. I’m not sure why you’re arguing with me over how I setup my own services for my own use.


  • TedZanzibar@feddit.uktoSelfhosted@lemmy.worldHelp me harden my home server
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    27 days ago

    Yes and no? It’s not quite as black and white as that though. Yes, they can technically decrypt anything that’s been encrypted with a cert that they’ve issued. But they can’t see through any additional encryption layers applied to that traffic (eg. encrypted password vault blobs) or see any traffic on your LAN that’s not specifically passing through the tunnel to or from the outside.

    Cloudflare is a massive CDN provider, trusted to do exactly this sort of thing with the private data of equally massive companies, and they’re compliant with GDPR and other such regulations. Ultimately, the likelihood that they give the slightest jot about what passes through your tunnel as an individual user is minute, but whether you’re comfortable with them handling your data is something only you can decide.

    There’s a decent question and answer about the same thing here: https://community.cloudflare.com/t/what-data-does-cloudflare-actually-see/28660


  • TedZanzibar@feddit.uktoSelfhosted@lemmy.worldHelp me harden my home server
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    1
    ·
    28 days ago

    Admittedly I’m paranoid, but I’d be looking to:

    1. Isolate your personal data from any web facing servers as much as possible. I break my own rule here with Immich, but I also…
    2. Use a Cloudflare tunnel instead of opening ports on your router directly. This gets your IP address out of public record.
    3. Use Cloudflare’s WAF features to limit ingress to trusted countries at a minimum.
    4. If you can get your head around it, lock things down more with features like Cloudflare device authentication.
    5. Especially if you don’t do step 4: Integrate Crowdsec into your Nginx setup to block probes, known bot IPs, and common attack vectors.

    All of the above is free, but past step 2 can be difficult to setup. The peace of mind once it is, however, is worth it to me.