Fascinating idea!
Fascinating idea!
I’m using rustic
, a lock-free rust-written drop-in-replacement of restic
, which (I’m referring to restic
and therefore in extension to rustic
) supports always-encrypted, deduplicating, compressed and easy backups without you needing to worry about whether to do a full- or incremental-backup.
All my machines run hourly backups of all mounted partitions to an append-only repo at borgbase. I have a file with ignore pattern globs to skip unwanted files and dirs (i.e.: **/.cache
).
While I think borgbase is ok, ther’re just using hetzner storage boxes in the background, which are cheaper if you use them directly. I’m thinking of migrating my backups to a handfull of homelabs from trusted friends and family instead.
The backups have a randomized delay of 5m and typically take about 8-9s each (unless big new files need to be uploaded). They are triggered by persistent systemd-timers.
The backups have been running across my laptop, pc and server for about 6 months now and I’m at ~380 GiB storage usage total.
I’ve mounted backup snapshots on multiple occasions already to either get an old version of a file, or restore it entirely.
There is a tool called redu
which is like ncdu
but works on restic
/rustic
repos. This makes it easy to identify which files blow up your backup size.
That woul’ve been: Minetest Immortal
If you connect to the network and open firefox, it will display a toast to open the corresponding captive portals page. You can then login through that. Given that your VPN isn’t blocking unencrypted connections etc.
I assume the network advertises a captive portals url and identifies you based on your MAC address.
The config is server-side (router).
What do you use it for? How’s the daily-driver experience?
This sounds like a horror story to me.
Is something like this defined in a standard somewhere?
Thats what I do as well. It makes it easy to seperate between logical units.
nah, we have run0 at home
I’m happy with Open WebUI
Can you link any good guides on transistioning to guix?
Yes, Taler by design allows identifiction of the receiver.
It does not reveal the sender.
It allows you to create and arbitrate your own tokens and to create your own “bank”.
This.
However sometimes the user can’t access the device. Depending on your system, I recommend adding your user to the dialout/serial group.
I.e. quick online search
I have three things to say:
This is the same setup I’m running, I can highly recommend it.
Nix has an open issue on integrating IPFS support.
There’s also an old tutorial.
+ Impermanence
~/Documents/projects/<YYYY>-<MM>-<DD>_<name>