2. The software is provided without modification; I think it would be stranger to remove the encryption.
This is exactly how I self-host Ente and it has been great.
Machine leaning for image detection has worked really well for me, especially facial recognition for family members (easy to find that photo to share).
I have the client on my Android mobile, Fire tablet (via F-Droid), and my Windows laptop.
My initial motivation was to replace "cloud" storage for getting photos copied off the phone as soon as possible.
No way I'm tossing it since it works fine (even battery is decent still). But no way I'm spending time with Linux if Win10 will still get updates.
If I will really need another Windows device though, I'll just buy a cheap N100 device.
Msg ID: 104606
Message Type: Geomagnetic Disturbance Action
Priority: Action
Effective Start Time: 06.01.2025 09:31
Effective End Time: 06.01.2025 12:25
Regions COMED
A Geomagnetic Disturbance Action has been issued as of 09:31 on 06.01.2025 to protect
the power system from damage or disruptions due to increased geomagnetic activity.
Times are "Eastern Prevailing Time", which is Eastern Daylight Time right now.Background:
These messages are from the US east coast power grid control room in Valley Forge, PA sending to people at generating stations and other key control centers. This is a slow-moving event. If the grid was stressed, there would be "Pre-Emergency Load Reduction" and "Conservative Operation" actions ordered. If there was real trouble, there would be many more actions. But things never got beyond preparing for trouble.
A geomagnetic disturbance event in 1989 caused transformer damage leading to outages. The solar flux going between power lines and conductive ground induces DC currents into the ground and lines, so that ground potential is different at different points. This causes partial saturation of transformers, and heating. That wasn't noticed until it was too late. So now, DC current in some key AC lines is monitored continuously, so power levels can be reduced if necessary.
Training materials for understanding this:[1] Start at slide 21.
Background info on how a power grid works.[2] Start with "PJM 101"
I'm trying to recall when I last ever saw "Eastern Prevailing Time" used.
Can anyone share why it's used?
I see more use of ET over that (for Eastern US) or better yet UTC/GMT.
I push data from my home server for easy access on my cloud VM. For example, weather data from my weather station, images/time-lapses from my weather cam. I have no ports open to my home network. Basically just fun stuff without exposing my home network.
I use the cloud VM as an SSH "jump box" into my home network. My OpenBSD box sets up a remote SSH tunnel port. I can then use the SSH -J option to jump through the cloud VM into that home OpenBSD box (as well as chain "jumps" to other home servers).
* This way I don't need any home server to trust a cloud VM.
* This mostly is for checking on my Home Assistant instance.
* I've also fixed some things remotely with an SSH session.
Do I need all this? Well, would be less fun without.And this is why I no longer use any Meta products.
What I can do is help my family and friends understand the choices they are making (e.g. use Signal to talk to me). That rush they feel posting something has effects on people in their graph and now they at least understand that and pause.
Another example is ancestor "research" type sites, or DNA tests to find "your true ancestry". I had no choice a cousin of mine chose that as a hobby.
My use case for tailscale: have an SSH (or other) connection to my home server while working from home. Drive to a coffee shop, register on their network, and continue using the same connection. (Or hotspot, if I'm somewhere without Wifi.)
The IP address of my server does not change. When at home, the packets do not leave my home network. When out and about, they do.
It's magic to me. I set up a sophisticated (read: overkill) SSH tunneling setup previously, using Match rules in .ssh/config to autodetect the network I was on so that `ssh myserver` would always go via the correct route. But my connections were still interrupted broke when I switched, and I'm not good enough at networking to do any better.
(I guess this is what Wireguard is for? I could access my server via a fixed IP address on my machine that goes to a tun device, and that would send the packets to the actual server if nearby otherwise hand off to the carrier pigeons? Is that what the tailnet is doing? I don't understand how packets get intercepted by tailscaled, though I do see a tailscale0 device. Is that just a vanity license plate version of tun0? Why does `ip route show` give me only routes through my actual devices, then? Never mind, this isn't a helpdesk. I'm just getting old and stupid, I think.)
The tunnel is on localhost only. The VM has a static IPv4/IPv6 with DNS.
Connecting the SSH tunnel from my home is stable as well as connecting to the VM remotely.
I do appreciate Tailscale and Wireguard. I was more responding to the fact that I don't have to trust any provider here, other than the one keeping my VM running.
Also, there's tmux for preserving sessions.
Instead, I have a VM running on a cloud provider that I SSH to from an OpenBSD box inside my home network. The SSH connection establishes a reverse SSH tunnel. This opens a port on the cloud VM to tunnel to my OpenBSD sshd port.
With the reverse proxy to my home OpenBSD box established, I can use the SSH jump box option, -J. I connect to the cloud VM and "jump" through the tunnel to the OpenBSD box at home. You can even specify multiple jumps if I need to connect to another machine in my home.
I can also set up a local tunnel through that jump for things like connecting to my Home Assistant server from my remote laptop or phone.
I only have to trust my cloud provider.
Thankfully the power supply still works so I can take it out every so often and enjoy the history of it.