A wide array of e-mail obfuscation techniques checked for their efficacy, and explained nicely.
Sorted by plain-text/hidden and js/non-js techniques.
Combine one or two and you should be relatively golden.
Very nice dropbear setup explanation, including key transferral and hardening.
You can add your key to ~/.ssh/authorized_keys for individual users as usual with openssh - perhaps this is a thing only for newer dropbear versions? The given path would then be for root/system-wide access.
In order to disable password auth for systems that do not have uci, you can add -s as startup parameter, e.g. through editing /etc/default/dropbear field (though probably a better file than in 'default'). see here
Don't forget to restart after operations /etc/init.d/dropbear restart (though it will just invoke systemctl on systemd devices)
A review of Tailscale, "a secure network that just works".
Uses wireguard to create an encrypted tunnel between all your devices. Automatically takes care of NAT, DNS, and similar.
Essentially makes it really easy to set up your true private network within the wider one.
Also comes with 'taildrop' which mimics airdrop to easily transfer any files between your devices,
but do so without any involvement of external cloud services and completely encrypted.
A unix-only de-duplicating backup system. It is managed for you, encrypted and so on but also strictly tied (afaik) to the tarsnap 'service' - that means you can't just use your own object storage or similar like with e.g. restic.
FoldFold allExpandExpand allAre you sure you want to delete this link?Are you sure you want to delete this tag?
The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community