monsieur_jean

  • 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: July 5th, 2023

help-circle







  • You’re a senior CS person and you are asking if you should have a backup system in place? o_O

    Sorry if this sounds like a personal attack but it’s something you should have though of a long, long time ago, as a CS person. Even when still using Windows.

    Assuming you are serious, then yes there are ways to save your data under Linux, with different levels of complexity and privacy.

    The bare minimum is some basic cloud backup. Not ideal for privacy, but at least if your drive dies you won’t lose your files.

    Local backup in the form of a NAS or home server is also an option, and allows different systems (Windows, Mac, Linux) to save a copy of their files. Way better from a privacy perspective if setup properly BUT your are one fire or one burglary away from losing everything.

    If you want to reconcile privacy AND safe storage then to me there are a few options :

    • End to end encrypted cloud storage if you trust the third party (Proton drive, Tresorit, etc)
    • End to end encrypted cloud storage that you control (requires very high skills and a lot of work and money. And a lot of maintenance)
    • Local network storage (NAS/homeserver) with an encrypted backup regularly sent to the cloud
    • Hybrid end-to-end encrypted cloud using a non encrypted cloud solution (like Google Drive) with Cryptomator or equivalent (if you trust them).

    So many options, depending on your sensibility to privacy and your technical knowledge. You can also mix. For example most of my personal files are hosted on Microsoft OneCloud because it’s stable and fast enough. I mean almost my entire home folder (excluding configuration) is replicated there. But some of the sensitive files, mostly scans of official documents like tax returns, healthcare receipts, etc, are end to end encrypted using Cryptomator. Also my passwords are saved in an shared encrypted Keepass database. And all my drives are encrypted (with LUKS) including my external drives.

    Anybody who has dug that topic long enough knows that total privacy and total security are a myth. It simple doesn’t exist. You need to find the balance between privacy, security and practicality that suits you. If you are paranoid, then getting to a reasonable level of all three is going to be a LOT of work and money. If you are just cautious, and are willing to trust reputable third parties, then it’s quite possible to have a working solution without spending too much time and money. And the very bare minimum is to chose between a backup with little privacy, or more privacy with the acceptance that you may lose everything.


  • Everything you say is what past me would have answered ten years ago, thinking current me is an idiot. Yet here we are. ;)

    You are right and make good points. But you are not 99% of computer users. Just considering installing a linux distro puts you in the top 1% most competent.

    (Speaking of which, I still have a laptop running EndeavourOS + i3. Three months in my system is half broken because of infrequent updates. I could fix it, I just don’t have the motivation to do so. Or the time. I’ll probably just reinstall Mint.)


  • It’s a bit more complex than that (and you probably know it).

    When you enter the Apple ecosystem you basically sign a contract with them : they sell you overpriced goods, but in exchange you get a consistent, coherent and well thought-out experience across the board. Their UX is excellent. Their support is good. Things work well, applications are easy to use and pretty stable and well built. And if they violate your privacy like the others, at least they don’t make the open-bar sale of your data their fucking business model (wink wink Google).

    Of course you there’s a price to pay. Overpriced products, limited UI/UX options, no interoperability, little control over your data. And when there’s that one thing that doesn’t work, no luck. But your day to day life within the Apple ecosystem IS enjoyable. It’s a nice golden cage with soft pillows.

    I used to be a hardcore PC/Linux/Android user. Over the last few years I gradually switched to a full Apple environment : MacBook, iPhone, iPad… I just don’t have time to “manage” my hardware anymore. Nor the urge to do it. I need things to work out of the box in a predictable way. I don’t want a digital mental load. Just a simple UX, consistency across my devices and good apps (and no Google, fuck Google). Something I wouldn’t have with an Android + PC setup. :)

    The whole “special club” argument is bullshit, and I hope we grow out of it. Neither the Apple nor the Google/Microsoft environments are satisfactory. Not even speaking of Linux and FOSS. We must aim higher.






  • The Apple M series is not ARM based. It’s Apple’s own RISC architecture. They get their performance in part from the proximity of the RAM to the GPU, yes. But not only. Contrary to ARM that has become quite bloated after decades of building upon the same instruction set (and adding new instructions to drive adoption even if that’s contrary to RISC’s philosophy), the M series has started anew with no technological debt. Also Apple controls both the hardware to the software, as well as the languages and frameworks used by third party developers for their platform. They therefore have 100% compatibility between their chips’ instruction set, their system and third party apps. That allows them to make CPUs with excellent efficiency. Not to mention that speculative execution, a big driver of performance nowadays, works better on RISC where all the instructions have the same size.

    You are right that they do not cater to power users who need a LOT of power though. But 95% of the users don’t care, they want long battery life, light and silent devices. Sales of desktop PCs have been falling for more than a decade now, as have the investments made in CISC architectures. People don’t want them anymore. With the growing number of manufacturers announcing their adoption of the new open-source RISC-V architecture I am curious to see what the future of Intel and AMD is. Especially with China pouring billions into building their own silicon supply chain. The next decade is going to be very interesting. :)




  • You just want to get a feel for it, so I suggest what I’ve used with success in the past :

    • Windows host
    • Virtualbox
    • Linux Mint with the XFCE desktop environment.

    All free, Linux mint is newbies friendly and XFCE is light enough to run well in a VM. It is Ubuntu based so it’s very well documented (basically 99% of the tutorials for Ubuntu work with Mint) but it comes with less bloatware and a more ethics.

    Of course no single Linux distribution is perfect or we would all be using it but I suggest you don’t lose time looking for a distro. Just pick one and install it. If you don’t like the look and feel, then try another. You can distro hop through several of them to taste the variations. But the general principles are pretty much the same across the board.



  • This is already how it works.

    When workers need to access a portion of railtrack (a block), they need to request a possession and isolation from the command center of the line. A possession means no train can approach less than two blocks from the block they will work on, and an isolation means the power is cut (most lines in Europe are electrified).

    The procedure to perform this has been specifically designed to avoid miscommunications, with multiple back and forth between the operators on the ground and the command center to ensure one doesn’t mindlessly make a mistake. Usually it’s done by phone but I believe some lines now have apps for it.

    This accident should not have happened. If the possession had been granted then at the very least the signaling system would have warned the train driver to stop several kilometers before he reached them. On modern lines the train would have stopped automatically, without human intervention. And signaling systems are extremely robust, they don’t “bug” in a way that makes this possible.

    To me this must be a human error. Either the workers worked without a possession (because they though it would be ok, the line was not operating at that time, it was a short operation, yadda yadda. The exact reason why possession requests are mandatory…) or it was an old line and the train driver was not paying attention to the point of ignoring several, big reg lights telling him to stop.

    Either way, no GPS location sharing would have helped if someone disregarded safety instructions. :/

    Source : I’m not an expert but I did an internship in a company who designs signaling systems in Europe and my project was specifically on the subject of replacing phone calls for possession and isolation with an app on a PDA.