I’m not sure if HIPAA requires medical providers to delete your data, let’s make certain to include that. It needs to act transitively. If you request deletion, the data must be gone from everyone they passed it on to, and so on. If they send it abroad and cannot enforce the deletion, let’s have some million-dollar fines per instance.
Entertainment companies are morally bankrupt because of how much they take from the people actually doing work to give to CEOs. I don’t care if people get that content for free since nearly none of the revenue will go towards the creators. But they are at least somewhat reimbursing the labor that goes into the content.
The academic journals do not do any work whatsoever and charge absolutely absurd prices for access. They get free peer review from the community, they certainly don’t write any of the content. It is a moral imperative to prevent them from profiting off of other people’s work. Hope they lose all their ill-gotten gains.
“As easy as buying four same-sized disks all at once” is kinda missing the point.
How do I migrate data from the existing z1 to the z2? And then how can I re-add the disks that were in z1 after I have moved the data? Buy yet another disk and add a z2 vdev with my now 4 disks, I guess. Unless it is possible to format and add them to the new z2?
If the vdevs are not all the same redundancy level am I right that there’s no guarantee which level of redundancy any particular file is getting?
I mean, yeah, I’d prefer ZFS but, unless I am missing something, it is a massive pain to add disks to an existing pool. You have to buy a new set of disks and create a new pool to transition from RAID z1 to z2. That’s basically the only reason it fails the criteria I have. I think I’d also prefer erasure encoding instead of z2, but it seems like regular scrub operations could keep it reliable.
BTRFS sounds like it has too many footguns for me, and its raid5/6 equivalents are “not for production at this time.”
I was looking into setting up Nextcloud recently and the default directions suggest exposing the socket. That’s crazy. I checked again just now. I see it is still possible to set it up without socket access, but that set of instructions isn’t as prominent.
I linked to Docker in specific because if Nextcloud has access to the socket, and hackers find some automated exploit, they could easily escalate out of the Docker container. It sounds like you have it more correctly isolated.
Doesn’t Nextcloud running in Docker want the socket exposed?
I googled around for an example https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation.
Ignore me if you’ve already hardened the containers.
Damn, same, nuked Traefik when v2 broke the setup I spent hours trying to figure out. I don’t think the concepts are overwhelming, but something is profoundly wrong with their documentation habits. Now someone in the comments here is saying v3 changes the way paths are read with regex? Lol, fuck Traefik, never again.