Skip Navigation
What file systems are you using on your devices and why?
  • As an aside, I’ve been watching bcachefs with some interest, as it seems to be getting faster with every kernel release, building on the data integrity guarantees of ZFS while pushing performance boundaries and being GPL compatible (i.e. in tree). Kent Overstreet et al. have done a fantastic job with this FS.

  • What file systems are you using on your devices and why?
  • A combination of XFS and ZFS. I work in high performance computing (academic). While I love the reliability of ZFS for data archival and peace of mind that results provably haven’t suffered bitrot, sometimes I just need a 10 TB temp file(s) with fast mostly-sequential R/W. Appropriate selection of file systems lets me have both.

  • What file systems are you using on your devices and why?
  • I feel your pain on the CDDL (although I think it is still considered a “free” license), and while I love to hate Oracle, I think the CDDL decision was originally Sun’s, even if Oracle could “free” it now to be GPL.

  • Why is OpenSSL able to use a key file my user shouldn't have access to?
  • Just to verify all permission-related things in one go, see if you can open the key as your user with an editor like vi or nano. This will let you separate out some behavior specific to OpenSSL vs some behavior purely permissions-based.

    I’m not sure what’s happening here, but the above test can at least narrow the focus.

  • Top comment gets to choose my hostname
  • Here I was hoping that if you took the UTF-8 representation in bytes and decoded it as ASCII, you would get something interesting. But no, just Unicode characters. Almost interesting is that none of the bytes are valid ASCII characters (< 128), which you might expect for the first byte of every UTF-8 codepoint due to backwards compatibility for ASCII encoding, but perhaps not for the subsequent bytes that comprise the rest of the grapheme.

    I'm finally starting to understand the appeal of numerology.

  • Concerns over DNS Blocking
  • Even Palo Alto notes that they can only effectively block DoH if you're MITMing all https traffic already (e.g. using a root certificate on corporate-managed devices). If not able to MITM the connection, it will still try to block popular DoH providers, though.

    https://live.paloaltonetworks.com/t5/blogs/protecting-organizations-in-a-world-of-doh-and-dot/ba-p/313171

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)GH
    ghjones @beehaw.org
    Posts 0
    Comments 11