Thank you!
The main interest of this set up is that you can use your own DNS server with all your devices. That means configure it only once. If you want to do it on /etc/hosts, you have to do it for each of them. Sometime you can’t do it, for example on a non-root Android Smartphone
I do the same with a raspberry pi and dnsmasq on my home network. I am not using pi-hole, since I am not a fan of these curl | bash installers + I do not need the web-interface.
I was thinking about Pi-hole for a time but I heard that it is not so clean that it looks like. Only install what you really need and it is better if you can exactly understand what it does.
It is a good advice, thank you for sharing.
If you want a simple, easy and fast ebook reader for .epub files (.mobi sadly aren’t support), I can really recommend mupdf.
Thank you for your advice, however, I prefer Calibre which is on GPLv3 contrary to mupdf which is owned by Artiflex company.
Miraki thinks this is malware-related (probably some dumb work setting), but also Firefox is kvetching about SSL.
Hello friendlysock,
Could you please tell more about that by private message? How do you get the report?
Thank you very much, Mirabellette
I think it’s reasonable to assume that e.g. AES won’t be broken in 10 years. (and IIRC quantum attacks are against public key crypto, not symmetric.)
An actual concern with the cloud services would be trusting them to do server side encryption. Don’t :) This is a feature for compliance, when stuff “must be encrypted” but you don’t care about not trusting the service.
I read multiple papers who said it is very secure to use AES-256 for encryption and we are far, if I trust them to break AES-256. However, who could really know about that except except scientist or government agency?
However, for me, when the task is not easy, mistakes could appears and expert needs just one weakness to break you in. It is not easy to encrypt something with the highest security parameter and using the best practice. You also need to have a correct management of the key which could be compromised.
For example:
And with time: