• 0 Posts
  • 51 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle









  • You’re focusing too much on the installation process, if installing Arch was the whole of the problem things like Endeavor would be a good recommendation for newbies, but they’re not. Arch has one giant flaw when it comes to being beginner friendly, and it’s part of what makes it desirable for lots of us, and that is the bleeding edge rolling release model. As a newcomer you probably want something that works and is stable. Arch is not, and will never be, that, because the core philosophy is to be bleeding edge rolling release. If you’re a newcomer who WANTS to have that and doesn’t mind the learning curve then go ahead, but Linux has enough of a learning curve already, so it’s better to get people started with something they can rely on and afterwards they can move to other stuff that might have different advantages/disadvantages.

    We’re talking about the general case here, I’ve recommend Arch to a newcomer in the past, he was very keen on learning and was happy with reading wikis to get there stuff sorted, but realistically most people who’re learning a whole new OS don’t want to ask questions and be told RTFM, and RTFM is core to the Arch philosophy.





  • I’ll answer point by point, but the short answer is pick one and use it, if you have issues with it or want to try something different, switch, otherwise stick with it.

    1. Your understanding is mostly correct. There’s the difference that each distro has a family tree which determines which package manager they use, Red hat based distros like Fedora use rpm, Debian based distros like Mint, Pop or Kubuntu use apt, etc. So it would be easier to switch from Mint to Kubuntu than from Fedora to Pop although not by much. The main difference between distros is philosophy, which honestly you shouldn’t care too much currently as long as you aim at something beginner friendly.
    2. Probably not something to worry about, and if it comes to that you can just jump to another distro, trust me once you’re familiar with Linux the distro matters less and less.
    3. Any of them (except for tuxedo which might be a good option but I don’t know it) would be a good option. Personally I would recommend Mint, or at least a Debian based one since 3 of the ones you suggested are Debian based it would give you more options to switch easily if needed.
    4. It should, but your mileage might vary
    5. Any of them should be good for that, KDE/Plasma is a bit similar to Windows while also being very eye candy, so it’s a good choice. Also it’s the one used on the Steam Deck so you might be somewhat familiar with it already.

    Extra: Nvidia should be fine as long as you use the official proprietary drivers (named nvidia, NOT nouveau). Photoshop doesn’t work on Linux, so you might need to jump through hoops there, if it’s not a hard requirement I suggest looking at Gimp for photo manipulation or Krista for drawing, good luck either way since it’s uphill battle either way, one against Adobe anti-piracy measures and the other against an unfamiliar software.




  • Nibodhika@lemmy.worldtoLinux@lemmy.mlAMD vs Nvidia
    link
    fedilink
    arrow-up
    15
    arrow-down
    1
    ·
    5 days ago

    I don’t want any proprietary drivers (so I am talking about Nouveau or any other FOSS Nvidia driver if it exists)

    In that case AMD, no doubt about it.

    If you were considering proprietary drivers it would still be AMD but there would be some discussion about it.


  • First of all let me make this absolutely clear, docker is not expected to be secure to that level. While they try to make it hard for someone to escape a container, it’s not their main concern so expect that there are vulnerabilities that would allow an attacker to escape.

    Now the second thing, the Overseer login screen might be secure enough for your case, the problem is that login is hard to do right, and Overseer are doing several other stuff as well, so they might not give it enough emphasis, and even if they do, maybe Immich devs don’t, or any one of the dozens of other services, so there are dozen of possible points of failure. Things like Authelia or Google OAuth are focused on authentication, so they do that absolutely right, and then they become the only point of failure for authentication.

    To be fair, if you keep things updated it’s unlikely not having auth would be a problem. Mostly because most hackers won’t even know of your server to begin with. And most systems are secure enough for most casual hacks. But it’s an investment worth the time if you plan on making something available to the internet.



  • I’ll try to ELI5, if there’s something you don’t understand ask me.

    Op has a home server where he’s running immich, that’s only accessible when he’s at home via the IP, so something like http://192.168.0.3:3000/, so he installed Tailscale on that server. Tailscale is a VPN (Virtual Private Network) that allows you to connect to your stuff remotely, it’s a nice way to do it because it is P2P (peer-to-peer) which means that in theory only he can access that network, whereas if he were using one of the many VPNs people use for other reasons, other people on the same VPN could access his server.

    Ok, so now he can access his immich instance away from home, all he has to do is connect to the VPN on his phone or laptop and he’ll be able to access it with something like http://my_server:3000 since Tailscale adds a DNS (Domain Name System) which resolves the hostnames to whatever IP they have on the Tailscale network.

    But if you want to give your family access it’s hard to explain to them that they need to connect to this VPN, so he rented a VPS (Virtual Private Server) on some company like DigitalOcean or Vultr and connected that machine to the Tailscale network. He probably also got a domain name from somewhere like namecheap, and pointed that domain name to his VPS. Só now he can access his VPS by using ssh user@myserver.com. Now all he needs to do is have something on the VPS which redirects everything that comes to a certain address into the Tailscale machine, Caddy is a nice way to do this, but the more traditional approach is ngnix, so if he puts Caddy on that VPS a config like this:

    immich.myserver.com {
        handle {
            reverse_proxy my_server.tailscale.network.name:3000
        }
    }
    

    Then any requests that come to https://immich.myserver.com/ will get redirected to the home server via Tailscale.

    It is a really nice setup, plus OP also added authentication and some other stuff to make it a bit more secure against attacks directly on immich.