The lack of VoLTE in Linux OS phones is a dealbreaker for me, but otherwise, I’ve run pmOS with Posh and it works reasonably well now as of 25.06
The Post Ninja
The lack of VoLTE in Linux OS phones is a dealbreaker for me, but otherwise, I’ve run pmOS with Posh and it works reasonably well now as of 25.06
interesting use of character for “th”
Glad me and family are not on social media.
The install terminal app is for people that like to type in the console. The Mint Upgrader will present the option to upgrade when it’s ready.
Wasn’t this the plot of the Battlefield: Bad Company series?
copyparty
Let me go out on a limb and rec a cheap mini computer with 2 mini gigabit (or more) ethernets, and either pfsense or opnsense. Those two run on anything that has an x86_64 cpu and easily update. Not any harder to learn to setup than mikrotik, and has lots more capability.
I prefer Wayland Yutani
…and this is where sanitizing inputs becomes even more important…
Is there something you absolutely need root for? Or can you get away with not having root? It is always better to not have root capability, as that is a huge attack vector.
0/10 worst movie ever, no City Escape
When you put your server’s tailscale IP in the dns, anything that looks up that dns gets the tailscale IP. You only need to connect the devices you want to have connect to the server to the same tailscale network, and your system will handle the routing.
On your DNS provider, make an A record with your IP address, AAAA record with your IPv6 address. If these addresses change often, either setup a dyndns (your DNS provider needs to support this) or pay for a Static IP from your ISP. Firewall the hell out of your network, have a default deny (drop) new inbound rule, and only open ports for your service. Use an nginx reverse proxy if possible to keep direct connections out of your service, and use containers (docker?) for your service(s). Don’t forget to setup certbot and fail2ban. You need certbot to auto update your certs, and you need fail2ban to keep the automated login hacker bots from getting in.
That’s the minimum. You can do more with ip region blocking and such, as well as more advanced firewalling and isolation. Also possible to use Tailscale and point the DNS A record to the Tailscale IP, which will eliminate exposing your public IP to the internet.
Used DELL 5310. Intel 10th-gen, 60Whr battery (goes 8+ working hours on a charge) often 16GB RAM and at least a 256GB SSD at that price range. Upgradeable (DDR4, NVMe) too.
HomeAssistant to the rescue?
Privacy =/= Security. Windows XP might have good privacy (I would argue Windows 2000 is better for that, as it doesn’t have Product Activation), but security is nonexistant in 2025 in either case. For malware, it’s free real estate.
My recommendation is the G305. Yes, a gaming mouse. But they’re both cheap and have an insanely good polling rate, so the mouse is smooooooth. Also, no rubberized nonsense to degrade.
Graphene isn’t dead. They just have slowed down a bit. They’ve already released their first Alpha for 16
Lower the postgre to 8GB and see what happens? Also, hard drives, ssds, or nvme ssds? Recent info suggests it is possible memcaching is actually slower than direct access to nvme ssd