In last 7 days, Ubuntu 18.10 was released followed by release of long awaited Linux kernel 4.19, and last but not least Linus Torvalds is back in drivers seat of Linux development. With this said, it was time to revisit how well does Linux work on MacBook Pro.
Last remaster I did was done on Ubuntu 18.04 with 4.17.6 kernel, I was so underwhelmed that I didn’t even make an “official release”. I was putting all my hopes in kernel 4.19, so now that it’s here, what’s the situation?
Ubuntu 18.10 (4.19 linux kernel) image release for MacBook Pro with Touch Bar
more “Ubuntu 18.10 (4.19 linux kernel) for MacBook Pro”
My post about remastering Ubuntu 18.04 version for MacBook Pro 2017 with Touch Bar working out of box got a lot more attention then I thought it would. This was most notable on Google+ and now I see there are even Reddit posts about it.
If you boot Ubuntu on Macbook Pro 2016/2017 edition model with Touch Bar on Ubuntu 18.04. Not a lot will be working out of box. Basically you’ll only get video working, while important components such as keyboard/touchpad/touch bar/WiFi will not be working.
more “Ubuntu 18.04 image release for MacBook Pro 2017/6 with Touch Bar”
I’ve been using IRC since late 1990’s, and I continue to do so to this day due to it (still) being one of the driving development forces in various open source communities. Especially in Linux development … and some of my acquintances I can only get in touch with via IRC :)
On my Synology NAS I run ZNC (IRC bouncer/proxy) to which I connect using various IRC clients (irssi/XChat Azure/AndChat) from various platforms (Linux/Mac/Android). In this case ZNC serves as a gateway and no matter which device/client I connect from, I’m always connected to same IRC servers/chat rooms/settings when I left off.
This is all fine and dandy, but connecting from external networks to ZNC means you will hand in your ZNC credentials in plain text. Which is a problem for me, even thought we’re “only” talking about IRC bouncer/proxy.
With that said, how do we encrypt external traffic to our ZNC?
more “Secure traffic to ZNC on Synology with Let’s Encrypt”
Secure public access to your Synology?
Every time I’m outside of my home network, and I need to get something from my Synology NAS, I’m facing the same dillema. Who’s sniffing the network I’m on, and who will I hand over my credentials in plain text using HTTP.
Of course, you can add extra security to your Synology account by using 2 step authentication, or first establishing connection to (preferably private) VPN connection. But even then … footprint of sensitive data you’re leaving behind you is just not worth it.
To resolve this problem, you could get a self-signed SSL certificate, but whole process will cost you time and money. But thanks to good people at Let’s Encrypt, this whole process now takes 15 minutes process and is free!
Secure (HTTPS) access to Synology NAS using Let’s Encrypt (free) SSL certificate
There are couple of tutorials which cover this same topic, however reason why I wrote my own is because none of them worked for me.
more “Secure (HTTPS) public access to Synology NAS using Let’s Encrypt (free) SSL certificate”
Today it’s not easy to anonymize internet traffic and protect our online privacy. From advertisers to various other parties, everyone seems to be interested in what we’re doing online, and it’s our traffic that allows them to track our behaviour and interests.
To make our internet traffic anonymous we could turn to various VPN/Proxy solutions, but in the end need you still need to have ultimately trust that your traffic on other side of the tunnel won’t end up in wrong hands.
That’s why if I want anonymity I’ll always turn to Tor (anonymity network).
Turn Raspberry Pi 3/or any other Debian Linux based device into a (Tor) WiFi Hotspot
You need two things:
- Clone anon-hotspot git repo
- Raspberry PI 3 or any other Debian Linux based device with ethernet port and wifi card
more “anon-hotspot: On demand Debian Linux (Tor) Hotspot setup tool”