

Couldn’t the attacker just drop a dangerous binary into the data volume then?
Couldn’t the attacker just drop a dangerous binary into the data volume then?
How would you add new links if its read only?
I’ve been using this which works great.
https://f-droid.org/packages/com.sbv.linkdroid/
Works with my single sign on setup as well which was critical. Creates a nice share target on android so any share button gives the option of sending the link to linkwarden
One thing to consider is that once zfs is setup there really is no significant intervention that is needed. I probably haven’t done anything to my proxmox zfs array in years.
I know its almost a meme to say just learn command line, but unfortunately in this case it will really help you understand what is happening and it also just takes a few commands to setup up once and then never worry about it again.
After the inital setup, the zfs GUI will be pretty much unused.
For commands I don’t use often, i use a note taking software to keep track of commands I used during setup because years go by before I use it again. I find the GUI often changes in that time making it harder to replicate whereas command line is the same and easier to document.
Keeping 80 open is useful so that traefik can redirect all traffic to 443 (https)
This is great. Thanks!