Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

My hard work has paid off!

Uncategorized
1 1 17

Gli ultimi otto messaggi ricevuti dalla Federazione
  • Il cuore batte spesso in solitaria.
    Ma va bene così, fa parte di quello strano, assurdo gioco che è la vita. Una maestra severa.

    read more

  • Ben Werdmuller wrote a new perspective on RSS. It's great, just what we need. RSS is of the web, and is the simplest most obvious way to get all the twitter-like systems connected.

    https://werd.io/why-rss-matters/

    read more

  • Making Glasses That Detect Smartglasses

    [NullPxl]’s Ban-Rays concept is a wearable that detects when one is in the presence of camera-bearing smartglasses, such as Meta’s line of Ray-Bans. A project in progress, it’s currently focused on how to reliably perform detection without resorting to using a camera itself. Right now, it plays a well-known audio cue whenever it gets a hit.
    Once software is nailed down, the device aims to be small enough to fit into glasses.
    Currently, [NullPxl] is exploring two main methods of detection. The first takes advantage of the fact that image sensors in cameras act as tiny reflectors for IR. That means camera-toting smartglasses have an identifying feature, which can be sensed and measured. You can see a sample such reflection in the header image, up above.

    As mentioned, Ban-Rays eschews the idea of using a camera to perform this. [NullPxl] understandably feels that putting a camera on glasses in order to detect glasses with cameras doesn’t hold much water, conceptually.

    The alternate approach is to project IR in a variety of wavelengths while sensing reflections with a photodiode. Initial tests show that scanning a pair of Meta smartglasses in this way does indeed look different from regular eyeglasses, but probably not enough to be conclusive on its own at the moment. That brings us to the second method being used: wireless activity.

    Characterizing a device by its wireless activity turned out to be trickier than expected. At first, [NullPxl] aimed to simply watch for BLE (Bluetooth Low-Energy) advertisements coming from smartglasses, but these only seem to happen during pairing and power-up, and sometimes when the glasses are removed from the storage case. Clearly a bit more is going to be needed, but since these devices rely heavily on wireless communications there might yet be some way to actively query or otherwise characterize their activity.

    This kind of project is something that is getting some interest. Here’s another smartglasses detector that seems to depend entirely on sniffing OUIs (Organizationally Unique Identifiers); an approach [NullPxl] suspects isn’t scalable due to address randomization in BLE. Clearly, a reliable approach is still in the works.

    The increasing numbers of smartglasses raises questions about the impact of normalizing tech companies turning people into always-on recording devices. Of course, the average person is already being subtly recorded by a staggering number of hidden cameras. But at least it’s fairly obvious when an individual is recording you with a personal device like their phone. That may not be the case for much longer.

    hackaday.com/2025/12/09/making…

    read more

  • @Zambunny ti abbraccio virtualmente, per quel che vale ❤❤❤

    read more

  • read more

  • In tutto l'ordine degli ingegneri non ne trovano uno che sappia far funzionare la PEC.

    read more

  • We report: all of the wind of these past few weeks has stripped the trees bare here. The ground is all mulch and rotting wood, and we are bound to get a foot stuck in there at some point tonight. With no leaves on the branches, and barely a breeze, the night is eerily quiet.

    read more

  • @SecurityWriter the first season took everything good about 80s horror and fantasy and teen movies, and the fifth season seems to be taking everything bad, including 30 year olds playing high schoolers. (This last bit I could forgive if the 30 year olds and the scripts were good, but they aren't, so...)

    read more
Post suggeriti
  • 0 Votes
    1 Posts
    6 Views
    We all love media – to some extent at least!Movies, TV Shows and all the moving pictures we can find and consume.So, since we all have movies etc. on our NAS/HDD/SSD/whatever we should be able to play and see everything we have on all our connected devices.But what can we do?Simple, we leverage Jellyfin to present our media to us.In this little howto we will set up Jellyfin in a Jail on FreeBSD.Let’s get right to it!Creating the JailJails can be created in different ways. In this howto however we will use Bastille – which is a excellent tool for creating Jails.This howto will not go into detail of how to set up Bastille. If you need to set up Bastille first, given you have not installed said tool, you can have a look at the quickstart guide:Bastille Quickstart GuideRight, let’s create the Jail first.$ sudo bastille create media 14.3-RELEASE 10.0.23.77/24 vtnet0You of course need to change the IP address and network interface (vtnet0 is probably not what you want!). Also, one can of course change the name of the Jail – I’ve chosen media since that describes the use case well of said Jail.After that our Jail is ready!Jellyfin needs mlock to be enabled to work properly.$ sudo bastille config media set allow.mlock 1But wait a second… How do I access all my media files?There is no access in the Jail to any directory on the host holding all my videos!Right, that is the case indeed!So, what can we do?Simple, we just mount our media directory in the Jail with nullfs!$ sudo bastille mount "media" /home/x/videos/ /videos nullfs ro 0 0This line mount /home/x/videos/ in the Jail under /videos. Also, I mount the directory as readonly – which you can change by sepcifying rw on the command above. Be sure to also select the correct Jail – in my case media.Jail fun with JellyfinWe can now finally enter the jail to further go along with the howto.$ sudo bastille console mediaLet’s first install Jellyfin which is directly accessible from the official package repository.$ pkg$ pkg update -f$ pkg install -y jellyfinThe first command pkg bootstraps the pkg package manager. The second command refreshes the package cache and the last command installs Jellyfin itself.Right, so far so good.But we also need to configure Jellfin (Service) to always start. And, last but not least, we need to start Jellyfin – since it is not running after the installation finished.$ sysrc jellyfin_enable="YES"$ service jellyfin startWe did all that, alright… But how do we know Jellyfin is running?Let’s have a look at the ps and sockstat output.root@media:~ # sockstat -l4USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS jellyfin jellyfin 10700 478 udp4 10.0.23.77:7359 *:*jellyfin jellyfin 10700 503 tcp4 10.0.23.77:8096 *:*root@media:~ # ps ax PID TT STAT TIME COMMAND10662 - SsJ 0:00.00 /usr/sbin/syslogd -ss10699 - IsJ 0:00.00 daemon: /usr/local/jellyfin/jellyfin[10700] (daemon)10700 - IJ 0:03.81 /usr/local/jellyfin/jellyfin --datadir /var/db/jellyfin --cachedir /var/cache/jellyfin10706 - SsJ 0:00.00 /usr/sbin/cron -J 60 -s10804 1 IJ 0:00.00 login [pam] (login)10805 1 SJ 0:00.01 -sh (sh)10842 1 R+J 0:00.00 ps axAh yes, Jellyfin is running and listening on port 8096 – which is the designated port for Jellyfin!Jellyfin all the way!Since we established that Jellyfin is running and listening, let’s open our webbrowser of choice and navigate over to the install wizard.$ firefox http://10.0.23.77:8096We are greated with the intital Jellyfin wizard.I will not go into detail on how to set up the wizard. But don’t worry, there is a excellent guide over on the official Jellyfin website.The guide can be found here: Jellyfin Setup Wizard guideBe sure to add your nullfs mounted directory in your library to be able to play said videos and shows.That is all there is to it.Simple, easy and clean. Everything is done in a Jail and isolated. Also, mounting a media directory is easy and straightforward via bastille mount.Final wordsThis little howto just shows how versatile jails are. One can of course tweak the setup further and for example add a reverse proxy (like Nginx) to the mix.The sky is the limit – Tools like bastille are very powerful and flexible!Enjoy!…and as always:Stay Open!
  • 0 Votes
    3 Posts
    19 Views
    @stefano Thank you! 😉
  • 0 Votes
    5 Posts
    31 Views
    @winterschon yes I have the boot log from both succesful and failed images. After numerous trial and errors (manual hook, compiled u-boot for r2s plus via ports), I found that there is no trust.img from FreeBSD, that's why nanopi skipped the sdcard. I flashed armbian (working image) trust.img to the sd card and Nanopi showed loader error.maybe I need to recompile the u-boot with ATF load turned off?
  • 0 Votes
    11 Posts
    63 Views
    @stefano is this about Zextras? https://it-notes.dragas.net/2025/10/08/the-email-they-shouldnt-have-read/