

And you think that’s going to happen by removing the trashcans?
And you think that’s going to happen by removing the trashcans?
As long as it’s not an exit node, nobody will be able to tell what the traffic is. It’s all encrypted including the metadata.
That fact that you think “idealistic version of early US” is a compliment is very telling.
Your proposal is just an idealistic version of early US. You claim that corruption is fundamentally impossible, but assume that magically “the monarchs aren’t allowed to own property” without regard to enforcement. You claim to have an alternative to democracy but still propose majority voting on replacing rulers and constitutions. You simply assume that monarchs will keep each other in check and not devolve into the conspiring, warmongering tyrants that history is full of.
Power can always be abused to get more power and go against all your original ideals. The only way to definitely prevent corruption is to ensure power is never concentrated in the hands of few.
Are you free tonight? Because I don’t have any money.
How does that increase the risk compared to something like JBOD or overlayfs? In both cases you will lose data if a drive fails. Keep in mind that this is btrfs raid0, not regular raid. If anything that decreases the chance of corruption because the metadata is redundantly stored on both drives.
No mention of systemd? This is unacceptable.
A disk failure will cause you to lose data, yes. But that’s also the case in all the other solutions discussed here. Backups should be handled separately and are not part of the original question.
Have you considered simply setting btrfs to RAID 0?
Remember how the Titan sub used a game controller and everyone called them out? I think I’d still feel safer.
Even if you computer is not exposed to the internet: are you certain that every other device on the network is safe (even on public wifi)? Would you immediately raise the alarm if you saw a second printer in the list with the same name, or something like “Print to file”? I think I personally could fall for that under the right circumstances.
Is this a threat?
Not my idea of a good date, but to each their own
“I dropped my fair share of hard Rs back then”
With this approach you would lose the subvolume structure and deduplication if I’m not mistaken.
The most common physical attacks will be you misplacing your device or some friend/burglar/cop taking it. FDE works great in those scenarios.
Reserved for future use
Unit tests or integration tests?
GDPR enforcement is left to the member states. The EDPB isn’t an agency, its more like all the national data protection authorities in a trench coat.
So what is the reason for doing it that way?