

Bunker.
Deep bunker.
Bunker.
Deep bunker.
Oooh, amazing! Do you use it? How mature is it?
I have one in theirs, they have one in mine.
Wait, ease of installation? As someone who had to walk away from a semi-homebrew, mildly complicated cloud storage setup recently, that’s not the experience I had. Networks within networks, networks next to networks not talking to each other, mapped volumes, even checking logs is made more complicated by containerising. Sure, I’m a noob, but that only reinforces my point.
That sounds like carrying an ID card with extra steps.
Ok, I’m missing something then.
What is CSS used for?
Right, that’s what I understood. So using a VPN, a CSS will be able to identify that my phone is active, but not the content I’m accessing, or who I am accessing it from, correct?
The previous comment said VPNs do nothing against this type of attack- were they just referring to identifying your device?
Forgive my ignorance, but isn’t preventing this type of man in the middle attack exactly what VPNs are for?
I’m interested in why you chose the i5 for the automation, rather than the video server?
I’m no expert, but things like transcoding (or even just re-encoding) take a lot of grunt, which it seems the i5 would be good for.
The i3 would be good for more constant, lower power tasks like automation.
At least, that’s my thoughts, happy to be shown your reasoning…