Not exactly sure what you're asking for but
cat /proc/mounts
will reveal all mount points on the device aswell as which device is mounted there.
Not exactly sure what you're asking for but
cat /proc/mounts
will reveal all mount points on the device aswell as which device is mounted there.
The best way I know of is to get yourself a VM and get into the weeds; try to configure a system to your liking.
Follow the NixOS manual. The Wiki is unofficial; often opinionated, out of date or just plain wrong. Take it with a grain of salt. The canonical source of documentation is the NixOS manual and it's not nearly as bad as you may have heard.
Make extensive use of https://search.nixos.org/options or man configuration.nix
. Finding and making proper use of options and the module system is the bread and butter of using NixOS.
Eventhough everyone and their mom will recommend them to you for nebulous reasons, ignore flakes for now. You will know when you'll benefit from using them; namely when you need to use something outside of NixOS/Nixpkgs. You're going to have enough to figure out with plain old NixOS on its own though; I don't have external dependencies in my config to this day.
To wrap it up, make sure to ask the community if something's not working as expected: https://github.com/NixOS/nixpkgs#community
Bug report should probably go to GitHub.
I don't know what banning you're talking about. The topic I was talking about was user behaviour tracking.
They haven't successfully banned the main accounts associated with those using Google drive for piracy. ¯\_(ツ)_/¯
I am not aware of a policy at Google to ban accounts for storing pirated files. I only know of a policy to restrict the ability to share files with copyrighted content which the user has no license to share but that's an obvious necessity.
Not really. As soon as you have a path from global internet into your home network, all bets are off and you're now in charge of securing all of that against the entire world.
That said, if this is a regular old HTTP service, I believe Cloudflare Tunnels offer a way to put an authentication mechanism in front. This can work if, just like with Tailscale, you have a limited known set of users but the difference is that those users don't to have to install and use a VPN client to access your service but rather authenticate using an "external" HTTP service through their browser. Again, I do not believe this works for services accessed through APIs and certainly not ones using custom protocols.
I can't stress enough that getting those remote users to use Tailscale is probably the best and easiest solution.
Oh no, who could have foreseen that?! Anyways...
Note that while they're disingenuously proclaiming themselves to be a "free" tool, the license is actually an unfree proprietary custom license.
There's three reasons:
That said, if I had to share something with the public internet temporarily, I'd try not doing that first but could see myself using TS Tunnels.
Because it's a laptop.
I'd cross that bridge when I get there.
Are you expecting to have users in far away countries any time soon?
Hm, in that case Tailscale isn't quite what you want. It's not about opening up to the internet but rather your own virtual private network (hey, a VPN) with manually approved devices.
They do have a new Funnel feature which allows exposing specific parts to the Internet via their proxy though: https://tailscale.com/blog/introducing-tailscale-funnel
They don't and it's insane.