• 2 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: July 13th, 2023

help-circle
















  • Currently, and I could be wrong, the alternative to a Pi 4 from Pine64 now would be a Pine64’s Quartz64 Model B. A Star64 might be interesting, but that’s RISC-V so who knows what OS you could boot on it currently and if it would even be stable.

    Plus with the Quartz64 Model B, who knows if you’ll able to get a good case for it. There’s the $28 “Model B” ALUMINUM WATERPROOF ENCLOSURE, but, eh, no thanks. There’s the open enclosure, but that’s also a no for me. I want a case I can hide the device itself, the cables, put a heatsink and fan on, be able to use an SSD with USB connect and connect a power supply all stuffed in a case. Which you can find plenty of for Raspberry Pi’s.

    Not to mention the Pi 5 isn’t even out yet, and it’s entirely possible it’ll be better than the Quartz64 Model B, on top of having a ton of accessories. Plus, I can Pi up practically any Pi at the Microcenter or similar store near me as opposed to having to pay for good shipping.

    I’m totally for having alternatives to the Pi, heck I might pick up a Quartz64 Model B if I can find a case, but a lot of alternatives don’t have the same support and accessories the Pis do.



  • Hmm, I guess my question would be how does this all work? I mean, is it not possible to configure STUN/DERP services yourself? Or add control lists yourself?

    I’m curious as to how all of this is done, not just to see if it’s possible (even if it’d be a headache) but for confirmation. Granted, networking is my worse subject when it comes to any related to computers. For ACLs, I guess Apparmor and/or SELinux profiles would be configured? The removing a key I can understand why it’s be a nightmare yourself, but how does Tailscale do it where it’s just so simple?

    EDIT: Another question I have is how does Tailscale work when I have a VPN for securing network traffic when browsing the internet etc.? Or is that just seamless?