The ungleich survival guide » History » Version 1
Nico Schottelius, 12/30/2018 10:25 AM
1 | 1 | Nico Schottelius | h1. The ungleich survival guide |
---|---|---|---|
2 | |||
3 | h2. Status |
||
4 | |||
5 | This document is *IN PROGRESS*. |
||
6 | |||
7 | h2. Introduction |
||
8 | |||
9 | We live a very freely organised organisation with a lot of degrees of freedom. While this might look chaotic, it is given each and every person the highest degree of freedom. |
||
10 | |||
11 | However with power comes responsibility. To be able to do your work, it is one's own responsibility to |
||
12 | |||
13 | * let others now if you made progress or if you are stuck |
||
14 | * organise the tasks (see [[Ticket Handling]] |
||
15 | * escalate if you are blocked (nobody answering? -> escalate to Nico) |
||
16 | |||
17 | h2. Communication |
||
18 | |||
19 | Most communication happens in the general, private channels. The channels are private to protect everyone from their own mistakes. We all make mistakes and in regular society, mistakes are forgiven. Public information on the Internet is not forgotten. |
||
20 | |||
21 | However, where possible, we communicate openly and publicly. |
||
22 | |||
23 | We are an international team and there is no room for any kind of discrimination in any dimension (gender, race, sexuality, choose-your-attribute). |
||
24 | |||
25 | h3. Working hours |
||
26 | |||
27 | You decide how much and when you work. You are in your own timezone, environment and own personal constraints. However to work together, you need to communicate when and how much you are available. |
||
28 | |||
29 | |||
30 | h3. Assume the technical worst |
||
31 | |||
32 | The more deep you get into it, the more you realise how fragile things can be. For that reason, there are some basic ground rules: |
||
33 | |||
34 | * all important stuff from your machine is backed up daily: |
||
35 | ** git: git push prior to stop working |
||
36 | ** everything else: upload to https://cloud.ungleich.ch |
||
37 | * Your whole filesystem should be encrypted, not only your home |
||
38 | ** programs save temporary data somewhere in the wild of your partitions |
||
39 | ** encrypt everything, unlock on boot |
||
40 | * Use different passwords for different services |
||
41 | ** use passphrases like "Nicotoldmetouselongpassphrases" (TBD: write password guide) |
||
42 | ** Use a password manager, like "pass":http://www.passwordstore.org/ |
||
43 | * Your ssh keys should be encrypted |
||
44 | ** Even if your root filesystem is encrypted, a backup might be online and accessible |
||
45 | |||
46 | Assume that your primary working device can be stolen or break at any time. |