Project

General

Profile

The ungleich survival guide » History » Version 2

Nico Schottelius, 12/30/2018 10:25 AM

1 1 Nico Schottelius
h1. The ungleich survival guide
2
3 2 Nico Schottelius
{{toc}}
4
5 1 Nico Schottelius
h2. Status
6
7
This document is *IN PROGRESS*.
8
9
h2. Introduction
10
11
We live a very freely organised organisation with a lot of degrees of freedom. While this might look chaotic, it is given each and every person the highest degree of freedom.
12
13
However with power comes responsibility. To be able to do your work, it is one's own responsibility to
14
15
* let others now if you made progress or if you are stuck
16
* organise the tasks (see [[Ticket Handling]]
17
* escalate if you are blocked (nobody answering? -> escalate to Nico)
18
19
h2. Communication
20
21
Most communication happens in the general, private channels. The channels are private to protect everyone from their own mistakes. We all make mistakes and in regular society, mistakes are forgiven. Public information on the Internet is not forgotten.
22
23
However, where possible, we communicate openly and publicly.
24
25
We are an international team and there is no room for any kind of discrimination in any dimension (gender, race, sexuality, choose-your-attribute).
26
27
h3. Working hours
28
29
You decide how much and when you work. You are in your own timezone, environment and own personal constraints. However to work together, you need to communicate when and how much you are available. 
30
31
32
h3. Assume the technical worst
33
34
The more deep you get into it, the more you realise how fragile things can be. For that reason, there are some basic ground rules:
35
36
* all important stuff from your machine is backed up daily:
37
** git: git push prior to stop working
38
** everything else: upload to https://cloud.ungleich.ch
39
* Your whole filesystem should be encrypted, not only your home
40
** programs save temporary data somewhere in the wild of your partitions
41
** encrypt everything, unlock on boot
42
* Use different passwords for different services
43
** use passphrases like "Nicotoldmetouselongpassphrases" (TBD: write password guide)
44
** Use a password manager, like "pass":http://www.passwordstore.org/
45
* Your ssh keys should be encrypted
46
** Even if your root filesystem is encrypted, a backup might be online and accessible
47
48
Assume that your primary working device can be stolen or break at any time.