Thanks Jeff! Of note, if you previously had Raspberry Pi Connect set up on your RPI you need to do an sudo apt update and sudo apt upgrade on it before the website offers you the option for remote shell access
Ah yes, should've mentioned that in the video! Travel day always a bit more stressful and I didn't have the normal cycle of testing before I wrote up this quick script :)
It is quite handy. I still use my VPN for most things, but I do have a Pi just running Connect that I attach different projects to, and it's separated from my main network so I can run long term experiments and just connect straight to it to check on them anywhere. Including the airplane now, yay!
@@Level2Jeff One thing I did notice is that you don't get a Domain or anything to connect to, for example a selfhosted WebUI like CasaOS. Its only Terminal. So for that I will also use a VPN.
mosh is also a great replacement for ssh on high latency or unreliable connections. If you can get it to work, it's kind of magic how responsive remote shell sessions feel.
I've had remote connect to my raspberry pi in London for over 10 years now. With the right software installed I can ssh to it from any of my machines here in the US. I'm missing the part where I need to login to some other service to make use of such a fundamental feature of Linux. If I had my tinfoil hat on you'd probably think I was a crazy person 😂 I ship my friend in London a new Pi to upgrade the one in his network cabinet every 3 or 4 years. I considered switching to a mini-pc but the Pi has worked so well I can't really justify it.
Other issues: Is this open source? Where's the code? What encryption is being used? Is it true end-to-end? What data do they gather and store? Who "owns" it? Who has access to it? Can you later opt-out and have all your data removed? So many trust questions
My problem with Raspberry Pi Connect is that it's basically a company in the middle who might or might not be tracking and using that data somehow for whatever purposes. While I don't do anything on my Pi that would be questionable, I still think Raspberry Pi Foundation doesn't need to know about me connecting to my Pi and testing out different Linux softwares for fun. I personally just use RustDesk and host RustDesk server myself.
@@Rushil69420 It's bit more complex than that. If someone else hosts the connection servers for you, then yes, it does apply. If you can host it yourself then it would depend on whether the application is FOSS or not. With RustDesk I can go through the source code and build it myself after doing any modifications if need be.
@@touma-san91indeed. It's about trust, and for my fun Pi, I trust Raspberry Pi enough. But I isolate it from my main network and only access that through my VPN.
This. I've had a remote Pi setup for over a decade. It is a one command fully encrypted ssh command away. I'm failing to see why a 3rd party needs to poke their nose into that process.
I use Tailscale for device access remotely and while it works over a high-latency connection it isn’t exactly pleasant. A few 100 ms between typing and getting feedback on the terminal feels really unnatural. I’ll have to give this a shot!
One thing I'm leary about with the tooling @ 0:40 is the phrase remote shell. How secure is it? How long before a CVE appears for this? lol Hope it's just my paranoia talking.
It's using the same tech as their screen sharing setup. Any remote access (even using web standards like rpi-connect does) introduces new levels of risk. Like how secure is the Pi relay server? That's in use if you connect through the airplane WiFi like I did...
Kinda odd 14 years after quadrax and a wifi based server in your 737 luggage compartment can't allow you to watch sons of anarchy streamed. To your shared network seamlessly.
Good question: I have a video on Pi-VPN... which, sadly, is no longer maintained. See th-cam.com/video/5NJ6V8i1Xd8/w-d-xo.html I still use Wireguard, but am looking for the easiest way to manage it now.
So this uses a cloud service to remote access into your Pi? A cloud service that hackers love to exploit. A cloud service that puts everyone's credentials at risk in one juicy spot for hackers to get. Given just about every corporations' track record of keeping their cloud services secure, I think I'll pass. Plus, do you really think a now publicly owned company, beholden to its shareholders and not its customers, won't be selling and distributions whatever info they can scrape off your connection? Thanks, but no thanks.
It's awesome that MicroCenter brought you out. You’re welcome back to NC anytime, Jeff.
Two times in two years-I've been to NC more than Illinois lately!
I hope Liam Neeson wasn't on that flight, he'd assume you're up to no good with that set-up!! 😬
Thanks Jeff! Of note, if you previously had Raspberry Pi Connect set up on your RPI you need to do an sudo apt update and sudo apt upgrade on it before the website offers you the option for remote shell access
Ah yes, should've mentioned that in the video! Travel day always a bit more stressful and I didn't have the normal cycle of testing before I wrote up this quick script :)
What is the role of rtl-sdr in your setup??
Fun radio exploration :)
I am also testing a v4, trying some remote access radio shenanigans.
Finally I can connect to my Pi without a VPN!
It is quite handy. I still use my VPN for most things, but I do have a Pi just running Connect that I attach different projects to, and it's separated from my main network so I can run long term experiments and just connect straight to it to check on them anywhere. Including the airplane now, yay!
@@Level2Jeff One thing I did notice is that you don't get a Domain or anything to connect to, for example a selfhosted WebUI like CasaOS. Its only Terminal. So for that I will also use a VPN.
mosh is also a great replacement for ssh on high latency or unreliable connections. If you can get it to work, it's kind of magic how responsive remote shell sessions feel.
I've had remote connect to my raspberry pi in London for over 10 years now. With the right software installed I can ssh to it from any of my machines here in the US. I'm missing the part where I need to login to some other service to make use of such a fundamental feature of Linux. If I had my tinfoil hat on you'd probably think I was a crazy person 😂
I ship my friend in London a new Pi to upgrade the one in his network cabinet every 3 or 4 years. I considered switching to a mini-pc but the Pi has worked so well I can't really justify it.
What you doing with the SDR? Bit of plane spotting?
I like that they roll it out to all Pi’s and that it’s free. Though me personally I rather use Tailscale/Headscale on my devices. 👍
Other issues:
Is this open source? Where's the code?
What encryption is being used? Is it true end-to-end?
What data do they gather and store? Who "owns" it? Who has access to it?
Can you later opt-out and have all your data removed?
So many trust questions
Charlotte's got a Micro Center? That's about a two hour drive for me.
My problem with Raspberry Pi Connect is that it's basically a company in the middle who might or might not be tracking and using that data somehow for whatever purposes. While I don't do anything on my Pi that would be questionable, I still think Raspberry Pi Foundation doesn't need to know about me connecting to my Pi and testing out different Linux softwares for fun. I personally just use RustDesk and host RustDesk server myself.
Doesn't this apply to *any* VNC or remote desktop application?
@@Rushil69420 It's bit more complex than that. If someone else hosts the connection servers for you, then yes, it does apply. If you can host it yourself then it would depend on whether the application is FOSS or not. With RustDesk I can go through the source code and build it myself after doing any modifications if need be.
@@touma-san91indeed. It's about trust, and for my fun Pi, I trust Raspberry Pi enough. But I isolate it from my main network and only access that through my VPN.
This. I've had a remote Pi setup for over a decade. It is a one command fully encrypted ssh command away. I'm failing to see why a 3rd party needs to poke their nose into that process.
I use Tailscale for device access remotely and while it works over a high-latency connection it isn’t exactly pleasant. A few 100 ms between typing and getting feedback on the terminal feels really unnatural. I’ll have to give this a shot!
One thing I'm leary about with the tooling @ 0:40 is the phrase remote shell. How secure is it? How long before a CVE appears for this? lol
Hope it's just my paranoia talking.
It's using the same tech as their screen sharing setup. Any remote access (even using web standards like rpi-connect does) introduces new levels of risk. Like how secure is the Pi relay server? That's in use if you connect through the airplane WiFi like I did...
SSH without SSH keys OR passwords?! That’s crazy, but potentially more secure!
Kinda odd 14 years after quadrax and a wifi based server in your 737 luggage compartment can't allow you to watch sons of anarchy streamed. To your shared network seamlessly.
Remind me: do you have a video (or blag post) on how to set up a homelab VPN? That's probably the main thing my home network is lacking at this point.
Good question: I have a video on Pi-VPN... which, sadly, is no longer maintained. See th-cam.com/video/5NJ6V8i1Xd8/w-d-xo.html
I still use Wireguard, but am looking for the easiest way to manage it now.
@@Level2Jeff Well in that case, it's a good thing I'm subscribed so I can find out when you figure it out!
@@Level2Jeff Hardware Firewall. There inexpensive, easy to setup and even simpler to secure
i would setup a vpn and maintain
That’s awesome 😎
RTL-SDR 👀
Coming soon... to Geerling Engineering at least :)
Just setup a raspberry pi ads-b receiver. So fun! And gets you premium access to most of the flight tracking sites if you register as a feeder
thanks for posting! what is the app shown at 0:34?
btop - a nicer version of top/htop! (Though a tiny bit more bandwidth heavy)
@@Level2Jeff thanks for the response! p.s. had I known you were at the CLT Micro Center I would have come out to say hello.
@@PilotGT Aww, would've been nice to say hello!
So this uses a cloud service to remote access into your Pi? A cloud service that hackers love to exploit. A cloud service that puts everyone's credentials at risk in one juicy spot for hackers to get. Given just about every corporations' track record of keeping their cloud services secure, I think I'll pass. Plus, do you really think a now publicly owned company, beholden to its shareholders and not its customers, won't be selling and distributions whatever info they can scrape off your connection? Thanks, but no thanks.
Womp womp