[-] sandalbucket@lemmy.world 6 points 3 days ago

Durov gets arrested in france and suddenly the telegram slander kicks into high gear. It gets a hit piece every once in a while for sure, but the last few days have been on a different level.

You know who else uses telegram? My family, to send vacation pics to each other.

You know what other technology bad guys use? Email.

[-] sandalbucket@lemmy.world 61 points 1 week ago

Private trackers disgust me. What kind of pirate turns away from the world, to re-seeding fragments of files they don’t care about to other cowards with slightly slower rss feeds; all for a chance at enough ratio to get the show you want? It’s a country club, with self-validating assholes, dry hot dogs, and tall fences.

The Mainline DHT is the way forward. There is no social credit here. The kids in Africa are starving, and I will throw them as much as I can, kilobyte by kilobyte, for no reason at all, for I too was a leecher once.

[-] sandalbucket@lemmy.world 34 points 1 month ago

Anything exposed to the internet will be found by the scanners. Moving ssh off of port 22 doesn’t do anything except make it less convenient for you to use. The scanners will find it, and when they do, they will try to log in.

(It’s actually pretty easy to write a little script to listen on port 20 (telnet) and collect the default login creds that the worms so kindly share)

The thing that protects you is strong authentication. Turn off password auth entirely, and generate a long keypair. Disable root login entirely.

Most self-hosted software is built by hobbyists with some goal, and rock solid authentication is generally not that goal. You should, if you can, put most things behind some reverse-proxy with a strong auth layer, like Teleport.

You will get lots of advice to hide things behind a vpn. A vpn provides centralized strong authentication. It’s a good idea, but decreases accessibility (which is part of security) - so there’s a value judgement here between the strength of a vpn and your accessibility goals.

Some of my services (ssh, wg, nginx) are open to the internet. Some are behind a reverse proxy. Some require a vpn connection, even within my own house. It depends on who it’s for - just me, technical friends, the world, or my technically-challenged parents trying to type something with a roku remote.

After strong auth, you want to think about software vulnerabilities - and you don’t have to think much, because there’s only one answer: keep your stuff up to date.

All of the above covers the P in PICERL (pick-uh-rel) for Prepare. I stands for Identify, and this is tricky. In an ideal world, you get a real-time notification (on your phone if possible) when any of these things happen:

  • Any successful ssh login
  • Any successful root login
  • If a port starts listening that you didn’t expect
  • If the system watching for these things goes down (have two systems that watch each other)

That list could be much longer, but that’s a good start.

After Identification, there’s Contain + Eradicate. In a homelab context, that’s probably a fresh re-install of the OS. Attacker persistence mechanisms are insane - once they’re in, they’re in. Reformat the disk.

R is for recover or remediate depending on who you ask. If you reformatted your disks, it stands for “rebuild”. Combine this with L (lessons learned) to rebuild differently than before.

To close out this essay though, I want to reiterate Strong Auth. If you’ve got strong auth and keep things up to date, a breach should never happen. A lot of people work very hard every day to keep the strong auth strong ;)

[-] sandalbucket@lemmy.world 61 points 2 months ago

Holy color gradient batman

[-] sandalbucket@lemmy.world 31 points 2 months ago

I think it’s a D-tier article. I wouldn’t be surprised if it was half gpt. It could have been summarized in a single paragraph, but was clearly being drawn out to make screen real-estate for the ads.

[-] sandalbucket@lemmy.world 44 points 3 months ago

They crave that mineral

[-] sandalbucket@lemmy.world 43 points 3 months ago

I pay attention to credit card readers.

I have gotten to know their makes and some models. I have developed preferences. When I go to a run down establishment and they have a nice reader, I am pleasantly surprised. I know that walmart uses ingenico isc250s, and they do not support tap. I know that dunkin has high quality readers, and sometimes tim hortons does too, but less frequently.

When leaving a place, I might say something like “damn, you don’t see that model of verifone very often”, and my friends will look at me funny.

Semi-related, did you know that most receipt printers have embedded telnet servers in them?

[-] sandalbucket@lemmy.world 41 points 3 months ago

At what point does a collection of microservices become a monolith that uses http instead of a bus 🤔

[-] sandalbucket@lemmy.world 61 points 3 months ago

This is cyberpunk as hell, and awesome.

Unfortunately apple does not expose mac addresses to apps, so iPhone users can’t do it :(

[-] sandalbucket@lemmy.world 44 points 3 months ago

Had to write a paper in college with 100 citations.

We used zotero for citation management, and it would dump a bibtex file on demand.

The paper was written in markdown, stored in git, and rendered through pandoc. We would cite a paper with parentheses and something resembling an id, like (lewis).

We gave pandoc a “citation style definition”, and it took care of everything. Every citation was perfectly formatted. The bibliography was perfectly formatted. Inline references were perfect. Numbering was perfect. All the metadata was ripped from pdfs automatically. It was downright magical.

[-] sandalbucket@lemmy.world 52 points 3 months ago

Look, the monks in belgium could survive on beer alone for months at a time, and surely coors lite is not that different. I’ll be fine!

[-] sandalbucket@lemmy.world 42 points 4 months ago

Me: “Computer, I’m licking two paperclips that I’ve stuck into the vga port. I’d like to taste the rainbow. Send video to the port, please?”

Computer: “Sure thing boss!”

Me: “Alright, now, can I put my presentation on this projector over hdmi?”

Computer: “No fuck you, hdmi protocol negotiation failed, and I’m scrambling your audio outputs for the rest of the day too”

2

Just scrolling by and happened to see some relatively obscure songs that go absolutely hard.

Ya’ll like guitars?

view more: next ›

sandalbucket

joined 5 months ago