• 1 Post
  • 419 Comments
Joined 1 month ago
cake
Cake day: February 5th, 2025

help-circle



  • I was a super early adopter for firefox. I started using it back in 2005-2006. I’m pretty sure it was still in beta when I started using it.

    Over the past 20 years I’ve watched while firefox users have formed a goddamn cult around a software. It’s insane to me, especially because I’m seeing exactly the same things from Mozilla that I was seeing from Microsoft (and later Google) at the time I decided to switch from IE to firefox to begin with…

    Firefox isn’t special. It’s falling for all the cloud-based privacy invasive enshittification that Chrome has so far. It’s just getting there slower.

    So cool your jets. Especially considering uBlock Origin Lite is uBlock Origin. It’s just compatible with the Manifest V3 standard.



  • Xanza@lemm.eeOPtoDocker@programming.devPortainer via SSH?
    link
    fedilink
    English
    arrow-up
    1
    ·
    13 hours ago

    Yeah, granted it’s a niche situation.

    I think I’ve found a medium, though. I ended up setting Portainer agent on my VPS, and I’ve disallowed connections to everyone on that port but my IP via ufw; ufw allow from x.x.x.0/24 to any port 9001. I would still prefer to do it via SSH to hide behind the protocol and identity keys, but this will have to do. It doesn’t seem like the Portainer devs even care about an issue like this, which is pretty fucked up because by default all docker systems exposed to the internet (unless you know what you’re doing) are vulnerable to Kinsing.




  • Well, first of all, using a computer network to do illegal shit is always illegal, no matter where you are in the world. Almost all sovereign countries have laws against this, offering reciprocity. So it really depends on what you’re doing with your VPN. No company out there is going to attempt to shelter you from the consequences of your own actions.

    The difference is when the actions you’re doing aren’t considered illegal. The FBI has no right to go to a foreign company and demand your information over piracy in countries where that’s not a crime. But child porn? Participating in botnets/hacking/cyber-crimes? Yeah, they’re going to roll over you so quickly you won’t even know what happened. Doesn’t matter who you go with.







  • A DMZ is a decent idea, but you can do the same thing with vLAN and it would be less of a PITA.

    I recommend just doing a vLAN and disable outside connection to your network. Use Wireguard to VPN in, and access local services via the VPN.

    For notifications, you can use Gotify.

    I’m thinking about the possibility of running two containers, one on my trusted network and one on my DMZ. I could sync them up or give them access to the same storage areas maybe.

    It is, but it could/would cause huge complications when both containers attempt to access the same resource which is already in use. I wouldn’t recommend running 2 containers from in the same location. It’s a bit antithetical to what docker is used for.




  • Xanza@lemm.eetoLinux@lemmy.mlNew Linux user’s experiences
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    3 days ago

    The lingering feeling of instability. This is my second install of OpenSUSE, after I messed up something leading to my computer having some files which it wanted to update, but using urls which didn’t exist. After this, I’ve been feeling a bit insecure and afraid of doing something that ruins my installation. I know there’s the saying that Linux ‘just works’, but I’ve never messed up a Windows installation…

    IMO this is a right of passage. Sure, windows babies you to the point where you can’t really mess much up, but that doesn’t mean its impossible to mess up. I’ve also borked Windows installs just by using them over long periods of time. You bork linux a few times and learn what not to do.


  • Hundreds of millions. They’re used in an almost uncountable number of IoT devices.

    It’s only this specific chip that is affected. It’s not all bluetooth chips. The article doesn’t even specify which of their tens of chips is affected; ESP32-D0WD-V3, ESP32-D0WDR2-V3, ESP32-U4WDH, ESP32-PICO-V3, ESP32-PICO-V3-02, or the ESP32-PICO-D4.

    Even if it were all of them, and even if it were hundreds of millions of devices it would still pale in comparison to HeartBleed in all aspects. It’s an interesting but sophisticated attack vector which severely limits its usage. But lets say you execute a MITM attack from one of these ESP32 chips. What are you feasibly able to do? A MITM attack? Considering these are all low power devices its extremely unlikely that they would be able to output enough power to overtake your home AP. Without doing more research on it, the actual attack surface is opaque. I mean, I guess a guy in China can remotely turn on your sprinklers or get your WiFi password… Lot of good that’s gonna do him from China.