BlueBockser

joined 1 year ago
[–] [email protected] 3 points 1 year ago (1 children)

I don't doubt it, I just have a problem with the reasoning that something is "natural" and therefore good. It's a common misconception that charlatans use to prey on people.

[–] [email protected] 4 points 1 year ago (3 children)

It being natural doesn't mean anything, though. Plenty of naturally dangerous things out there...

[–] [email protected] 3 points 1 year ago

Webauthn isn't just for 2FA, it's for user user authentication through public key cryptography. Passkeys are Webauthn, but the former is a better marketable term.

[–] [email protected] 2 points 1 year ago (2 children)

Repetition is how people learn to remember things and improve their skills. I fail to see how that's bad.

[–] [email protected] 5 points 1 year ago (2 children)

I hope you know what you're doing. That's a good way to share company secrets with outsiders, also it's uncertain whether you're even legally allowed to use the resulting code.

[–] [email protected] 8 points 1 year ago (1 children)

No problem. One more tip though: If you ever censor your public IP, don't just censor the last two digits. Otherwise it will be easily brute-forced.

[–] [email protected] 1 points 1 year ago

My preferred option is to have the VPS inside a VPC that blocks all external traffic by default. Then I can open up specific ports for specific IP ranges.

The reason I prefer this over a firewall configuration on the VPS itself is that the latter seems far more error-prone to me. For example, I've had problems in the past with ufw and Docker where container ports were still reachable even though access was denied via ufw.

[–] [email protected] 8 points 1 year ago (1 children)

Yeah, microplastics seem to be overlooked too often when people talk about plastic recycling "solutions". The worst one I've ever seen was a video where they cut a plastic bottle into strands and then made a broom out of them...

[–] [email protected] 23 points 1 year ago* (last edited 1 year ago) (1 children)

Let them eat cake

[–] [email protected] 8 points 1 year ago

If an attacker already has access to a system, they can use hitherto closed ports to communicate with C2 servers or attack other devices. In that case, a firewall that only allows known-good traffic will prevent further damage.

[–] [email protected] 7 points 1 year ago

And thus the enshittification cycle completes

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

Oh you mean MiB as in mebibel?

view more: ‹ prev next ›