myersguy

joined 2 years ago
[–] [email protected] 3 points 3 months ago* (last edited 3 months ago)

Using Firefox mobile, everything works and is mostly performance 🤷‍♂️

[–] [email protected] 2 points 3 months ago (1 children)

You're going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?

[–] [email protected] 12 points 3 months ago (5 children)

If you are worried about VPN's, why are you not worried about seedbox providers?

[–] [email protected] 9 points 3 months ago* (last edited 3 months ago)

I know it's of very little help, but I have not seen this issue, and I've been using Deluge for years (not automated via the arr suite, however)

It would do you well to find out what error it is throwing (check logs). Would be much easier to diagnose if you knew the actual issue.

[–] [email protected] 1 points 3 months ago* (last edited 3 months ago)

im a big fan of the nas device being single purpose. its life should only exist in fileserving. i have several redundant nas devices and then a big ol app server.

This is the way. Except my "big ol' app server" is an n95 mini pc that sips power.

[–] [email protected] 1 points 3 months ago

Because even if an attacker could gain access even as root he cannot modify system files.

Your comment was already from the position of if an attacker could gain root access. My responses were to that directly, and nothing else.

[–] [email protected] 2 points 3 months ago (1 children)

Your comment also contained

The filesystem itself is also read-only.

Which is what led to the further discussion of root making that not so.

I don't believe that to be the intent of the OP's comment, given their second sentence, but they are welcome to state otherwise. I just don't want them thinking that an immutable distribution gives them some kind of bulletproof security that it doesn't.

[–] [email protected] 1 points 3 months ago* (last edited 3 months ago) (3 children)

While you are correct, any system is compromised if you have root, so isn’t that irrelevant at that point?

The original context for the comment chain was:

Because even if an attacker could gain access even as root he cannot modify system files.

So no, it's completely relevant.

[–] [email protected] 2 points 3 months ago (7 children)

Someone with root can run ostree admin unlock --hotfix to make /usr writable. Someone with root can also delete all restore points.

It would be strange for them to call it that if it actually means “completely irrelevant from a security perspective”.

See the comment by superkret.

[–] [email protected] 5 points 3 months ago* (last edited 3 months ago) (11 children)

An attacker escaping from a container can’t be system root as Podman runs rootless (without some other exploit or weak password).

That would be true of podman running anywhere, and is not unique to an immutable distribution.

The filesystem itself is also read-only.

You can change that real quick if you have root access.

[–] [email protected] 9 points 3 months ago (14 children)

Because even if an attacker could gain access even as root he cannot modify system files.

They 100% can.

view more: ‹ prev next ›