theroff

joined 8 months ago
[โ€“] [email protected] 1 points 1 month ago

Here's the actual paper of the technology (Prio) that it's based on.

Some problems stand out:

  • It requires that the organisations (Mozilla and ISRG) not collude to decrypt the secret share (probably reasonable)
  • The paper suggests registering end users to protect against Sybil attacks.
  • The scheme requires the organisations to correctly withhold results from advertisers until there are sufficient results.

I'm not overly familiar with the tech stack but I'd be concerned about browsers using a persistent UUID to send impressions to Mozilla's API.

The biggest elephant in the room is that seemingly nobody wants the damn thing. It offers nothing to users, except maybe a good feeling inside that they're supporting AdTech. It offers AdTech less than the current deal where they can collect obscene amounts of personal information for targeted advertising.

[โ€“] [email protected] 1 points 1 month ago

PSA: if your financial institution/government/ is using SMS codes (aka PSTN MFA) for multi-factor authentication they are practically worthless against a determined attacker who can use SIM swap or an SS7 attack to obtain the code. Basically you are secured by a single factor, your password. If your password is compromised it may be sold via black hat marketplaces and purchased by an attacker who would then likely attempt to break that second factor.

The best way to protect yourself is to use a unique password; a password manager especially helps with this. Sometimes institutions will offer "Authenticator" (TOTP) as a second factor, or PassKey authentication, both secure alternatives to SMS codes.

Here in Aus I'm working with Electronic Frontiers Australia to try and force some change within government and financial institutions (via the financial regulator). Most banks here use SMS codes and occasionally offer a proprietary app. One of the well-known international banks, ING Bank, even uses a 4 pin code to login to their online banking portal. ๐Ÿ˜–

Unfortunately SMS codes are a legacy left from old technology and a lack of understanding or resourcing by organisations that implement it. Authenticator/TOTP tokens have been around for 16 years (and standardised for 13 years), and PassKeys are relatively newer. There is a learning curve but at the very least every organisation should at least provide either TOTP or PassKeys as an option for security-minded users.

[โ€“] [email protected] 2 points 2 months ago

Yeah it is a bit of a pain. I currently only have a few users. Tooling-wise there are ways to tail the journals (if you're using journalctl) and collate them but I haven't gotten around to doing this myself yet.

[โ€“] [email protected] 4 points 2 months ago (3 children)

At work we use separate clusters for various things. We built an Ansible collection to manage the lot so it's not too much overhead.

For home use I skipped K8s and went to rootless Quadlet manifests. Each quadlet is in a separate non-root user with lingering enabled to reduce exposure from a container breakout.

[โ€“] [email protected] 5 points 3 months ago

The company behind GitLab is seeking buyout offers, so make of that what you will.

My employer uses GitLab CE and it's pretty good, and it is FOSS. The EE version is "open core" so not really FOSS.

If I were starting from scratch I'd be looking into Gitea/Forgejo as well.

[โ€“] [email protected] 9 points 3 months ago* (last edited 3 months ago)

In my country that would be a civil offence, not criminal.

I'd recommend at least taking some precautions (e.g. use TLS or Wireguard, firewall if possible).

[โ€“] [email protected] 2 points 4 months ago

I stand corrected, thank you. I'll have to try that out.

[โ€“] [email protected] 3 points 4 months ago (2 children)

The biggest issue I've had with I2P so far has been lack of content.

postman.i2p only permits torrents which includes its tracker in the torrent file, which means popular torrents from 1337x, TPB et al can't be uploaded there (at least not without changing the infohash). Torrent clients like qBittorrent and BiglyBT can cross-seed on I2P and clearnet networks which is a recent development since libtorrent 2.0 came out (software packages take a while to bump to.the latest library), but from what I've tested nearly all of the infohashes I put into my client from "clearnet" torrent sites have stalled, probably because I2P is a little too bespoke at the moment.

The potential is definitely there IMO, but unless you're just watching mainstream movies and TV it's not a replacement for clearnet/VPN.

If I'm missing something I'd like to know :)

[โ€“] [email protected] 45 points 5 months ago (1 children)

I much prefer Librewolf. They are a little more transparent about it is, an independent, open source repackaging of Firefox with Arkenfox(ish) patches applied to it, rather than an entity which signs up for deals with other businesses.

[โ€“] [email protected] 8 points 6 months ago

Bash scripts will only get you so far and I can wholly recommend Ansible for automation.

Basically the main advantage of Ansible is that its builtin tasks are "idempotent" which means you can re-run them and end up with the same result. Of course it is possible to do the same with bash scripts, but you may require more checks in place.

The other advantage of Ansible is that there are hundreds of modules for configuring a lot of different things on your system(s) and most are clear and easy to understand.

[โ€“] [email protected] 2 points 6 months ago

You could use HAProxy on the client side to load balance apps in multiple locations, but it really depends on the application.

I like to manage my software with Ansible but Docker stack files might make it simple enough for you.

view more: next โ€บ