![](https://feddit.cl/pictrs/image/e0ff70d1-18e9-4a04-a718-c35ced3fd04f.jpeg)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
you are a printer we are all printers
Errar es humano. Propagar errores automáticamente es #devops
you are a printer we are all printers
It’s in the archwiki 😤😤😤
If your comments have been federated to other instances, they will be there until they are deleted locally. If someone clicks on your user profile, they will get a DNS error if the domain is no longer there. Images in the comments pointing to you instance will be broken too. Nothing terrible actually happens.
Migrating accounts a la Mastodon is not happening soon in Lemmy.
My advice is: Go on and save some money.
Sorry to read that.
I’ve dd
ed an external drive instead of an SD card once by mistake. I’ve never felt more stupid than that day.
Rich stupid guy doing things is not technology. Why is this community flooded with this guy doing or saying things?
It’s running NetBSD, isn’t it?
Some security tips:
Firewall should block everything by default, and you start allowing incoming and outgoing connections when you need them or if something fails.
Disable passwords and root access in ssh daemon.
Use fail2ban or something similar to block bots failing to log-in.
Use random long passwords for everything (eg: like databases). And put then in a password manager. If you can remember the database password, it’s not strong enough. If you can remember the admin password for a public web service, it’s weak.
Don’t repeat the passwords. Everything should have its own random long password.
.env files and files with secrets should be readable only by its service user. Chmod them to 400.
Monitor logs from time to time to see if something funny is happening.
Random ports are easy to discover and there are tools to discover what service is behind a port.
It’s annoying for the legitimate user and easy to bypass by an actual attacker.
Also, if you use a random port above 1024 it could be a security issue since any user could star listening if the legitimate process crashes.
See this
Nothing illegal is being discussed.
But I’m happy to talk about Jolly Roger.
Wow! this is exactly what I needed. Although, I didn’t exactly ask for it.
Thank you very much
Thanks to both of you.
I had the hope that DMARC, SPF and DKIM was stuff I could just ignore if not sending email. It seems I was wrong about that.
see federated network
looks inside
mastodon.social
I don’t think so.
Trump himself was victim of credential stuffing. And he’s not the only politician or billionaire who has suffered stolen accounts of something.
It’s not FOSS and I don’t see a way to review if what they claim is actually true.
It may be a way to just help to diferentiate legitimate human made work vs machine-generated ones, thus helping AI training models.
Can’t demostrate that fact neither, because of its license that expressly forbids sofware adaptions to other uses.
Edit, alter, modify, adapt, translate or otherwise change the whole or any part of the Software nor permit the whole or any part of the Software to be combined with or become incorporated in any other software, nor decompile, disassemble or reverse engineer the Software or attempt to do any such things
I’ve got 3 tricks for ya:
Hidden hardware feature.
Not a backdoor at all.
And you have to pay like 5K to USB-IF to build your own implementation. Because everybody forgets that USB is proprietary.
But the madness of every vendor having it own proprietary conector is worse.
USB-C and USB PD may not be good enough, but it’s better than the previous alternative.
Pros:
Cons:
Welcome to Lemmy. Hope you enjoy it.
I’m surprised it was nos encrypted already.
Any one can silently hear their frequency. I looks like an easy way to know if police is coming your way, and how avoid them.
The project management may have some obvious problems (jOin dIsc0Rd sErVEr; w0rD “thEy” t0o p0liTicAl). But we really need an alternative to browsers funded by Google (Chrome and Firefox).
So I’ll do my best to actually build from sources and see what can I help with. Attacking the author is helping nobody.
And for the folks who are saying “wHy n0t rUst”, you can always show me the (rust) code.