486

joined 1 year ago
[–] [email protected] 2 points 2 months ago (1 children)

Another option is subpaths: xyz.ddns.net/portainer

While you can do that, you should be aware of the security implications (every application can see and modify every other application's cookies). If at all possible, I would try to avoid this setup.

[–] [email protected] 3 points 2 months ago

Oh, I didn't want to suggest that there is no value in using a reverse-proxy, there certainly is. Just don't expect it to do anything for you in terms of application security. The application behind it is just as exposed as it would be without a proxy. So if there was a security flaw in that application, the reverse-proxy does not help at all.

[–] [email protected] 8 points 2 months ago* (last edited 2 months ago) (2 children)

I am not sure where this idea comes from, but putting a service behind a reverse-proxy does not increase its security in any way, unless you'd do authentication right at the reverse-proxy.

atzanteol is of course correct with the assessment that the web interface poses a much larger attack surface than the ssh interface.

[–] [email protected] 2 points 3 months ago

No, even the earliest Ryzens support ECC reporting just fine, given the motherboard used supports it, which many boards do. Only the non-Pro APUs do not support ECC.

[–] [email protected] 2 points 3 months ago

Haha! Perfect picture!

[–] [email protected] 10 points 3 months ago

This explains it, although it is not really Git's fault as that article suggests, but rather the charset conversions to UTF-8 that broke things. With all that fixed it builds fine. I've been using DOSBOX and since all the required build tools are included in the repo, it is easy to build.

[–] [email protected] 11 points 3 months ago (1 children)

Did anyone manage to build this? It seems something is missing, or I am doing something wrong. The build fails due to missing symbols for me. Also, interestingly the assembler complained about one line in a certain file being too long. Fortunately that lines was just a comment, so it was easy to fix that.

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago)

Matrix also does have a pretty big problem with meta data. By default it stores a ton of meta data (at least the reference server implementation does) and I am not sure if this is even a solvable problem without redesigning the protocol. When opting for an alternative to Signal, XMPP is probably the better choice.

[–] [email protected] 1 points 4 months ago (1 children)

You were talking about adversaries discovering the backdoor. That's something entirely different from compromised keys. So your sacrasm is quite misplaced here.

[–] [email protected] 1 points 4 months ago (3 children)

In order to successfully implement a backdoor, you need to ensure that you are more clever than your adversaries, because those same backdoors can be used against you.

In this instance, that's not the case. Only those in possession of the right key can use the backdoor. Also, discovering infected systems from the outside, appears to be impossible - the backdoor simply does not do anything to reveal itself if you don't have the key.

[–] [email protected] 2 points 5 months ago (1 children)

Sure, cloud services can get quite expensive and I agree that using used hardware for self-hosting - if it is at least somewhat modern - is a viable option.

I just wanted to make sure, the actual cost is understood. I find it rather helpful to calculate this for my systems in use. Sometimes it can actually make sense to replace some old hardware with newer stuff, simply because of the electricity cost savings of using newer hardware.

[–] [email protected] 2 points 5 months ago* (last edited 5 months ago) (3 children)

Well, what they are stating is obviously wrong then. No need to use some website for that anyway, since it is so easy to calculate yourself.

view more: next ›