Having worked on them occasionally was about to confirm that, but somebody gave it more JPEG already and I can’t quite make it out. They do certain look like BNC/some other coaxial connector though and I’ve definitely have to troubleshoot very similar nightmarish setups
ItsGhost
I can assure you, that’d very much be in scope as a potential target, they’ll probably just use this as justification
Did they just describe Tor? Because it sounds an awful lot like they described Tor, but with a subscription! Perhaps they offer to run their own high speed Tor network for an access fee, which is atrocious because it’s still one provider knowing everything. Tor works because it’s so diverse, and the (theoretical) chances of having all three nodes run by the same operator is very slim
I get where your coming from, and you’re right that it’s a complex setup. It comes with certain privacy trade-offs, but for this use case I’d seriously consider something like CloudFlare tunnels rather than trying to roll your own.
My suspicion is nginx on the AWS instance hijacking /.well-known/* for its own uses. That said if the homeserver is for the same domain as it’s publically reachable from, the .well-known should be unnecessary, but it might be to change the port, it’s been a while since I’ve looked.
You shouldn’t ultimately need to port forward anything extra beyond 443, heck I’m pretty sure my homeserver isn’t reachable on anything besides 443 even internally with how I’m running my proxies.
Might be worth giving [email protected] a cross post, and if you want to check federation with an actual human I’m @ghost:itsg.host on matrix 👻
Absolutely! I’m disabled and it can take me some time to get to the front door at times, especially in our old 3 story house (mistakes were made). Being able to see who was at the door, and tell them I was on my way down saved me so many missed deliveries.
Ironically, this post is the first time I’ve encountered the upvote issue
Quite frankly, their threats of legal action for a very responsible disclosure and post-mortem for future reference tells you all you need to know, they don’t give two shits about privacy/security
Having worked on them occasionally was about to confirm that, but somebody gave it more JPEG already and I can’t quite make it out. They do certain look like BNC/some other coaxial connector though and I’ve definitely have to troubleshoot very similar nightmarish setups