ShortN0te

joined 1 year ago
[–] [email protected] 2 points 7 hours ago

What exactly are you referring to? ZIL? ARC? L2ARC? And what docs? Have not found that call out in the official docs.

[–] [email protected] 7 points 9 hours ago

I use a consumer SSD for caching on ZFS now for over 2 years and do not have any issues with it. I have a 54 TB pool with tons of reads and writes and no issue with it.

smart reports 14% used.

[–] [email protected] 15 points 9 hours ago (1 children)

You recall wrong. ECC is recommended for any server system but not necessary.

[–] [email protected] 1 points 10 hours ago
  1. And? If you cannot trust then you should not use them when you want to do something that is private and should not get looked on.

  2. And if there were signs of misuse of the trust, then they would get removed.

It is actually really easy to monitor thanks to CT.

[–] [email protected] 1 points 11 hours ago

Yes, there is countless examples of root CAs containing compromised CAs.

This incidence with digicert is not about a compromised CA it is about a flaw in their validation system. That is not what you claimed. Such flaws happen from time to time, lets encrypt had an issue a while back too.

[–] [email protected] 11 points 12 hours ago (2 children)

So one of the ones complaining, complained that they should rather implement the feature he needed instead of posting a tweet that took 20 seconds to write?

This person's block was well deserved.

[–] [email protected] 1 points 14 hours ago

Yes. You can even mount files and images through USB.

[–] [email protected] 2 points 15 hours ago (2 children)

The PCIe connection is only for supplying power to the device. This form factor.makes it easy to place it inside the Computer. Then you only need to connect HDMI and USB and you can remote control the connected device.

There is another version that is designed to sit outside the computer case already.

[–] [email protected] 4 points 16 hours ago (7 children)
[–] [email protected] 1 points 18 hours ago (2 children)

Not exactly. They are pointing out that HTTPS assumes all is well if it sees a certificate from any "trusted" certificate authority. Browsers typically trust dozens of CAs (nearly 80 for Firefox) from jurisdictions all over the world. Anyone with sufficient access to any of them can forge a certificate.

Great thing, that you can remove them and only trust those you trust.

Also, HTTPS doesn't cover all traffic like a properly configured VPN does.

Pls explain what https is not covered? The SNI on tbe first visit? A VPN just moves the "exit point" of your traffic. Now the Datacentef and VPN provider sees what you ISP saw.

it's not difficult for a well positioned snooper (like an internet provider that has to answer to government) to follow your traffic on the net and deduce what you're doing.

No. I never said otherwise. But they cannot spy on the traffic. And since the SNI is not encrypted anyway they do not even nerd to "follow the traffic". But what sites you are visiting and what you are doing on them are 2 different things.

[–] [email protected] 1 points 19 hours ago (3 children)

Yes, there is countless examples of root CAs containing compromised CAs.

Then pls proof that? Link to a recent article maybe?

[–] [email protected] 2 points 1 day ago (9 children)

You can read more about this learning about X.509.

Its the PKI thats broken, namely the root stores. Has been unreliable for many, many years. This is why packages are signed.

So you are basically saying that root CAs are unreliable or compromised?

The great thing is, that you can decide on your own which CAs you trust. Also please proof that those are actively malicious.

And no. That is not the reason that packages are signed, i am guessing you mean packages like on linux, packages contained in the installation repository. The reason is, that you build another chain of trust. Why would i trust a CA which issues certificates for domains with code distribution. That's not their job.

view more: next ›