• 4 Posts
  • 46 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle


















  • this sort of stuff is rampant. A few years old but it makes my blood boil every time I think about it.

    Tool Creator should work on this, it ain’t making no sense that the default json file (Google) is not updated cause seeing that work on Google tells us that it definitely works on all sites

    @drk1wi please resolve google.json file to stop this cookie disabled error

    Seems minor but the tone of the demand is wildly entitled.



  • How about we all stop paying taxes until the fucks start using the income for things other than making foreign peoples dead?

    There’s enough money in the pot, it’s just squandered on things that don’t benefit the people. We could accomplish so fucking much with just the amount of cash that the Pentagon misplaces every year.

    I’ll never understand the obsession with demanding more from the rich while we can’t even account for what we already have. Is everything a goddamn distraction campaign?

    /rant


  • My claim is that Headscale has a lesser likelihood of compromise than Nextcloud, and that the E2EE provides an encrypted channel between nodes without an immediate need for TLS. Of course TLS over E2EE enhances CIA. There’s no pushback to defense in depth here. But in the beginning, the E2EE will get them moving in the right direction.

    OP began the post by stating that the login page to a complex PHP web application is internet facing (again, yikes). Given the current implementation, I can only assume that OP is not prepared to deploy a CA, and that the path of least resistance – and bolstered security – can be via implementation of HS+TS. They get the benefit of E2EE without the added complexity, for which there is plenty, of a CA until if/when they’re ready to take the plunge.

    If we’re going to take this nonsense all or nothing stance, don’t forget to mention that they’re doing poorly unless they implement EDR, IDS, TOTP MFA on all services, myriad DNS controls, and full disk encryption. Because those components don’t add to the attack surface as well, right?