The problem is that this also applies within a radius around a “port of entry”. So everybody that lives within about 100 miles of the coast, an airport, or a rail line that crosses a border — which is probably about 80+% of any country.
The problem is that this also applies within a radius around a “port of entry”. So everybody that lives within about 100 miles of the coast, an airport, or a rail line that crosses a border — which is probably about 80+% of any country.
Cardiff, Wales. One of the few places in the world that felt like a Real City while also having its own distinct culture and feel. Every other city I’ve been to feels like the same sort of dull corpo-district monoculture.
Old Montreal also has a bit of this, but only the central city areas, the outside periphery quickly devolves back into the “this could be anywhere in North America (version francaise)”
When you fly on Air Canada there’s a unmutable ad for the Alberta oil sands right after the safety announcement before takeoff. It’s surreal enough, but it’ll be so much worse when they start doing this kind of shit too.
I don’t need artificial intelligence in my terminal. Do you know how many times some troll has posted about “rm -fr /” on Reddit and other shitty forums, which then gets gobbled up and laundered by LLMs? Not letting that anywhere near my prod servers with valuable data.
I wouldn’t put a lot of trust in Telegram. Not only is their cryptography off by default, it’s a bespoke hand-rolled non-standard algorithm that might not work as well as they say. Oh, and it’s been potentially backdoored by the FSB (Russia’s CIA) for six years.
I did it back in 2020 when we all had nothing better to do. Got as far as installing X11 and Openbox, and halfway through setting up the toolchain for Firefox.
It was fun - the kind of fun digging a big hole is. It’s not for everybody, but I sort of enjoyed it.
Anybody who’s ever exposed any service to the internet knows this as the “background radiation” of the net. My boxes get thousands of random connection attempts per day. The best practice for years has been to use keypairs and/or VPNs. Friends don’t let friends expose RDP to the web.
I’ve been using Thunderbird with the OWL and TBSync plugins for exchange for years with good results. Obviously some things won’t work (teams integration, provisioned signatures, mail merge, etc) but it’s good enough that I only need proper outlook/OWA less than once a month.
Another option is “installing” the webapp as a PWA. I tried that for a bit but found notifications to be unreliable.
It’s fine. RAID is not a backup. I’ve been running simple mirrors for many years and never lost data because I have multiple backups. Focus on offsite and resilient backups, not how many drives can fail in your primary storage device.
Wait… you’re telling me that these devices are connected directly to the CAN bus and also have default root passwords? Did nobody involved in this ever stop and think it might possibly be a bad idea??
This brings a new meaning to the old phrase “war driving”
Someday, years from now, we will finally have Windows 10 Gold Edition.
Not sure how to do that in docker, I’ve run mine as a plain old PHP-FPM site for years and years. It might be something that can be tweaked using config files or environment variables, or might require building a custom image.
ClamAV is slow and doesn’t catch the nastiest of malware. Its entire approach is stuck in 2008. It’s better than nothing for screening emails, but for a private file store it won’t help much considering that you’ll already have the files on your system somewhere. And most importantly, it slows down file uploads 10x and increases CPU load substantially. The only good reason to use ClamAV for nextcloud is if you will be sued if you don’t!
It needs some tweaks to be snappy. The defaults are really bad.
Gonna paint this on my roof to break some spy satellites
This was my setup from about four years ago. Other than moving suricata elsewhere, it’s largely the same. Worth a shot if it’s something you’re into!
https://nbailey.ca/post/linux-firewall-ids/
OpenBSD is also great, I’m just more familiar with the Linux tools. All the required tools are in the base image, and they have a great official guide:
Yep. Firewall, routing, dhcp, dns, everything you’d expect from a gateway device. Plain Debian (or really any distro) can do it all. With a 1gbps bi-directional connection fully saturated it will run at about 10% cpu on my very crappy low power Celeron CPU.
Plus, there’s no web UI full of janky and insecure CGI scripts to exploit, and software updates are forever (well, until x64 is deprecated, so basically forever).
IPtables on Debian because I like my life to be boring and unchanging.
For about a year I was running a full out of band IPS on my network. My core switch was set up with port mirroring to spit out a copy of all traffic on one port so that my Suricata server could analyze it. Then, this was fed into ElasticSearch and a bunch of big data crap looked for anomalies.
It was cool. Basically useless because all it did was complain about the same IP crawler bots as my nginx logs. But fun to setup and ultimately good for my career lol.
Sadly the Canadian mint takes a loss on every coin and bill. Every $50 note they create actually costs about $65 (with the tip).
I choose not to think about it or include it in my mental threat model, the same way I choose to not worry about thermonuclear warheads.
If there’s some exploitable backdoor and Intel gets owned, we’re all boned and there’s nothing we can really do about it. I don’t have anti-ballistic-missile systems, and I also don’t have the capability to make an entire hardware/firmware/os from scratch.
So instead focus on the things you can control and are more likely to happen. Don’t plan for doomsday, plan for every day.