this sort of stuff is rampant. A few years old but it makes my blood boil every time I think about it.
Tool Creator should work on this, it ain’t making no sense that the default json file (Google) is not updated cause seeing that work on Google tells us that it definitely works on all sites
@drk1wi please resolve google.json file to stop this cookie disabled error
Seems minor but the tone of the demand is wildly entitled.
Yikes! I’d avoid leaving any services externally exposed unless they’re absolutely necessary…
Tailscale+Headscale are pretty easy to implement these days. Since it’s effectively zero trust, the tunnels become the encrypted channel so there’s an argument that HTTPS isn’t really required unless some endpoints won’t be accessing services over the Tailnet. SmallStep and Caddy can be used to automatically manage certs if it’s needed though.
You can even configure a PiHole (or derivative) to be your DNS server on the VPN, giving you ad blocking on the go.
Anecdotal, but Ive had a container running Nextcloud in an LXC on Proxmox along with PiHole, Step CA, Bacula, and quite a few other services and I’ve had zero downtime since June 2023. Even have Tailscale rigged to use PiHole as the tailnet DNS to have adblocking on the go.
Guess that restart: always
value in the Compose config is pulling it’s weight lol
VIM Golf… Same outcome, fewer strokes:
%d|wq
Pretty much anything that takes followers away from the church is likely to be labeled evil.
Definitely complicated to root cause. Please share if ya figure out the hard parts 😄
An idea: Netflix could be fingerprinting TUN interfaces on the TV.
One thing I’d consider trying is Tailscale in userspace networking mode on a distinct network host at location 2, which’ll start a SOCKS/HTTP proxy that the TV can use for outbound connections.
Bonus: any devices incompatible with Tailscale can use the proxies.
If you’d like to take a stab at this, Headscale is a self-hosted version of Tailscale’s service. Personally, I use Caddy to automatically manage letsencrypt certs while proxying requests to Headscale.
A few of mine that I use daily…
Networky Things:
A couple of personal projects:
Would I trust them to not masquerade as me?..
Masquerading is literally the term used for this.
I’ve spent quite a bit of time as a penetration tester and one of the first things we do once we recover credentials is check for validity against online accounts known to be good for a given user. We do that because it simulates attackers and government operators alike. It’s a guarantee that free credentials will be abused in one manner or another when they’re available to government entities.
The obvious control for this is to maintain a unique password for each account but that’s not always feasible for users due to myriad conditions.
Agreed, but we have to trust the instances we keep accounts on. Trust is subjective, but I certainly wouldn’t trust a government ran instance for anything other than an outlet for information originating from the owning government.
If I run a private instance or know the maintainer of another, then I can have greater confidence in the security/privacy implementations.
My mistake.
My mistake.
Probably a poor decision to be creating accounts on government operated instances. Since they own the server, they’re in a position to:
I’m all for government support and adoption of open-source software so long as they’re not in the position to disrupt how it’s used by the public at large.
Edit (my perspective is relevant, but doesn’t apply in this case): My nerd impulses outran my willingness to read the link’s content. Seems it’s not for public registration.
Edit 2: Like my cornbread eating American ass can read Dutch anyway 🤣
I just joined and I suspect that you’re correct: there’s an overall learning curve. No snarky tone intended, but explaining decentralization to those who would likely struggle with grasping the basic client/server model is going to be challenge.
Shoot, I’ve got 10 years pentesting and R&D under my belt and it took me a while to weigh the pros and cons of creating an account on a public instance or self-hosting. (Will self-host eventually…enjoying a test drive.)
Or we fix some shit at home first.