• 0 Posts
  • 96 Comments
Joined 2 years ago
cake
Cake day: June 18th, 2023

help-circle











  • Encrypting the connection is good, it means that no one should be able capture the data and read it - but my concern is more about the holes in the network boundary you have to create to establish the connection.

    My point of view is, that’s not something you want happening automatically, unless you manually configured it to do that yourself and you know exactly how it works, what it connects to and how it authenticates (and preferably have some kind of inbound/outbound traffic monitoring for that connection).


  • NaibofTabr@infosec.pubtoSelfhosted@lemmy.worldSyncthing alternatives
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    1 month ago

    Ah, just one question - is your current Syncthing use internal to your home network, or does it sync remotely?

    Because if you’re just having your mobile devices sync files when they get on your home wifi, it’s reasonably safe for that to be fire-and-forget, but if you’re syncing from public networks into private that really should require some more specific configuration and active control.



  • NaibofTabr@infosec.pubtoSelfhosted@lemmy.worldWhat do I actually need?
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    4
    ·
    2 months ago

    My main reasons are sailing the high seas

    If this is the goal, then you need to concern yourself with your network first and the computer/server second. You need as much operational control over your home network as you can manage, you need to put this traffic in a separate tunnel from all of your normal network traffic and have it pop up on the public network from a different location. You need to own the modem that links you to your provider’s network, and the router that is the entry/exit point for your network. You need to segregate the thing doing the sailing on its own network segment that doesn’t have direct access to any of your other devices. You can not use the combo modem/router gateway device provided by your ISP. You need to plan your internal network intentionally and understand how, when, and why each device transmits on the network. You should understand your firewall configuration (on your network boundary, not on your PC). You should also get PiHole up and running and start dropping unwanted inbound and outbound traffic.

    OpSec first.




  • NaibofTabr@infosec.pubtoLemmy Be Wholesome@lemmy.worldThis is a cool idea.
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    14
    ·
    2 months ago

    I think the term “homeless” is really a euphemism that makes it easier for wealthy people to talk about poor people (if you have shelter, food, and are not living paycheck to paycheck you count as wealthy), and it results in misunderstandings about what the real problems are.

    Giving a house to someone who lives on the streets is a nice gesture but it doesn’t address the underlying problems - unemployment, unemployability, health problems, psychological problems, lack of social support structure, lack of supportive relationships (e.g. friends and family) - you can’t just fix someone’s life with a building.

    It’s like a grade-school-level understanding of the problem (“just give the homeless people homes! then they’re not homeless anymore! problem solved!”). Without putting in a real effort to support these individuals’ lives, to understand and address what put them in that situation in the first place, this is a temporary patch that will end in relapse.