• 0 Posts
  • 574 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle


  • NOTE: Scrutiny is a Work-in-Progress and still has some rough edges.

    Honestly, at this point i would not recommend the usage of scrutiny, the development was almost ways really slow and the creater does not seem to have kuch interest in the project. There are still standing issues and imho important features missing.

    I would look into prometheus+grafana or something of that sort.



  • ShortN0tetoLinuxRustdesk alternative?
    link
    fedilink
    arrow-up
    1
    ·
    7 days ago

    I cannot, i did some searches when i wrote the comment but could not find info about it. It is possible that i am confusing it with another project. I added a iirc but maybe that was not clear enough that i am not sure about it.


  • ShortN0tetoLinuxRustdesk alternative?
    link
    fedilink
    arrow-up
    2
    ·
    8 days ago

    That’s simply bad software practice, which was fixed once pointed out. Fact is that if they had done this on purpose, they wouldn’t have changed it and instead, would’ve came up with an excuse to keep it the same way.

    This is not correct. While they have removed it from being installed on newer installs/updates, the certificate remains on the system that ran the corresponding version installer/upgrade unless it will be manually removed by the few percent that got the news.


  • ShortN0tetoLinuxRustdesk alternative?
    link
    fedilink
    arrow-up
    6
    arrow-down
    2
    ·
    8 days ago

    I am talking about it in general. If you trust it or not depends on you. I am just saying that the argument that it is OS or that you can host the server yourself does not automatically mean that it is safe. That applies to any software.


  • ShortN0tetoLinuxRustdesk alternative?
    link
    fedilink
    arrow-up
    5
    arrow-down
    7
    ·
    9 days ago

    It could install software that transmits the data some time else. Basically something virus would do. The code can be hidden somewhere or loaded from somewhere with simple code.

    Those are basic tactics used for years by malware. If just simply monitoring would be enough to protect against malware then we would have way less problems.

    You should never run untrusted code or code by untrusted ppl.


  • ShortN0tetoLinuxRustdesk alternative?
    link
    fedilink
    arrow-up
    8
    arrow-down
    4
    ·
    9 days ago

    You are not running the software cause you do not trust the ppl running it? So you do host the software anyway? Just because it is OS and just because you can run it on your own hardware does not mean you can blindly trust it.


  • ShortN0tetoLinuxRustdesk alternative?
    link
    fedilink
    arrow-up
    12
    arrow-down
    2
    ·
    9 days ago

    The installer has included a root certificate before that gets installed without asking. Also there are some code blobs in the code iirc.

    Also how they handled the initial wayland “support”.

    It is relatively easy to smuggle in backdoors if you are the maintainer of the code and afaik there was not even an independent audit.

    Saying it is fine just because of it being OS is really naive.






  • It is not about the drivers, framework has most likely not the capability to develop drivers for their Laptops, it is the manufacturer’s job. All framework can do is selecting parts that are already supported by the kernel. Also a driver can take several years until it actually gets into a not rolling release distro like Ubuntu or mint since they do not use the newest kernel.

    This collab is more about making sure, that when you install those distros everything works out of the box which is not a given, depending on the compile flags for the kernel they used or what packages are coming installed by default.




  • ShortN0tetoSelfhosted@lemmy.worldHelp me harden my home server
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    16 days ago

    Yes i do i and you do you. But advertising those things as security measures while not adding any real security is just snake oil and can result in neglecting real security measures.

    As i said, the whole internet can be port scanned within seconds, so your services will be discovered, what is the risk you assume to have when your IP address is known and the fact that you host a service with it? The service has the same vulnerabilities if it is hosted via cloudflare tunnels or directly via port forwarding on the router. So you assume that your router is not secure? Then unplug it, cause it is already connected to the router.

    Geoblocking is useless for any threat actor. You can get access to VPN services or a VPS for very very very little money.


  • ShortN0tetoSelfhosted@lemmy.worldHelp me harden my home server
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    16 days ago
    1. Guess what, all IP addresses are known. There is no secret behind them. And you can scan all IPv4 addreses for ports in a few seconds at most.
    2. So some countries are more dangerous than others? Secure your network and service and keep them up to date, then you do not have to rely on nonsense geoblocking.
    3. Known bots are also no issue most of the time. They are just bots. They usually target a decade old Vulnerabilities and try out default passwords. If you follow my advice on 3. this is a non issue

  • You want your backup functional even if the system is compromised so yes another system is required for that, or through it to the cloud. Important that you do not allow deleting or editing of the backup even if the credentials used for backing up are compromised. Basically an append only storage.

    Most Cloud Storage like S3 Amazon (or most other S3 compatible providers like backblaze) offer such a setting.