

Low hanging fruits are, in my personal case, pictures of my cats and public domain cultural artefacts.
Industrializing hacking of random servers sounds like a shitty idea at the end of the day…
We must think. Think we must.


Low hanging fruits are, in my personal case, pictures of my cats and public domain cultural artefacts.
Industrializing hacking of random servers sounds like a shitty idea at the end of the day…


Ignoring ? Nah someone mentionned my ISP might be protecting me uphill.


Non standard port. But aren’t secret chinese hack farm scanning wider than just 22 ? I don’t know and deep down believe that it’s pawned and scrubbing logs.


React2Shell is exactly the shitshow situation yes. Suddenly we are all at risk. But in this case, I’m sorry to say that my cats’ pictures are worthless.
Your point on nginx/wireguard makes me think that it might be better to htaccess through a reverse proxy than relying on a built in login system. For exemple, I should deactivate jellyfin’s login and put it behind an htaccess at the proxy’s level. Is that completely dumb?
Anyway, I clearly need to research “threat models” and cyber/infosec more. Thank you very much!


This is great thanks for this video


Aren’t zero day very specific? Or maybe it’s become a very generic term.
Anyway, I am under the impression that either it’s suddenly very simple to hack into EVERYONE because someone zero dayed the wireguard protocol and there a major flow in it, it’s a shitshow, for all, for some, just me or nobody, whatever. Or it’s a very targeted attack on me personaly, and that’s a whole other story and the means to protect my pictures of my cats and my cool public domain movies collection are different (think social engineering). Also port 22 being bombarded by brute force attempts so don’t choose a password that’s 6 letters thanks.
I KNOW I am missing many things, but still, I don’t get it.


Quick question: If I look through the ssh log and I don’t see the hundred of attempts, what could be going on?..


Yeah sorry I missed the part where it has no authentification whatsoever, that’s just open bar.
Authentification + monitoring + fail2ban + ip blacklist


Okay thanks for mentionning overblown paranoia, that’s what I have.
What kind of exploitable server misconfigurations are we talking about here?? Brute forcing won’t work because fail2ban, right? I’m a noob and deep down I’m convinced that my homeserver is compromised and has beenpart of a bitcoin mining farm for years… Yet, not a single proof…


Dumb question: why does everyone is so terribly afraid of opening stuff to the internet ? What’s the scenario?


That’s the neat part…


It looks like we found another person that’s immune! Sample their blood


Scaryyyy !
I just very recently discovered that bitwarden (vaultwarden) has this perfect feature like a “trusted contact” (not sure) where you can choose a person that can request access to your password vault, and if you DON’T answer in X days (configurable), they get access.


And so little time!


You’re right, but I’d need a graphic card < money.tar.gzip


Definitely second your feeling. I am similar in my relationship to cleaning. It feels like a lot of effort, but efforts feel good afterwards.


Thinking back on your rhetorical question, I think it’s just it.
It’s the goal. The goal was always to try and make me think that I am not just simply taking care of my stuff (and by extension myself). Because taking care (of yourself) isn’t valorized in a capitalist society.
Fuck it all. I’m putting YEARS of work into just sorting myself out.


Or I could not. Ever.


I’m in the long process of paperlessing. It’s THE perfect example of that (not so) hidden cost. But there’s no lying or trying to sell you magic. You put effort in a systematization that empowered by a great tool and a well thought out and tried model, and voila, winning.
This whole thread (that I shamelessly hijacked) is very informative and allowed me to understand that cybersecurity is in practice a mixture of concrete nerdy log books and vague feeling of being under a threshold of worthiness.
I woke up this morning and there was a faint noise coming from the server: immediately thought “ok that’s it, it’s pawned and become a node in a vast grid of malicious bots”…it was a cron verification of drives