• 0 Posts
  • 20 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle








  • The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.

    A device is only secure as long as you are not using it, and it is not accessible physically, or by network.

    You do you dude, I’m just saying your advice is awful for the average user.


  • Does your threat model involve The Mossad? There’s no way on earth that you are genuinely remembering multiple 512 byte random passwords, let alone actually taking the time to type them in.

    Having a password manager, with MFA, a strong master password, and rule based device verification is ultimately more secure as you can have every password be randomized.

    Best practices are best practices for a reason. I recommend you follow them.


  • Genuinely terrible advice. Every popularly available password manager service hashes all your passwords, if they have a data breach they have extremely strict reporting compliance and the majority of services will re-hash all your passwords. If youre so extremely concerned about that, host your own.

    But what concerns me the most is

    Unless they specify they only store the hash I refuse to sacrifice one of my strong passwords.

    … What to you mean sacrifice?



  • Would you rather I call it by some fluffy, feel-good term like special operation? Elimination of the enemy? Opening a retaliatory assault on the Gaza strip while running a propaganda campaign aligning Hamas with groups like Isis or the Nazis, and portraying the Palestinian people as wholly supporting Hamas does nothing but provide justification for civilian casualties.

    You are correct that a country may not normally provide advance warning of assault, however an unreasonable warning is as good as no warning and again, only serves to justify the deaths of any innocents that weren’t able to evacuate in time.

    Israel has one of the best special forces units on earth, total control of what comes in and out of the strip, and the funding of the world’s second largest military, and you seriously believe they need to commit to clicking the delete button on the Gaza strip to remove a militant group from an area smaller than new york?







  • I often think that to myself as well to be honest. Originally, it was mostly because it’s the only “secure” system that I’m currently hosting and I wanted the ability to airgap it without taking the rest of my homelab offline.

    I mostly use my homelab for tinkering/applying what I’m learning without breaking a production system at work so needless to say I’ve learned a lot since I originally deployed bitwarden… Now it’s just because I’m too lazy to spin a new vm and migrate everything.


  • Prefacing by saying my lab is severely breaking some a lot of best practices due to hardware availability limitations

    Proxmox box (24GB DDR3, E3-1230)

    • Ubuntu LTS Dedicated Minecraft server
    • Windows 10 Dedicated V Rising server
    • Ubuntu LTS for Plex
    • TrueNAS
    • Coming Soon: Jelu Server - a self-hosted Goodreads replacement

    Raspberry Pi 2B+

    • PiHole

    OptiPlex 7020 sff (8GB DDR3, i5-4590)

    • Bitwarden