[-] CondorWonder@lemmy.ca 20 points 3 months ago

We can’t ever stop this kind of stuff, but with something like fail2ban you can set it up to block on too many failures.

Really though - ensuring your system is kept up to date and uses strong passwords or use a SSH keys is the best defence. Blocking doesn’t prevent them from trying a few times. Moving SSH to a non standard port will stop most of the automated attacks but it won’t stop someone who is dedicated.

[-] CondorWonder@lemmy.ca 8 points 5 months ago

Without looking at it it’s probably making a unique request to a resource on a NextDNS subdomain and watching where the request comes from. Like pulling an image from (unique _string).check.nextdns.com. This requires nothing special on the client, it’s making a standard request, and as part of that it needs to do a DNS lookup.

If the source of the and your IP are similar then it’s likely the same network, otherwise it can correlate the source with known resolvers.

[-] CondorWonder@lemmy.ca 11 points 5 months ago

Older fobs never turned off - so they are constantly broadcasting the signal for the car. Newer fobs do turn off when at rest so they’re less risky, but if say it’s in your pocket it’s constantly moving so someone could still relay it to steal your vehicle, assuming they get close enough to you.

The faraday bag is good for older fobs or if you think you’re at risk of a key relay attack.

[-] CondorWonder@lemmy.ca 12 points 9 months ago

Phillips SonicCare for 20+ years. I think it’s helped me a lure with my dental care. Various models as the batteries wear out. The latest has Bluetooth that I never use but that doesn’t affect the cleaning part.

[-] CondorWonder@lemmy.ca 44 points 11 months ago

Right now - easy, with the difficulty going up over time as the main Chromium codebase continues to change (and especially as it gets security updates). I think I’ve read that some variants (Brave?) have committed to supporting ManifestV2 for as long as possible, for instance with their own fork.

[-] CondorWonder@lemmy.ca 11 points 1 year ago

WoL packets are usually sent to the ip broadcast address for the network as they’re not ip based. I don’t know if this would ever work well across networks. Can you do send the wol packet from the opnsense router instead? Does it work then?

If you’re sending it to the IP of the server, it likely works soon after your turn the machine off because the ARP entry hasn’t timed out yet, but once it times out it won’t work anymore. The router doesn’t know how to get to the machine. You may be able to add a static arp mapping to get it to work long term.

[-] CondorWonder@lemmy.ca 12 points 1 year ago

The add-on store that’s managed and updated via the supervisor. It does the same thing as your setup, but integrates into HA nicer (automatic connectivity to HA for the containers, when they need it). If you’re happy with how your setup works then there’s no compelling reason to switch.

[-] CondorWonder@lemmy.ca 11 points 1 year ago

Yes. There’s no support (hopefully just yet) for multiple Home Assistant instances with the same account.

[-] CondorWonder@lemmy.ca 37 points 2 years ago

It’s called Badges - edit the dashboard page, then click on the edit button beside the tab.

[-] CondorWonder@lemmy.ca 17 points 2 years ago

apropos to search man pages, otherwise I use man

[-] CondorWonder@lemmy.ca 6 points 2 years ago

Why not set up an automation for when it disconnects (goes into unavailable or unknown state probably) and send a notification? That’s relying on the actual problem (Nest goes offline) rather than a side effect of the problem (notification that the integration is broken).

[-] CondorWonder@lemmy.ca 20 points 2 years ago

In general, if you haven’t taken steps to expose your service to the Internet, it’s not accessible over or to the internet. Your router that connects you to the Internet should have a firewall that blocks all inbound, unsolicited requests, and you also need to do something explicit with most self hosted service to expose them, they will not announce themselves to the world.

In addition if you’re using an ipv4 network address that’s likely a private address (like 10.x.y.z, 172.x.y.z, or 192.168.x.y), which also isn’t accessible outside of your network.

view more: next ›

CondorWonder

joined 2 years ago