[-] loudwhisper@infosec.pub 2 points 10 months ago

Sorry about that :) But you get the credit for spotting the problem! Thanks for that!

[-] loudwhisper@infosec.pub 2 points 10 months ago

I don't think so, does it sound weird? Not a native speaker, so maybe it does :)

[-] loudwhisper@infosec.pub 2 points 10 months ago

Thanks, I will go and double check, I am sure there are more typos!

I honestly didn't think at all about the use of checkmarks/crosses and the fact that it can be misinterpreted, I will add a disclaimer.

A bigger issue IMO is how you describe email encryption in transit as a matter of fact, but according to Google transparency report[1] there are still domains that do not support in transit encryption, and, what’s worse, when you send an email you can’t tell if it will be encrypted or not.

you are right. The reason why I took that for granted is because I assumed the scenario in which people use the "mainstream" providers. I was looking at data and I think Outlook and Gmail alone make up more than 50% of the market share. I made an assumption which I considered fair, as 99%+ of the users do not need to worry about this at all. However, this is interesting data and I might add a note about it as well, so thanks!

[-] loudwhisper@infosec.pub 2 points 10 months ago

Thanks a lot! Hopefully at least someone finds it helpful!

[-] loudwhisper@infosec.pub 1 points 11 months ago

Also hypervisors get escape vulnerabilities every now and then. I would say that in a realistic scale of difficulty of escape, a good container (doesn't matter if using Docker or something else) is a good security boundary.

If this is not the case, I wonder what your scale extremes are.

A good container has very little attack surface, since it can have almost no code or tools available, a read-only fs, no user privileges or capabilities whatsoever and possibly even a syscall filter. Sure, the kernel is the same but then the only alternative is to split that per application VMs-like) and you move the problem to hypervisors.

In the context of this asked question, I think the gains from reducing the attack surface are completely outweighed from the loss in functionality and waste of resources.

[-] loudwhisper@infosec.pub 1 points 11 months ago

Completely agree, which is why I do the same.

Additional bonus: proxies that interact with the docker API directly (I think also caddy can do it) save you from exposing the services on any port at all (only in the docker network). So it's way less likely to expose a port with a service by mistake and no need for arbitrary and unique localhost ports.

[-] loudwhisper@infosec.pub 2 points 11 months ago

Yep, I like bunny in fact. It didn't have all the features I needed back then, but it's a very good product, I heard very good things.

I also agree about the pricing. I ended up not using desec.io, but if I did, I would have probably set a 1-2 Euros recurring donation, as I feel that's a totally acceptable price.

As for why people use GoDaddy well... I feel personally attacked as that's exactly how I ended up there, when I didn't know better.

[-] loudwhisper@infosec.pub 2 points 11 months ago

That's a very interesting gotcha. They don't seem to support address ranges either. Unless once you add the whitelist the requests still work from any address (their documentation is ambiguous). This is even more confusing.

[-] loudwhisper@infosec.pub 2 points 11 months ago

Thanks for the feedback, and same to @ilmagico@lemmy.world and @jg1i@lemmy.world. I fixed the configuration of the site and now the site should be readable even in light mode.

[-] loudwhisper@infosec.pub 2 points 11 months ago* (last edited 11 months ago)

In most cases! Sorry, I simply don't believe it. Once you operate for 5, 10, 20 years not having capitalized anything is expensive as hell, even without the skill issue (which is not a great argument, as it is the case for almost anything).

It's almost always the case with rent vs invest.

Do you have some numbers?

I cite a couple of articles in the post, and here is a nice list of companies and orgs that run outside the Cloud (it's a bit old!) or decided to move away. Many big companies with their own DC, which is not surprising, but also smaller (Wikipedia!).

37signals also showed a huge amount of savings (it's one of the two links in the post) moving away from the cloud. Do you have any similar data that shows the opposite (like we saved X after going cloud)? I am genuinely curious

Edit: here is another one https://tech.ahrefs.com/how-ahrefs-saved-us-400m-in-3-years-by-not-going-to-the-cloud-8939dd930af8 Looking solely at the compute resources, there was an order of magnitude of difference between cloud costs and hosting costs (x11). Basically a value comparable (in reality double) to the whole revenue of the company.

[-] loudwhisper@infosec.pub 2 points 11 months ago

I will have a look if there is something that suggests how to "make" a light theme. Thanks for the info!

[-] loudwhisper@infosec.pub 2 points 1 year ago

I am afraid that a lot depends on cultural context of the whole society. I don't think the context is fertile for men's activism for rights. The groups that exist are almost exclusively misogynist and conservative. I believe that a movement, even if really focused on men's issues from a general perspective (I.e. not misogynistic) would be received very poorly, will fail to develop solidarity with other groups and would be accused of stealing space to them.

Frankly, I am not convinced at all that each demographic should fight their own battles, I believe in better analyzed demands that will merge under the same front gay rights, women's rights, men's rights and so on.

view more: ‹ prev next ›

loudwhisper

joined 2 years ago