[-] loudwhisper@infosec.pub 2 points 3 months ago

Yeah, this is also an option, but I have to say that I had friends over just a few weeks ago who brought sweaters when they saw the forecast at around 20C (against my recommendations), and they all were surprised by how warm it was despite the temperature (which in Italy is spring-like).

[-] loudwhisper@infosec.pub 2 points 3 months ago

I don't think its the humidity, it must have to do something with latitudes. I moved from Italy to Northern Europe and 27-28ish here is as unbearable as 33-35 back home.

[-] loudwhisper@infosec.pub 2 points 4 months ago

Social/Political problems need social/political solutions, not technical solutions.

[-] loudwhisper@infosec.pub 2 points 4 months ago

Ahaha yes, that might be the case, but I started to lose hope if the top of the applicants (out of hundreds of rejected!) all exhibits this behavior. I can't help but feel that now we are looking for people with a mindset and skillset that is simply disappearing in the industry.

And as I said in another post, I perfectly acknowledge that if I stopped reading and investigating stuff on my own, I could absolutely keep my job by just mindlessly administering a few services and rephrasing CIS benchmarks...

[-] loudwhisper@infosec.pub 2 points 1 year ago

Sorry about that :) But you get the credit for spotting the problem! Thanks for that!

[-] loudwhisper@infosec.pub 3 points 1 year ago

Not that I know, which is the reason why I essentially didn't consider those threats relevant for my personal threat model. However, it's also possible it happened and it was never discovered. The point is that there are risks associated with having the same provider having access to both the emails (and the operations around them) and the keys/crypto operations.

The cost of stealthily compromising a secure email company is simply disproportionate compared to the gain from accessing my emails. Likewise, it's unrealistic to think some sophisticated attacker would target me specifically to the point that they will discover and then compromise the specific tooling I am using to access/encrypt/decrypt emails. Also, a $5 wrench could probably achieve the same goal in a quicker and cheaper way.

If I were a Snowden-level person, I would probably consider that though, as it's possible that the US government would try to coerce -say- Proton in serving bad JS code to user X. For most people I argue these are theoretical attacks that do not pose concrete risk.

[-] loudwhisper@infosec.pub 3 points 1 year ago

Thanks!

Can you make the images clickable? They’re impossible to read at that size.

I will look into it, there might be a zola option for it. If there is, sure!

This paragraph should probably mention that this won’t work if the provider uses E2EE

That paragraph is in the context of what I call "transparent encryption", which means E2EE works until the provider is not compromised and the E2EE is effectively broken by delivering malicious software or disclosing the key. E2EE is as resilient as the security of the provider, which is why picking a trusted one is important. Of course, compromising the provider and breaking the E2EE is quite complex.

[-] loudwhisper@infosec.pub 2 points 1 year ago

Yep, I like bunny in fact. It didn't have all the features I needed back then, but it's a very good product, I heard very good things.

I also agree about the pricing. I ended up not using desec.io, but if I did, I would have probably set a 1-2 Euros recurring donation, as I feel that's a totally acceptable price.

As for why people use GoDaddy well... I feel personally attacked as that's exactly how I ended up there, when I didn't know better.

[-] loudwhisper@infosec.pub 2 points 1 year ago

That's a very interesting gotcha. They don't seem to support address ranges either. Unless once you add the whitelist the requests still work from any address (their documentation is ambiguous). This is even more confusing.

[-] loudwhisper@infosec.pub 2 points 1 year ago

cognito auth

But then at that point you are already vendor-locked, right? At that point, running on bare ec2 instances and taking more control in your hands (vs using even more AWS-specific services) is going to help very little, when your whole user management is now tied to a specific provider.

[-] loudwhisper@infosec.pub 2 points 1 year ago

This post must be fun with that one... 150+ instances in various contexts of "cloud".

[-] loudwhisper@infosec.pub 3 points 2 years ago

but that also shows that most modern software is poorly written

Does it? I mean, this is especially annoying with old software, maybe dynamically linked or PHP, or stuff like that. Modern tools (go, rust) don't actually even have this problem. Dependencies are annoying in general, I don't think it's a property of modern software.

Yes, that’s exactly point point. There are many options, yet people stick with Docker and DockerHub (that is everything but open).

Who are these people? There are tons of registries that people use, github has its own, quay.io, etc. You also can simply publish Dockerfiles and people can build themselves. Ofc Docker has the edge because it was the first mainstream tool, and it's still a great choice for single machine deployments, but it's far from the only used. Kubernetes abandoned Docker as default runtime for years, for example... who are you referring to?

Yes… maybe we just need some automation/orchestration tool for that. This is like saying that it’s way too hard to download the rootfs of some distro, unpack it and then use unshare to launch a shell on a isolated namespace… Docker as you said provides a convenient API but it doesn’t mean we can’t do the same for systemd.

But Systemd also uses unshare, chroot, etc. They are at the same level of abstraction. Docker (and container runtimes) are simply specialized tools, while systemd is not. Why wouldn't I use a tool that is meant for this when it's available. I suppose bubblewrap does something similar too (used by Flatpak), and I am sure there are more.

Completely proprietary… like QEMU/libvirt? :P

Right, because organizations generally run QEMU, not VMware, Nutanix and another handful of proprietary platforms... :)

view more: ‹ prev next ›

loudwhisper

joined 2 years ago