

Yep, that’s one way. I bet creative hackers can chain some nice exploits together and figure out things we currently don’t think of. Better give them the smallest surface possible :)
<a rel="me" href="https://layer8.space/@helix">Mastodon</a>


Yep, that’s one way. I bet creative hackers can chain some nice exploits together and figure out things we currently don’t think of. Better give them the smallest surface possible :)


Yeah, exactly my sentiment :)


There are different levels of compromise: you could have local access or root access. This might allow a hacker to gain root access by faking an SSHd and asking for a password or something like that. Host key verification would save you in that case, but then again, there’s probably funny MITM things you can do with an existing SSHd.


Mostly true, however the thing saving you would be host key verification, not pubkey authentication.
I’m just not into security by obscurity coupled with compromising the inbuilt mechanisms for making sure only root can open an SSHd.
Do you think high ports are irrelevant or only in this case for SSHd? If the former, why do you think the distinction exists in the first place?


Well back then it was the aristocracy, but then again, where’s the difference


Wouldn’t use a high port since they’re unprivileged.


“You’re irrelevant to me.”


Yeah basically Dracula is an analogy for billionaires anyway.
WTF, sorry you had to endure this. Sad to see that silencing seems to work, still. Please report their messages.
To the people messaging you privately: grow some courage and do it out in the open so we know who you are.
Trans people are just people born in the wrong gender’s body. People who feel the need to attack minorities like this are pathetic losers.
Can you please point out the hate speech you received? I can’t find any in the comments here, just people having different opinions.
As the time of writing the comment I am replying to has 15 up- and 3 downvotes. Doesn’t look like it has warranted hate speech.


https://sqstorage.net/ could be used for that. Just add storages corresponding to the various locations where the items actually are and add meta information like the owner.


Thaddäus Tentakel (German).


traktorlesbe
Why a tractor?


Greed, I guess? The answer to most issues in capitalism. They want to make as much money as possible before the bubble bursts.
Yep, so you can’t actually know if the recording is destroyed, it’s just contractually required to be destroyed. Big difference in my book.
Wished these sensitive audios would be processed locally and never leave the therapist’s network instead.
no protected recordings are used to teach the AI
How do you know for certain?


Syncthing. If you run it on your phone you can keep it always running :)


I’m pretty sure “Gimp marketing” didn’t come up with this one.


A Gimp is someone in a (Gimp) suit with holes, usually in a submissive role.
World isn’t black or white. Both of your alternatives are extremes I don’t think in.
Next to nothing is the way I want it to be, since I’m a perfectionist. But I don’t have a nagging feeling or angst, I just accept the world isn’t perfect most of the time.