• 0 Posts
  • 7 Comments
Joined 1 year ago
cake
Cake day: August 1st, 2023

help-circle


  • Noble Shift@lemmy.worldtoLinux@lemmy.mlVPS encryption
    link
    fedilink
    arrow-up
    36
    arrow-down
    1
    ·
    4 days ago

    A hacker group in Seattle (GHI) years ago attempted to build secure systems on top of compromised hardware. Although different levels of security could be achieved, the overall outcome was No. You cannot build a fully secured system on top of compromised hardware.

    A VPS for this exercise counts as ‘compromised’ hardware.


  • I’ve used Lets Encrypt for years and years, in fact it’s been at least 6?. LE with the encryptbot?, automate the entire process, and then completely forget about it until someone posts on Lemmy asking about it.

    It’s been long enough I’ve forgotten the proper names of the software and I would have to go back through my notes to recreate it.

    Just checked the logs and it’s fine.

    Don’t pay for shit.




  • I’ve found that using relative terminology seems to pierce the veil of ignorance.

    When WiFi was new/newish and absolutely no one was securing it, I would bring with me a 300ft / 100m of CAT 5, string it out across the lawn out of a window (etc), and sit in a folding chair with my laptop to visually represent the threat. It never failed to get the point across.

    These days as a last resort I will verbally liken an intruder or vulnerability with sexual predation. That gets the attention of someone in a position of power usually.

    The problems I have encountered are mostly with hostile IT Depts / MIS / DevOps teams who think I’m there to point out thier mistakes. I’m there to help prevent costly mistakes, you guys figure out blame on your own time, because I literally don’t give a shit who’s to blame if anyone at all, and after this engagement, I’ll disappear like a fart in the wind and on to the next client.