• 0 Posts
  • 18 Comments
Joined 3 years ago
cake
Cake day: June 16th, 2023

help-circle


  • Most selfhosted projects do not store such private data.

    That is patently not true, in the self-hosted space or otherwise.

    If you want to take some kind of the security stance on pii or other personal data, you may want to take a look at the app’s workflow first before making declarations of “inadequate security”. There are other considerations than simply slapping a self-signed cert on data in transit (or at rest, for that matter). URL encoding, secrets management, api structure, etc.

    If you want to architect the security of your data using this app, it is much easier to simply encapsulate or encrypt the transport yourself. A VPN would be fine. An authentication proxy would be another.

    Ultimately, your comments on security here need more and better context to meet a reasonable threshold of confronting the dev on it.



  • So there are 3 power modes in “normal” USB; 500mA, 1A, and 2A, all three of these at 5V. The 6T can only deliver 500MA 5V.

    There is also provision in the USB spec over USBC for negotiation of power delivery that allows also changing the voltage to deliver more power. The 6T cannot do this, it lacks the usb PD circuitry.

    However, it can do org (change to “target mode” to become storage for, say, a computer to access its storage. The 6T can do this with android, but you’re right, I haven’t been able to get it to work with pmos.

    I do a lot of tinkering and development with GPS, and I use a few Blox GPS dongles. These need a bit of power to heat the ceramic antenna and atmo pressure sensor. These work with pmos.












  • non_burglar@lemmy.worldtoSelfhosted@lemmy.worldHoneypots and Tarpits
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    3 months ago

    You need to chill out and not get so worked up about someone calling out your promotion of honeypots in a forum where the vast majority don’t even know the difference between DNS and PKI, and aren’t clear on the delineation between their LAN and the internet.

    There’s nothing to solve, it’s not a CTF.

    You misunderstand, I’m not implying your network is a CTF. I mean go to your local security group and watch how pen testers work. I can tell you they certainly do not fall for “tarpits”, even the fairly new kids.

    Ultimately, you can do what you want, I obviously can’t stop you.



  • Hackers don’t poke around themselves, generally. They use bots and scripts to collect info and then return in person to pry open targets they want or find interesting.

    Op is tarpitting with a stream, which is a telltale sign of a honeypot, nothing else behaves that way. So a bot crawling for content? Fine. A bot collecting info for suitable targets? Might get the attention of the person looking. And once you have a hacker’s attention, you might be in trouble if they’re competent and start pressing buttons.

    You really have to know what you’re doing to understand where in the stack an attacker is going pull levers, which is as individual as people themselves.