MigratingtoLemmy

@[email protected]

This profile is from a federated server and may be incomplete. View on remote instance

MigratingtoLemmy ,

Time to cut off such "friends". They don't deserve your time

MigratingtoLemmy ,

Except that that is the theoretical definition of feminism. Modern radical feminism (what we see around us) is hardly that

MigratingtoLemmy ,

Pray explain how that is not classified as "demonising"?

MigratingtoLemmy , (edited )

I'm saying modern feminism isn't exactly going by the books anymore. I don't really how my comment is connected to what you said

MigratingtoLemmy ,

And in doing so, they drill the idea of "men are at fault for existing" down the brains of little boys. I have said this before and I will keep saying it: feminism was defined as promoting women's equality with relation to men, but it's now about the equity women can get from men

MigratingtoLemmy ,

Is this board using FOSS RISC-V with open schematics? If not, there’s very good reason to suspect it too.

MigratingtoLemmy ,

There isn’t. I was asking if the Banana Pi used RISC-V

MigratingtoLemmy ,

They’re both with backdoors how do you trust either?

MigratingtoLemmy ,

Yes

MigratingtoLemmy ,

RISC-V FTW

MigratingtoLemmy , (edited )

Reading is fine and all, but in my experience of learning about networking and security, I have always learnt the best when I have a need for it.

Let’s take the example you posted on your post. Now, we know that HTTPS is important so that nobody has access to the traffic you’re forwarding to the Internet. Encryption usually just requires two things: the data (your traffic) and a key to encrypt it.

When you’re visiting a website with a valid certificate, it sends its public key and the valid certificate to your browser. Your browser validates that the website you’re trying to visit seems OK (not sure about the internals of the process), and encrypts your traffic with the public key of the website.

The website can now decrypt your traffic with its private key. Nobody gets to snoop on your data (but they do get to snoop on your metadata, which I’ll come to in a bit). That’s how the process works, and I have essentially provided an overview of the TLS handshake in my explanation.

Why did I say that your data isn’t exactly secure even though you encrypt it? Well that’s because your metadata isn’t encrypted yet. It is only recently that the masses are picking up on ECH and ESNI (SNI - server name indicator; this is the DNS record of your request, which means your ISP knows which website you went to, but it doesn’t know what you did on said website). With that said, I was talking about the broader Internet, which seems to be out of scope for this discussion.

Let’s talk about another use-case of TLS in your homelab, since we’re on the subject.

Problem: you want to find the padlock symbol on your browser every time you visit an internal website, but since you’re using plain HTTP on your network, your browsers considers it fit to annoy you with a warning that your destination might be a malicious website (it’s not, unless you don’t know what you’re hosting).

Immediate solution: use a reverse-proxy! Most reverse-proxies have integrations with certificate automation software (certbot FTW) which handles TLS on the client side and deals with the warnings (if you have understood the paragraphs that I have written till now, you will understand why this is the case).

Background: Have you heard of reverse-proxies? If not, a bit of reading on Wikipedia should do the trick, but basically, reverse proxies map a subdomain (slight understanding of DNS is required for this since certificates and DNS are tied closely) to a specific IP and port. This is important if you’re hosting containers on a single machine since the only way to reach out a specific container is through the combination of IP:Port, but who wants to remember random numbers? Too lazy to do that.

Question: why not just use my DNS server to map subdomains and IPs? This might not be obvious to everyone if you don’t know about DNS and its limitations (in this scenario).

Let me know if you’re facing issues with anything that I typed here. It’s a long, long journey (I’ve been learning for years now and I still don’t get things right), but you’ll get there. Just take your time, make sure to not get overwhelmed, and you’ll make it.

Cheers

MigratingtoLemmy ,

You’re basically saying that a lot of marriages are shams.

Well, you’re right.

MigratingtoLemmy ,

I am very sad that such a legend has passed away

MigratingtoLemmy ,

To be fair, adatheautomator’s blogs have helped me a fair bit for PowerShell

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines