MigratingtoLemmy

@[email protected]

This profile is from a federated server and may be incomplete. View on remote instance

MigratingtoLemmy , to Men's Liberation in The Perception Paradox: Men Who Hate Feminists Think Feminists Hate Men

And in doing so, they drill the idea of "men are at fault for existing" down the brains of little boys. I have said this before and I will keep saying it: feminism was defined as promoting women's equality with relation to men, but it's now about the equity women can get from men

MigratingtoLemmy , (edited ) to Men's Liberation in The Perception Paradox: Men Who Hate Feminists Think Feminists Hate Men

I'm saying modern feminism isn't exactly going by the books anymore. I don't really how my comment is connected to what you said

MigratingtoLemmy , to Men's Liberation in The Perception Paradox: Men Who Hate Feminists Think Feminists Hate Men

Pray explain how that is not classified as "demonising"?

MigratingtoLemmy , to Men's Liberation in The Perception Paradox: Men Who Hate Feminists Think Feminists Hate Men

Except that that is the theoretical definition of feminism. Modern radical feminism (what we see around us) is hardly that

MigratingtoLemmy , to Men's Liberation in The Perception Paradox: Men Who Hate Feminists Think Feminists Hate Men

Time to cut off such "friends". They don't deserve your time

MigratingtoLemmy , to homelab in Banana Pi BPI-M7 router board now available for $165 (RK3588 processor, dual 2.5 Gb Ethernet, WiFi 6 and BT 5.2)

RISC-V FTW

MigratingtoLemmy , to homelab in Banana Pi BPI-M7 router board now available for $165 (RK3588 processor, dual 2.5 Gb Ethernet, WiFi 6 and BT 5.2)

Yes

MigratingtoLemmy , to homelab in Banana Pi BPI-M7 router board now available for $165 (RK3588 processor, dual 2.5 Gb Ethernet, WiFi 6 and BT 5.2)

They’re both with backdoors how do you trust either?

MigratingtoLemmy , to homelab in Banana Pi BPI-M7 router board now available for $165 (RK3588 processor, dual 2.5 Gb Ethernet, WiFi 6 and BT 5.2)

There isn’t. I was asking if the Banana Pi used RISC-V

MigratingtoLemmy , to homelab in Banana Pi BPI-M7 router board now available for $165 (RK3588 processor, dual 2.5 Gb Ethernet, WiFi 6 and BT 5.2)

Is this board using FOSS RISC-V with open schematics? If not, there’s very good reason to suspect it too.

MigratingtoLemmy , to Sysadmin in ICANN proposes creating .INTERNAL domain

Time for your own CA

MigratingtoLemmy , (edited ) to homelab in Resources on homelab security?

Reading is fine and all, but in my experience of learning about networking and security, I have always learnt the best when I have a need for it.

Let’s take the example you posted on your post. Now, we know that HTTPS is important so that nobody has access to the traffic you’re forwarding to the Internet. Encryption usually just requires two things: the data (your traffic) and a key to encrypt it.

When you’re visiting a website with a valid certificate, it sends its public key and the valid certificate to your browser. Your browser validates that the website you’re trying to visit seems OK (not sure about the internals of the process), and encrypts your traffic with the public key of the website.

The website can now decrypt your traffic with its private key. Nobody gets to snoop on your data (but they do get to snoop on your metadata, which I’ll come to in a bit). That’s how the process works, and I have essentially provided an overview of the TLS handshake in my explanation.

Why did I say that your data isn’t exactly secure even though you encrypt it? Well that’s because your metadata isn’t encrypted yet. It is only recently that the masses are picking up on ECH and ESNI (SNI - server name indicator; this is the DNS record of your request, which means your ISP knows which website you went to, but it doesn’t know what you did on said website). With that said, I was talking about the broader Internet, which seems to be out of scope for this discussion.

Let’s talk about another use-case of TLS in your homelab, since we’re on the subject.

Problem: you want to find the padlock symbol on your browser every time you visit an internal website, but since you’re using plain HTTP on your network, your browsers considers it fit to annoy you with a warning that your destination might be a malicious website (it’s not, unless you don’t know what you’re hosting).

Immediate solution: use a reverse-proxy! Most reverse-proxies have integrations with certificate automation software (certbot FTW) which handles TLS on the client side and deals with the warnings (if you have understood the paragraphs that I have written till now, you will understand why this is the case).

Background: Have you heard of reverse-proxies? If not, a bit of reading on Wikipedia should do the trick, but basically, reverse proxies map a subdomain (slight understanding of DNS is required for this since certificates and DNS are tied closely) to a specific IP and port. This is important if you’re hosting containers on a single machine since the only way to reach out a specific container is through the combination of IP:Port, but who wants to remember random numbers? Too lazy to do that.

Question: why not just use my DNS server to map subdomains and IPs? This might not be obvious to everyone if you don’t know about DNS and its limitations (in this scenario).

Let me know if you’re facing issues with anything that I typed here. It’s a long, long journey (I’ve been learning for years now and I still don’t get things right), but you’ll get there. Just take your time, make sure to not get overwhelmed, and you’ll make it.

Cheers

MigratingtoLemmy , to Men's Liberation in Wear pink but don’t cry - "Men under 25 are less likely than their elders to feel comfortable hugging another man or weeping in front of them. What happened?"

You’re basically saying that a lot of marriages are shams.

Well, you’re right.

MigratingtoLemmy , to Sysadmin in Kevin Mitnick has died at age 59.

I am very sad that such a legend has passed away

MigratingtoLemmy , to Sysadmin in How does everyone feel about posting Sysadmin blogs here?

To be fair, adatheautomator’s blogs have helped me a fair bit for PowerShell

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines