Cybasura

joined 11 months ago
[–] Cybasura@alien.top 1 points 9 months ago
[–] Cybasura@alien.top 1 points 9 months ago

Hey, thats not useless!!!!

[–] Cybasura@alien.top 1 points 9 months ago

I recommend you dont touch network_mode unless you absolutely need it

Most services shouldnt need the network_mode, just gotta port forward/translate most of the time

[–] Cybasura@alien.top 1 points 9 months ago

Tube Archiving?

[–] Cybasura@alien.top 0 points 9 months ago (1 children)

Google recently had several cases of - which looks to be a developing situation - user personal data losses in the google drive side of operations

Thats right, the SaaS infrastructure that is based on storing user data on a cloud system lost about months of user data

Netflix recently also starting pulling toxic, egregious changes such that its basically insulting to people giving money to them

[–] Cybasura@alien.top 1 points 9 months ago

I used Nextcloud + Samba by the side for awhile, these days I use Samba exclusively, mounting takes basically no time whatsoever and syncthing for synchronization stuff

[–] Cybasura@alien.top 1 points 9 months ago (3 children)

I'm too poor for a 321 lol

[–] Cybasura@alien.top 1 points 10 months ago

Yeah exactly, the assumption is that if they gice you the api key generator, but most with API key requirements dont unfortunately

[–] Cybasura@alien.top 1 points 10 months ago (2 children)

You cant call it open source when you need a goddamn API key from a server to do it, because wheres that api generator algorithm?

[–] Cybasura@alien.top 1 points 10 months ago

Interesting, so is this like a uPNP in this case?

[–] Cybasura@alien.top 2 points 10 months ago (1 children)

No, I read it properly, a MITM generally refers to MITM Attack and vice versa in cybersecurity, it is down to the individual to clarify if they meant otherwise and clearly, this case he is referencing to BEING A MITM for malicious purposes

[–] Cybasura@alien.top 3 points 10 months ago (3 children)

Thats not what a MITM is

A MITM is a Man-in-the-Middle Attack, someone whom you dont trust or dont know has hijacked your network connection to either read, remove or modify data from your network packets and then proxy-send it to your initial intended target

Cloudflare is a proxy server, a person you TRUST and designated to passthrough first to scan and check for network security before it redirects and pass your packets through to your intended target, like a gatekeeper

What, you gonna call all your gatekeepers, your bouncers, your proxy servers a MITM?

view more: next ›