How do we know if there aren't a bunch of more undetected backdoors?
https://lemdro.id/post/7709696
=> More informations about this toot | More toots from mfat@lemdro.id
I’m not a security specialist either. I learn new things every day, but this is why my NextCloud is accessible through TailScale only and I have zero ports exposed to the outside world.
The only real convenience I lose is being able to say “check out this thing on my personal server” with a link to someone outside my network, but that’s easily worked around.
=> More informations about this toot | More toots from MonkeMischief@lemmy.today
Next: how do we know tailscale’s network hasn’t been backdoored?
=> More informations about this toot | More toots from redcalcium@lemmy.institute
I figure there’s a certain amount of trust you have to have in strangers for a LOT of things we use every day.
I try to be selective with where I put that trust, especially when I can’t just homebrew an advanced custom solution, but I figure Tailscale is much better than attempting to just host it on my LAN with an open a port to the big scary web and hope a bot doesn’t find a gap and ransomware it all lol.
3-2-1 backups and a certain bit of trust.
Because heck, even CPUs have been found with exploitable microcode. (Spectre and Meltdown?) At some point you just gotta balance “best rational protection” with not going insane, right?
Headscale below is pretty neat too, but I feel like spinning up Dockers on Proxmox and Tailscale is as much moving parts as I’m willing to manage alongside everything else in life. :)
=> More informations about this toot | More toots from MonkeMischief@lemmy.today
text/gemini
This content has been proxied by September (ba2dc).