…just this guy, you know.

  • 1 Post
  • 136 Comments
Joined 1 year ago
cake
Cake day: May 7th, 2023

help-circle











  • qprimed@lemmy.mltoLinux@lemmy.mlViruses & Task Viewers
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 month ago

    I understand caution when approaching things like secure boot - it can absolutely be abused by monopolies. however… barring inherent or implementation flaws and ensuring that signing keys are under user control it conceptually (and practically) allows for some useful things.









  • if you are self hosting and enjoy over-engineering systems… VLANS, ACLs between subnets and IDS/IPS should be part of.your thinking. separate things into zones of vulnerability / least-privilege and maintain that separation with an iron fist. this is a great rabbit hole to fall down if you have the time. however, given a skilled adversary with enough time and money, any network can be infiltrated eventually. the idea is to try to minimize the exposure when it happens.

    if the above is not a part of your daily thinking, then don’t worry about it too much. use a production OS like Debian stable, don’t expose ports to the public internet and only allow systems that should initiate communication to the internet to actually do so (preferably only on their well known protocol ports - if possible).