Well knowing Elon, he’s probably paying minimum wage and also forcing the guy to clean his toilets and bring him tendies.
And complaining the entire time about how the tendies doesn’t have enough honey mustard.
Well knowing Elon, he’s probably paying minimum wage and also forcing the guy to clean his toilets and bring him tendies.
And complaining the entire time about how the tendies doesn’t have enough honey mustard.
Yeah. Those Durons were a stupidly good deal at the time since you could overclock the snot out of them and get a CPU on par with a top of the stack one for absolute pennies.
Unless they caught fire. But that mostly usually didn’t hapen all that often sometimes.
Question: how is LinkedIn useful to you?
For me it’s just a non-stop swarm of recruiters from India who want me to kindly listen to their offer of a job that pays less than I’d make picking up garbage, utter sociopaths dredging up some psychotic hustle culture nonsense, and previous people I’ve worked with/for asking for favors, which of course means free.
Is it somehow more useful for an actual business?
I wouldn’t argue with the dude; he’s got a clear case of bad-faith-itis. What you did was bad, so you shouldn’t have done it, but no I won’t tell you how to fix it.
The absolute best you could have done is cross-posted to a Mastodon/Bluesky/whatever account as well, but you can’t just always go around yanking the rug out underneath communities especially if you’re in a position where it’s not just lazy shitposting and worthless commentary.
…that said, you have moved anything you can to being posted somewhere in tandem riiiiiiight?
Huh.
Usually when I run into that I just bounce the Portainer container and it sorts shit out.
Maybe that’s actually causing the tokens to rotate/expire and thus doing the same shit?
You say poor opsec, I say free advertising.
Would anyone in this thread have paid ANY attention to this movie otherwise?
Cloudflare tunnels are the thing you’re looking for, if you’re not opposed to cloudflare.
You run the daemon on your local system, it connects to cloudflare, and presto, you’ve bypassed this entire mess.
Oh neat. I use their password manager but totally somehow missed them releasing a separate 2fa app.
What confuses me is even a half-competent audit and pentest would absolutely have found an api endpoint that’s going to absolutely leak customer data, so the assumption I have to make is that, yet again, a “security” company can’t be fucked to do the bare minimum to ensure their security shit is you know, secure.
As someone with recent platforms from both Intel and AMD, man, I do not like my 7700x’s platform.
It’s just sporadically unreliable: sometimes it posts, sometimes it doesn’t, sometimes the memory decides it needs to reset back to jedc standards instead of the expo settings, sometimes it doesn’t. Even a successful POST can take upwards of a minute sometimes, and the system may or may not reset in the middle of it, resulting in two extended delays.
Perfectly stable once the OS gets booted (memtest is fine, prime95 is fine and it boosts like crazy up to about 5.5ghz all-core), but getting there is such a pain on occasion.
I realize more than a little of this is probably attributable to the motherboard manufacturer/efi settings, but the last few AMD platforms I’ve had are just wonky and less than 100% reliable compared to the last several Intel ones, which have typically just worked, correctly, every time.
Because most poeple don’t care and just want to play the latest $GAME_NAME_HERE?
And I mean, Nintendo has already sued people into essential slavery and nobody said shit, so I don’t know what the fuck will get people’s attention.
Looks like Debian and Ubuntu have shipped patches, but I’m not seeing them show up in the RHEL-derivatives just yet, but I’m sure that’ll be soon™.
LTT
Fair enough; I haven’t watched LTT in a long, long time since his tech clown gimmick just irritates me, but he definitely used to be all over his sponsors, and not in a good way.
Honestly it feels like they’re trying to get away from being just a file sync platform, and are pushing for more corpo feature sets to compete with gsuite or O365.
Which I mean is great: that’s exactly what I needed and why I use it - it let me ditch almost all of my Google services and move it all to selfhosted.
But I bet it also causes incentives to prioritize fixes and features that are focused on that, and pushes stuff like ‘make the android sync app work like every other file sync app in history’ to the bottom of the list.
Nope, that curl command says ‘connect to the public ip of the server, and ask for this specific site by name, and ignore SSL errors’.
So it’ll make a request to the public IP for any site configured with that server name even if the DNS resolution for that name isn’t a public IP, and ignore the SSL error that happens when you try to do that.
If there’s a private site configured with that name on nginx and it’s configured without any ACLs, nginx will happily return the content of whatever is at the server name requested.
Like I said, it’s certainly an edge case that requires you to have knowledge of your target, but at the same time, how many people will just name their, as an example, vaultwarden install as vaultwarden.private.domain.com?
You could write a script that’ll recon through various permuatations of high-value targets and have it make a couple hundred curl attempts to come up with a nice clean list of reconned and possibly vulnerable targets.
Just tested that and uh, yeah, what the hell? Not something my workflows need, but that’s a shocking oversight considering damn near everything else 100% does that.
That’s the gotcha that can bite you: if you’re sharing internal and external sites via a split horizon nginx config, and it’s accessible over the public internet, then the actual IP defined in DNS doesn’t actually matter.
If the attacker can determine that secret.local.mydomain.com is a valid server name, they can request it from nginx even if it’s got internal-only dns by including the header of that domain in their request, as an example, in curl like thus:
curl --header 'Host: secret.local.mydomain.com' https://your.public.ip.here -k
Admittedly this requires some recon which means 99.999% of attackers are never even going to get remotely close to doing this, but it’s an edge case that’s easy to work against by ACLs, and you probably should when doing split horizon configurations.
Ugh, not the best marketing for Nextcloud to have a public share not work, lol. It seems like 25% of people just can’t see them but they work for everyone else so who knows.
Anyway, have a pastebin instead: https://pastebin.com/zPyvgxYX
Not saying you’re wrong, but what doesn’t work right? I haven’t noticed any behavior that seems wrong to me. Usually interact with nextcloud via the nextcloud section that gets added by the client in the file picker/file manager on the OnePlus Nord I’m using.
When I was a wee kid, I thought that scene from the Matrix where Morpehus explains that humans destroyed the whole damn planet just to maybe slow down the machines was stupid.
I mean if you block the sun, we’re all going to fucking die, why would you do something that stupid?
Yeah, well, the last few years has shown that actually at least half the people on the planet would be pro-kill-everything, even if that includes themselves.
So really, this take isn’t remotely shocking anymore.