[-] [email protected] 1 points 9 hours ago

Unless you are routing traffic through a VPN.

[-] [email protected] 1 points 11 hours ago

That's correct. Thanks for the correction.

[-] [email protected] 14 points 15 hours ago
  • AdguardHome/Pi-Hole (for DNS Filter)
  • DrawIO (MS Visio equivalent)
  • Invidious (Youtube privacy frontend)
  • SearxNG (Google Privacy frontend)
  • Vaultwarden (Self-hosted Bitwarden server)
  • Miniflux (RSS Reader)
  • linkWarden (Link aggregator)

Also, checkout https://selfh.st/apps/

[-] [email protected] 2 points 1 day ago

"Requires to create an account" for what exactly? I'm a long term Ubuntu user without any Ubuntu one account.

[-] [email protected] 3 points 2 days ago

Ubuntu Core, to be specific.

92
submitted 2 days ago by [email protected] to c/[email protected]
[-] [email protected] 5 points 3 days ago* (last edited 2 days ago)

Ubuntu.

Why? - I guess I'm too lazy for distro hopping now :(

Besides, this was the 1st Linux distro I tried back in 2005. After the usual ditro hopping phase was over, I settled on it; somehow (irrespective of snap and other controversies) I feel at home.

45
submitted 3 days ago by [email protected] to c/[email protected]
126
submitted 3 days ago by [email protected] to c/[email protected]
158
submitted 5 days ago by [email protected] to c/[email protected]
480
submitted 6 days ago by [email protected] to c/[email protected]

Who benefits from this? Even though Let’s Encrypt stresses that most site operators will do fine sticking with ordinary domain certificates, there are still scenarios where a numeric identifier is the only practical choice:

Infrastructure services such as DNS-over-HTTPS (DoH) – where clients may pin a literal IP address for performance or censorship-evasion reasons.
IoT and home-lab devices – think network-attached storage boxes, for example, living behind static WAN addresses.
Ephemeral cloud workloads – short-lived back-end servers that spin up with public IPs faster than DNS records can propagate.
[-] [email protected] 1 points 6 days ago

It's an open source product, in case you have concern about possibility of malicious code embedded within it.

[-] [email protected] 1 points 6 days ago

At least there is no such indication so far from Mozilla :(

182
submitted 6 days ago by [email protected] to c/[email protected]
15
Fakespot still up? (www.fakespot.com)
submitted 1 week ago by [email protected] to c/[email protected]

I just checked the site today and found it to be still functional.

Mozilla forgot to pull the plug? /s

492
submitted 1 week ago by [email protected] to c/[email protected]
96
submitted 1 week ago by [email protected] to c/[email protected]
6
submitted 1 week ago by [email protected] to c/[email protected]
51
submitted 2 weeks ago by [email protected] to c/[email protected]
79
submitted 2 weeks ago by [email protected] to c/[email protected]
[-] [email protected] 53 points 1 year ago

Bad news is that it is not clear at this point whether Mozilla is going to go forward with the implementation. A post on Reddit by one of the project members suggests that the build is a "rough proof-of-concept". Some features tested in the build "did not survive". It is unclear which did not, as they are not mentioned. Mozilla is, however, implementing those that survived the cut into Firefox. Again, the poster does not mention which those are. It is also not verified that the poster is actually a member of the project team, so take this with a grain of salt as well.

[-] [email protected] 122 points 1 year ago
  • Careful choice of program to infect the whole Linux ecosystem
  • Time it took to gain trust
  • Level of sophistication in introducing backdoor in open source product

All of these are signs of persistent threat actors aka State sponsor hacker. Though the real motive we would never know as it's now a failed project.

view more: next ›

KarnaSubarna

0 post score
0 comment score
joined 2 years ago