| 1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 2 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2112
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1576 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2065 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2065 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2123
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2067 …}
+votes: Doctrine\ORM\PersistentCollection {#2049 …}
+reports: Doctrine\ORM\PersistentCollection {#2051 …}
+favourites: Doctrine\ORM\PersistentCollection {#2143 …}
+notifications: Doctrine\ORM\PersistentCollection {#2068 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
} |
|
Show voter details
|
| 3 |
DENIED
|
edit
|
App\Entity\EntryComment {#2112
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1576 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2065 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2065 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2123
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2067 …}
+votes: Doctrine\ORM\PersistentCollection {#2049 …}
+reports: Doctrine\ORM\PersistentCollection {#2051 …}
+favourites: Doctrine\ORM\PersistentCollection {#2143 …}
+notifications: Doctrine\ORM\PersistentCollection {#2068 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
} |
|
Show voter details
|
| 4 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2112
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1576 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2065 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2065 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2123
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2067 …}
+votes: Doctrine\ORM\PersistentCollection {#2049 …}
+reports: Doctrine\ORM\PersistentCollection {#2051 …}
+favourites: Doctrine\ORM\PersistentCollection {#2143 …}
+notifications: Doctrine\ORM\PersistentCollection {#2068 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
} |
|
Show voter details
|
| 5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 6 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2323
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2230 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2189 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2189 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2114
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2298 …}
+nested: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2297 …}
+reports: Doctrine\ORM\PersistentCollection {#2320 …}
+favourites: Doctrine\ORM\PersistentCollection {#2322 …}
+notifications: Doctrine\ORM\PersistentCollection {#2312 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2117
date: 2024-01-14 18:39:17.0 +01:00
}
} |
|
Show voter details
|
| 7 |
DENIED
|
edit
|
App\Entity\EntryComment {#2323
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2230 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2189 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2189 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2114
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2298 …}
+nested: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2297 …}
+reports: Doctrine\ORM\PersistentCollection {#2320 …}
+favourites: Doctrine\ORM\PersistentCollection {#2322 …}
+notifications: Doctrine\ORM\PersistentCollection {#2312 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2117
date: 2024-01-14 18:39:17.0 +01:00
}
} |
|
Show voter details
|
| 8 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2323
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2230 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2189 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2189 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2114
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2298 …}
+nested: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2297 …}
+reports: Doctrine\ORM\PersistentCollection {#2320 …}
+favourites: Doctrine\ORM\PersistentCollection {#2322 …}
+notifications: Doctrine\ORM\PersistentCollection {#2312 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2117
date: 2024-01-14 18:39:17.0 +01:00
}
} |
|
Show voter details
|
| 9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 10 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2223
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2305 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2324
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2303 …}
+nested: Doctrine\ORM\PersistentCollection {#2318 …}
+votes: Doctrine\ORM\PersistentCollection {#2214 …}
+reports: Doctrine\ORM\PersistentCollection {#2299 …}
+favourites: Doctrine\ORM\PersistentCollection {#2321 …}
+notifications: Doctrine\ORM\PersistentCollection {#2304 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2101
date: 2024-01-09 12:49:28.0 +01:00
}
} |
|
Show voter details
|
| 11 |
DENIED
|
edit
|
App\Entity\EntryComment {#2223
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2305 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2324
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2303 …}
+nested: Doctrine\ORM\PersistentCollection {#2318 …}
+votes: Doctrine\ORM\PersistentCollection {#2214 …}
+reports: Doctrine\ORM\PersistentCollection {#2299 …}
+favourites: Doctrine\ORM\PersistentCollection {#2321 …}
+notifications: Doctrine\ORM\PersistentCollection {#2304 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2101
date: 2024-01-09 12:49:28.0 +01:00
}
} |
|
Show voter details
|
| 12 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2223
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2305 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2324
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2303 …}
+nested: Doctrine\ORM\PersistentCollection {#2318 …}
+votes: Doctrine\ORM\PersistentCollection {#2214 …}
+reports: Doctrine\ORM\PersistentCollection {#2299 …}
+favourites: Doctrine\ORM\PersistentCollection {#2321 …}
+notifications: Doctrine\ORM\PersistentCollection {#2304 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2101
date: 2024-01-09 12:49:28.0 +01:00
}
} |
|
Show voter details
|
| 13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 14 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2141
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2060 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2060 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2306
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2164 …}
+nested: Doctrine\ORM\PersistentCollection {#2289 …}
+votes: Doctrine\ORM\PersistentCollection {#2326 …}
+reports: Doctrine\ORM\PersistentCollection {#2325 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2229 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2315
date: 2024-01-09 07:55:30.0 +01:00
}
} |
|
Show voter details
|
| 15 |
DENIED
|
edit
|
App\Entity\EntryComment {#2141
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2060 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2060 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2306
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2164 …}
+nested: Doctrine\ORM\PersistentCollection {#2289 …}
+votes: Doctrine\ORM\PersistentCollection {#2326 …}
+reports: Doctrine\ORM\PersistentCollection {#2325 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2229 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2315
date: 2024-01-09 07:55:30.0 +01:00
}
} |
|
Show voter details
|
| 16 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2141
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2060 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2060 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2306
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2164 …}
+nested: Doctrine\ORM\PersistentCollection {#2289 …}
+votes: Doctrine\ORM\PersistentCollection {#2326 …}
+reports: Doctrine\ORM\PersistentCollection {#2325 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2229 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2315
date: 2024-01-09 07:55:30.0 +01:00
}
} |
|
Show voter details
|
| 17 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 18 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2227
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2225 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2225 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2042
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2213 …}
+nested: Doctrine\ORM\PersistentCollection {#2198 …}
+votes: Doctrine\ORM\PersistentCollection {#2215 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2127 …}
+notifications: Doctrine\ORM\PersistentCollection {#2044 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2349
date: 2024-01-07 15:15:07.0 +01:00
}
} |
|
Show voter details
|
| 19 |
DENIED
|
edit
|
App\Entity\EntryComment {#2227
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2225 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2225 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2042
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2213 …}
+nested: Doctrine\ORM\PersistentCollection {#2198 …}
+votes: Doctrine\ORM\PersistentCollection {#2215 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2127 …}
+notifications: Doctrine\ORM\PersistentCollection {#2044 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2349
date: 2024-01-07 15:15:07.0 +01:00
}
} |
|
Show voter details
|
| 20 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2227
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2225 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2225 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2042
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2213 …}
+nested: Doctrine\ORM\PersistentCollection {#2198 …}
+votes: Doctrine\ORM\PersistentCollection {#2215 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2127 …}
+notifications: Doctrine\ORM\PersistentCollection {#2044 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2349
date: 2024-01-07 15:15:07.0 +01:00
}
} |
|
Show voter details
|
| 21 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 22 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2161
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2120 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2120 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2231
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2116 …}
+nested: Doctrine\ORM\PersistentCollection {#2294 …}
+votes: Doctrine\ORM\PersistentCollection {#2290 …}
+reports: Doctrine\ORM\PersistentCollection {#2295 …}
+favourites: Doctrine\ORM\PersistentCollection {#2283 …}
+notifications: Doctrine\ORM\PersistentCollection {#2282 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2228
date: 2024-01-07 15:07:40.0 +01:00
}
} |
|
Show voter details
|
| 23 |
DENIED
|
edit
|
App\Entity\EntryComment {#2161
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2120 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2120 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2231
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2116 …}
+nested: Doctrine\ORM\PersistentCollection {#2294 …}
+votes: Doctrine\ORM\PersistentCollection {#2290 …}
+reports: Doctrine\ORM\PersistentCollection {#2295 …}
+favourites: Doctrine\ORM\PersistentCollection {#2283 …}
+notifications: Doctrine\ORM\PersistentCollection {#2282 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2228
date: 2024-01-07 15:07:40.0 +01:00
}
} |
|
Show voter details
|
| 24 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2161
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2120 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2120 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2231
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2116 …}
+nested: Doctrine\ORM\PersistentCollection {#2294 …}
+votes: Doctrine\ORM\PersistentCollection {#2290 …}
+reports: Doctrine\ORM\PersistentCollection {#2295 …}
+favourites: Doctrine\ORM\PersistentCollection {#2283 …}
+notifications: Doctrine\ORM\PersistentCollection {#2282 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2228
date: 2024-01-07 15:07:40.0 +01:00
}
} |
|
Show voter details
|
| 25 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 26 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2275
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2277 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2277 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2160
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2261 …}
+nested: Doctrine\ORM\PersistentCollection {#2218 …}
+votes: Doctrine\ORM\PersistentCollection {#2221 …}
+reports: Doctrine\ORM\PersistentCollection {#2217 …}
+favourites: Doctrine\ORM\PersistentCollection {#2199 …}
+notifications: Doctrine\ORM\PersistentCollection {#2195 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2163
date: 2024-01-07 14:03:59.0 +01:00
}
} |
|
Show voter details
|
| 27 |
DENIED
|
edit
|
App\Entity\EntryComment {#2275
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2277 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2277 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2160
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2261 …}
+nested: Doctrine\ORM\PersistentCollection {#2218 …}
+votes: Doctrine\ORM\PersistentCollection {#2221 …}
+reports: Doctrine\ORM\PersistentCollection {#2217 …}
+favourites: Doctrine\ORM\PersistentCollection {#2199 …}
+notifications: Doctrine\ORM\PersistentCollection {#2195 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2163
date: 2024-01-07 14:03:59.0 +01:00
}
} |
|
Show voter details
|
| 28 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2275
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2277 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2277 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2160
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2261 …}
+nested: Doctrine\ORM\PersistentCollection {#2218 …}
+votes: Doctrine\ORM\PersistentCollection {#2221 …}
+reports: Doctrine\ORM\PersistentCollection {#2217 …}
+favourites: Doctrine\ORM\PersistentCollection {#2199 …}
+notifications: Doctrine\ORM\PersistentCollection {#2195 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2163
date: 2024-01-07 14:03:59.0 +01:00
}
} |
|
Show voter details
|
| 29 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 30 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2206
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2202 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2202 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#2279
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2201 …}
+nested: Doctrine\ORM\PersistentCollection {#2203 …}
+votes: Doctrine\ORM\PersistentCollection {#2212 …}
+reports: Doctrine\ORM\PersistentCollection {#2209 …}
+favourites: Doctrine\ORM\PersistentCollection {#2200 …}
+notifications: Doctrine\ORM\PersistentCollection {#2270 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#2276
date: 2024-01-07 13:55:15.0 +01:00
}
} |
|
Show voter details
|
| 31 |
DENIED
|
edit
|
App\Entity\EntryComment {#2206
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2202 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2202 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#2279
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2201 …}
+nested: Doctrine\ORM\PersistentCollection {#2203 …}
+votes: Doctrine\ORM\PersistentCollection {#2212 …}
+reports: Doctrine\ORM\PersistentCollection {#2209 …}
+favourites: Doctrine\ORM\PersistentCollection {#2200 …}
+notifications: Doctrine\ORM\PersistentCollection {#2270 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#2276
date: 2024-01-07 13:55:15.0 +01:00
}
} |
|
Show voter details
|
| 32 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2206
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2202 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2202 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#2279
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2201 …}
+nested: Doctrine\ORM\PersistentCollection {#2203 …}
+votes: Doctrine\ORM\PersistentCollection {#2212 …}
+reports: Doctrine\ORM\PersistentCollection {#2209 …}
+favourites: Doctrine\ORM\PersistentCollection {#2200 …}
+notifications: Doctrine\ORM\PersistentCollection {#2270 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#2276
date: 2024-01-07 13:55:15.0 +01:00
}
} |
|
Show voter details
|
| 33 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 34 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2267
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2273 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2273 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2205
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2271 …}
+nested: Doctrine\ORM\PersistentCollection {#2272 …}
+votes: Doctrine\ORM\PersistentCollection {#2253 …}
+reports: Doctrine\ORM\PersistentCollection {#2262 …}
+favourites: Doctrine\ORM\PersistentCollection {#2264 …}
+notifications: Doctrine\ORM\PersistentCollection {#2242 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2197
date: 2024-01-07 13:52:04.0 +01:00
}
} |
|
Show voter details
|
| 35 |
DENIED
|
edit
|
App\Entity\EntryComment {#2267
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2273 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2273 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2205
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2271 …}
+nested: Doctrine\ORM\PersistentCollection {#2272 …}
+votes: Doctrine\ORM\PersistentCollection {#2253 …}
+reports: Doctrine\ORM\PersistentCollection {#2262 …}
+favourites: Doctrine\ORM\PersistentCollection {#2264 …}
+notifications: Doctrine\ORM\PersistentCollection {#2242 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2197
date: 2024-01-07 13:52:04.0 +01:00
}
} |
|
Show voter details
|
| 36 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2267
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2363 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2273 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2273 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2205
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2271 …}
+nested: Doctrine\ORM\PersistentCollection {#2272 …}
+votes: Doctrine\ORM\PersistentCollection {#2253 …}
+reports: Doctrine\ORM\PersistentCollection {#2262 …}
+favourites: Doctrine\ORM\PersistentCollection {#2264 …}
+notifications: Doctrine\ORM\PersistentCollection {#2242 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2197
date: 2024-01-07 13:52:04.0 +01:00
}
} |
|
Show voter details
|
| 37 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 38 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2233
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2456 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#2268
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#2226 …}
+nested: Doctrine\ORM\PersistentCollection {#2238 …}
+votes: Doctrine\ORM\PersistentCollection {#2249 …}
+reports: Doctrine\ORM\PersistentCollection {#2259 …}
+favourites: Doctrine\ORM\PersistentCollection {#2244 …}
+notifications: Doctrine\ORM\PersistentCollection {#2250 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#2257
date: 2024-01-07 13:09:29.0 +01:00
}
} |
|
Show voter details
|
| 39 |
DENIED
|
edit
|
App\Entity\EntryComment {#2233
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2456 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#2268
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#2226 …}
+nested: Doctrine\ORM\PersistentCollection {#2238 …}
+votes: Doctrine\ORM\PersistentCollection {#2249 …}
+reports: Doctrine\ORM\PersistentCollection {#2259 …}
+favourites: Doctrine\ORM\PersistentCollection {#2244 …}
+notifications: Doctrine\ORM\PersistentCollection {#2250 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#2257
date: 2024-01-07 13:09:29.0 +01:00
}
} |
|
Show voter details
|
| 40 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2233
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2456 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#2268
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#2226 …}
+nested: Doctrine\ORM\PersistentCollection {#2238 …}
+votes: Doctrine\ORM\PersistentCollection {#2249 …}
+reports: Doctrine\ORM\PersistentCollection {#2259 …}
+favourites: Doctrine\ORM\PersistentCollection {#2244 …}
+notifications: Doctrine\ORM\PersistentCollection {#2250 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#2257
date: 2024-01-07 13:09:29.0 +01:00
}
} |
|
Show voter details
|
| 41 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
| 42 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2243
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2456 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2247 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2247 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#2236
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2255 …}
+nested: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2285 …}
+reports: Doctrine\ORM\PersistentCollection {#2287 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2039 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#2240
date: 2024-01-07 13:00:57.0 +01:00
}
} |
|
Show voter details
|
| 43 |
DENIED
|
edit
|
App\Entity\EntryComment {#2243
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2456 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2247 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2247 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#2236
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2255 …}
+nested: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2285 …}
+reports: Doctrine\ORM\PersistentCollection {#2287 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2039 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#2240
date: 2024-01-07 13:00:57.0 +01:00
}
} |
|
Show voter details
|
| 44 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2243
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#2456 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1725 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2247 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2247 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#2236
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2255 …}
+nested: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2285 …}
+reports: Doctrine\ORM\PersistentCollection {#2287 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2039 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#2240
date: 2024-01-07 13:00:57.0 +01:00
}
} |
|
Show voter details
|