1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#1680
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "selfhosted-service-to-share-files-to-SSO-authenticated-users"
+title: "selfhosted service to share files to SSO-authenticated users ?"
+url: null
+body: """
Hi all,\n
\n
Well, my question is in the title of of post. :-)\n
\n
Does somebody know if there exists an easy sollution to share files to users (e.g. members of an organisation), based on the fact that the user is known in a SSO (authentik) ?\n
\n
I know nextcloud would be an option, but that would create a nextcloud account for all the users, … which is quite overkill for what is needed here.\n
\n
I know we can probably build something based on apache, PHP or so, … but if there would be a ready-to-use service for this, that would be nice. (and probably a lot more secure then what I would build myself :-) ).\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 21
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725895744 {#1683
date: 2024-09-09 17:29:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
+badges: Doctrine\ORM\PersistentCollection {#1630 …}
+children: [
App\Entity\EntryComment {#2336
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1680}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2339
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2337 …}
+nested: Doctrine\ORM\PersistentCollection {#2341 …}
+votes: Doctrine\ORM\PersistentCollection {#2334 …}
+reports: Doctrine\ORM\PersistentCollection {#2324 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2165 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
+"title": 311283
}
]
-id: 30457
-titleTs: "'authent':9 'file':5 'selfhost':1 'servic':2 'share':4 'sso':8 'sso-authent':7 'user':10"
-bodyTs: "'account':58 'apach':81 'authentik':44 'base':32,79 'build':77,112 'creat':55 'e.g':27 'easi':20 'exist':18 'fact':35 'file':24 'hi':1 'know':15,46,73 'known':40 'kr':114 'lot':105 'member':28 'need':70 'nextcloud':47,57 'nice':101 'option':51 'organis':31 'overkil':66 'php':82 'post':12 'probabl':76,103 'question':5 'quit':65 'readi':92 'ready-to-us':91 'secur':107 'servic':95 'share':23 'sollut':21 'somebodi':14 'someth':78 'sso':43 'titl':9 'use':94 'user':26,38,62 'well':3 'would':48,54,88,99,111"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705329382
+visibility: "visible "
+apId: "https://infosec.pub/post/7164519"
+editedAt: null
+createdAt: DateTimeImmutable @1705251882 {#1687
date: 2024-01-14 18:04:42.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#1680
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "selfhosted-service-to-share-files-to-SSO-authenticated-users"
+title: "selfhosted service to share files to SSO-authenticated users ?"
+url: null
+body: """
Hi all,\n
\n
Well, my question is in the title of of post. :-)\n
\n
Does somebody know if there exists an easy sollution to share files to users (e.g. members of an organisation), based on the fact that the user is known in a SSO (authentik) ?\n
\n
I know nextcloud would be an option, but that would create a nextcloud account for all the users, … which is quite overkill for what is needed here.\n
\n
I know we can probably build something based on apache, PHP or so, … but if there would be a ready-to-use service for this, that would be nice. (and probably a lot more secure then what I would build myself :-) ).\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 21
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725895744 {#1683
date: 2024-09-09 17:29:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
+badges: Doctrine\ORM\PersistentCollection {#1630 …}
+children: [
App\Entity\EntryComment {#2336
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1680}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2339
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2337 …}
+nested: Doctrine\ORM\PersistentCollection {#2341 …}
+votes: Doctrine\ORM\PersistentCollection {#2334 …}
+reports: Doctrine\ORM\PersistentCollection {#2324 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2165 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
+"title": 311283
}
]
-id: 30457
-titleTs: "'authent':9 'file':5 'selfhost':1 'servic':2 'share':4 'sso':8 'sso-authent':7 'user':10"
-bodyTs: "'account':58 'apach':81 'authentik':44 'base':32,79 'build':77,112 'creat':55 'e.g':27 'easi':20 'exist':18 'fact':35 'file':24 'hi':1 'know':15,46,73 'known':40 'kr':114 'lot':105 'member':28 'need':70 'nextcloud':47,57 'nice':101 'option':51 'organis':31 'overkil':66 'php':82 'post':12 'probabl':76,103 'question':5 'quit':65 'readi':92 'ready-to-us':91 'secur':107 'servic':95 'share':23 'sollut':21 'somebodi':14 'someth':78 'sso':43 'titl':9 'use':94 'user':26,38,62 'well':3 'would':48,54,88,99,111"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705329382
+visibility: "visible "
+apId: "https://infosec.pub/post/7164519"
+editedAt: null
+createdAt: DateTimeImmutable @1705251882 {#1687
date: 2024-01-14 18:04:42.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#1680
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "selfhosted-service-to-share-files-to-SSO-authenticated-users"
+title: "selfhosted service to share files to SSO-authenticated users ?"
+url: null
+body: """
Hi all,\n
\n
Well, my question is in the title of of post. :-)\n
\n
Does somebody know if there exists an easy sollution to share files to users (e.g. members of an organisation), based on the fact that the user is known in a SSO (authentik) ?\n
\n
I know nextcloud would be an option, but that would create a nextcloud account for all the users, … which is quite overkill for what is needed here.\n
\n
I know we can probably build something based on apache, PHP or so, … but if there would be a ready-to-use service for this, that would be nice. (and probably a lot more secure then what I would build myself :-) ).\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 21
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725895744 {#1683
date: 2024-09-09 17:29:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
+badges: Doctrine\ORM\PersistentCollection {#1630 …}
+children: [
App\Entity\EntryComment {#2336
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1680}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2339
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2337 …}
+nested: Doctrine\ORM\PersistentCollection {#2341 …}
+votes: Doctrine\ORM\PersistentCollection {#2334 …}
+reports: Doctrine\ORM\PersistentCollection {#2324 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2165 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
+"title": 311283
}
]
-id: 30457
-titleTs: "'authent':9 'file':5 'selfhost':1 'servic':2 'share':4 'sso':8 'sso-authent':7 'user':10"
-bodyTs: "'account':58 'apach':81 'authentik':44 'base':32,79 'build':77,112 'creat':55 'e.g':27 'easi':20 'exist':18 'fact':35 'file':24 'hi':1 'know':15,46,73 'known':40 'kr':114 'lot':105 'member':28 'need':70 'nextcloud':47,57 'nice':101 'option':51 'organis':31 'overkil':66 'php':82 'post':12 'probabl':76,103 'question':5 'quit':65 'readi':92 'ready-to-us':91 'secur':107 'servic':95 'share':23 'sollut':21 'somebodi':14 'someth':78 'sso':43 'titl':9 'use':94 'user':26,38,62 'well':3 'would':48,54,88,99,111"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705329382
+visibility: "visible "
+apId: "https://infosec.pub/post/7164519"
+editedAt: null
+createdAt: DateTimeImmutable @1705251882 {#1687
date: 2024-01-14 18:04:42.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2336
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1680
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "selfhosted-service-to-share-files-to-SSO-authenticated-users"
+title: "selfhosted service to share files to SSO-authenticated users ?"
+url: null
+body: """
Hi all,\n
\n
Well, my question is in the title of of post. :-)\n
\n
Does somebody know if there exists an easy sollution to share files to users (e.g. members of an organisation), based on the fact that the user is known in a SSO (authentik) ?\n
\n
I know nextcloud would be an option, but that would create a nextcloud account for all the users, … which is quite overkill for what is needed here.\n
\n
I know we can probably build something based on apache, PHP or so, … but if there would be a ready-to-use service for this, that would be nice. (and probably a lot more secure then what I would build myself :-) ).\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 21
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725895744 {#1683
date: 2024-09-09 17:29:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
+badges: Doctrine\ORM\PersistentCollection {#1630 …}
+children: [
App\Entity\EntryComment {#2336}
]
-id: 30457
-titleTs: "'authent':9 'file':5 'selfhost':1 'servic':2 'share':4 'sso':8 'sso-authent':7 'user':10"
-bodyTs: "'account':58 'apach':81 'authentik':44 'base':32,79 'build':77,112 'creat':55 'e.g':27 'easi':20 'exist':18 'fact':35 'file':24 'hi':1 'know':15,46,73 'known':40 'kr':114 'lot':105 'member':28 'need':70 'nextcloud':47,57 'nice':101 'option':51 'organis':31 'overkil':66 'php':82 'post':12 'probabl':76,103 'question':5 'quit':65 'readi':92 'ready-to-us':91 'secur':107 'servic':95 'share':23 'sollut':21 'somebodi':14 'someth':78 'sso':43 'titl':9 'use':94 'user':26,38,62 'well':3 'would':48,54,88,99,111"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705329382
+visibility: "visible "
+apId: "https://infosec.pub/post/7164519"
+editedAt: null
+createdAt: DateTimeImmutable @1705251882 {#1687
date: 2024-01-14 18:04:42.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2339
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2337 …}
+nested: Doctrine\ORM\PersistentCollection {#2341 …}
+votes: Doctrine\ORM\PersistentCollection {#2334 …}
+reports: Doctrine\ORM\PersistentCollection {#2324 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2165 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
+"title": 311283
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\EntryComment {#2336
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1680
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "selfhosted-service-to-share-files-to-SSO-authenticated-users"
+title: "selfhosted service to share files to SSO-authenticated users ?"
+url: null
+body: """
Hi all,\n
\n
Well, my question is in the title of of post. :-)\n
\n
Does somebody know if there exists an easy sollution to share files to users (e.g. members of an organisation), based on the fact that the user is known in a SSO (authentik) ?\n
\n
I know nextcloud would be an option, but that would create a nextcloud account for all the users, … which is quite overkill for what is needed here.\n
\n
I know we can probably build something based on apache, PHP or so, … but if there would be a ready-to-use service for this, that would be nice. (and probably a lot more secure then what I would build myself :-) ).\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 21
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725895744 {#1683
date: 2024-09-09 17:29:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
+badges: Doctrine\ORM\PersistentCollection {#1630 …}
+children: [
App\Entity\EntryComment {#2336}
]
-id: 30457
-titleTs: "'authent':9 'file':5 'selfhost':1 'servic':2 'share':4 'sso':8 'sso-authent':7 'user':10"
-bodyTs: "'account':58 'apach':81 'authentik':44 'base':32,79 'build':77,112 'creat':55 'e.g':27 'easi':20 'exist':18 'fact':35 'file':24 'hi':1 'know':15,46,73 'known':40 'kr':114 'lot':105 'member':28 'need':70 'nextcloud':47,57 'nice':101 'option':51 'organis':31 'overkil':66 'php':82 'post':12 'probabl':76,103 'question':5 'quit':65 'readi':92 'ready-to-us':91 'secur':107 'servic':95 'share':23 'sollut':21 'somebodi':14 'someth':78 'sso':43 'titl':9 'use':94 'user':26,38,62 'well':3 'would':48,54,88,99,111"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705329382
+visibility: "visible "
+apId: "https://infosec.pub/post/7164519"
+editedAt: null
+createdAt: DateTimeImmutable @1705251882 {#1687
date: 2024-01-14 18:04:42.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2339
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2337 …}
+nested: Doctrine\ORM\PersistentCollection {#2341 …}
+votes: Doctrine\ORM\PersistentCollection {#2334 …}
+reports: Doctrine\ORM\PersistentCollection {#2324 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2165 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
+"title": 311283
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2336
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1680
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "selfhosted-service-to-share-files-to-SSO-authenticated-users"
+title: "selfhosted service to share files to SSO-authenticated users ?"
+url: null
+body: """
Hi all,\n
\n
Well, my question is in the title of of post. :-)\n
\n
Does somebody know if there exists an easy sollution to share files to users (e.g. members of an organisation), based on the fact that the user is known in a SSO (authentik) ?\n
\n
I know nextcloud would be an option, but that would create a nextcloud account for all the users, … which is quite overkill for what is needed here.\n
\n
I know we can probably build something based on apache, PHP or so, … but if there would be a ready-to-use service for this, that would be nice. (and probably a lot more secure then what I would build myself :-) ).\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 21
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725895744 {#1683
date: 2024-09-09 17:29:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
+badges: Doctrine\ORM\PersistentCollection {#1630 …}
+children: [
App\Entity\EntryComment {#2336}
]
-id: 30457
-titleTs: "'authent':9 'file':5 'selfhost':1 'servic':2 'share':4 'sso':8 'sso-authent':7 'user':10"
-bodyTs: "'account':58 'apach':81 'authentik':44 'base':32,79 'build':77,112 'creat':55 'e.g':27 'easi':20 'exist':18 'fact':35 'file':24 'hi':1 'know':15,46,73 'known':40 'kr':114 'lot':105 'member':28 'need':70 'nextcloud':47,57 'nice':101 'option':51 'organis':31 'overkil':66 'php':82 'post':12 'probabl':76,103 'question':5 'quit':65 'readi':92 'ready-to-us':91 'secur':107 'servic':95 'share':23 'sollut':21 'somebodi':14 'someth':78 'sso':43 'titl':9 'use':94 'user':26,38,62 'well':3 'would':48,54,88,99,111"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705329382
+visibility: "visible "
+apId: "https://infosec.pub/post/7164519"
+editedAt: null
+createdAt: DateTimeImmutable @1705251882 {#1687
date: 2024-01-14 18:04:42.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2343 …}
+body: "Yes, that’s a very useful idea. Thanks!"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705340719 {#2339
date: 2024-01-15 18:45:19.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@chiisana@lemmy.chiisana.net"
]
+children: Doctrine\ORM\PersistentCollection {#2337 …}
+nested: Doctrine\ORM\PersistentCollection {#2341 …}
+votes: Doctrine\ORM\PersistentCollection {#2334 …}
+reports: Doctrine\ORM\PersistentCollection {#2324 …}
+favourites: Doctrine\ORM\PersistentCollection {#2333 …}
+notifications: Doctrine\ORM\PersistentCollection {#2165 …}
-id: 311283
-bodyTs: "'idea':7 'thank':8 'use':6 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5714602"
+editedAt: null
+createdAt: DateTimeImmutable @1705340719 {#2335
date: 2024-01-15 18:45:19.0 +01:00
}
+"title": 311283
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
10 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#2071
+user: Proxies\__CG__\App\Entity\User {#2115 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Self-hosted-or-personal-email-solutions"
+title: "Self-hosted or personal email solutions?"
+url: null
+body: """
I have a unique name, think John Doe, and I’m hoping to create a unique and “professional” looking email account like johndoe@gmail.com or john@doe.com. Since my name is common, all reasonable permutations are taken. I was considering purchasing a domain with something unique, then making personal family email accounts for john@mydoe.com jane@mydoe.com etc.\n
\n
Consider that I’m starting from scratch (I am). Is there a preferred domain registrar, are GoDaddy or NameCheap good enough? Are there prebuilt services I can just point my domain to or do I need to spin up a VPS and install my own services? Are there concerns tying my accounts to a service that might go under or are some “too big to fail”?\n
\n
I can expand what hangs off the domain later, but for now I just need a way to make my own email addresses and use them with the relative ease of Gmail or others. Thanks in advance!!
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 96
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1723325014 {#2102
date: 2024-08-10 23:23:34.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2121 …}
+votes: Doctrine\ORM\PersistentCollection {#2114 …}
+reports: Doctrine\ORM\PersistentCollection {#2099 …}
+favourites: Doctrine\ORM\PersistentCollection {#2261 …}
+notifications: Doctrine\ORM\PersistentCollection {#2220 …}
+badges: Doctrine\ORM\PersistentCollection {#2290 …}
+children: [
App\Entity\EntryComment {#2067
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2071 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2049
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2069 …}
+votes: Doctrine\ORM\PersistentCollection {#2068 …}
+reports: Doctrine\ORM\PersistentCollection {#2137 …}
+favourites: Doctrine\ORM\PersistentCollection {#2135 …}
+notifications: Doctrine\ORM\PersistentCollection {#2159 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2070
date: 2024-01-14 18:39:17.0 +01:00
}
+"title": 308494
}
]
-id: 28340
-titleTs: "'email':6 'host':3 'person':5 'self':2 'self-host':1 'solut':7"
-bodyTs: "'account':21,50,106 'address':143 'advanc':157 'big':118 'common':30 'concern':103 'consid':38,55 'creat':14 'doe':8 'domain':41,68,85,128 'eas':150 'email':20,49,142 'enough':75 'etc':54 'expand':123 'fail':120 'famili':48 'gmail':152 'go':112 'godaddi':71 'good':74 'hang':125 'hope':12 'instal':97 'jane@mydoe.com':53 'john':7 'john@doe.com':25 'john@mydoe.com':52 'johndoe@gmail.com':23 'later':129 'like':22 'look':19 'm':11,58 'make':46,139 'might':111 'name':5,28 'namecheap':73 'need':90,135 'other':154 'permut':33 'person':47 'point':83 'prebuilt':78 'prefer':67 'profession':18 'purchas':39 'reason':32 'registrar':69 'relat':149 'scratch':61 'servic':79,100,109 'sinc':26 'someth':43 'spin':92 'start':59 'taken':35 'thank':155 'think':6 'tie':104 'uniqu':4,16,44 'use':145 'vps':95 'way':137"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704885343
+visibility: "visible "
+apId: "https://lemmy.world/post/10490604"
+editedAt: null
+createdAt: DateTimeImmutable @1704798943 {#2113
date: 2024-01-09 12:15:43.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
11 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#2071
+user: Proxies\__CG__\App\Entity\User {#2115 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Self-hosted-or-personal-email-solutions"
+title: "Self-hosted or personal email solutions?"
+url: null
+body: """
I have a unique name, think John Doe, and I’m hoping to create a unique and “professional” looking email account like johndoe@gmail.com or john@doe.com. Since my name is common, all reasonable permutations are taken. I was considering purchasing a domain with something unique, then making personal family email accounts for john@mydoe.com jane@mydoe.com etc.\n
\n
Consider that I’m starting from scratch (I am). Is there a preferred domain registrar, are GoDaddy or NameCheap good enough? Are there prebuilt services I can just point my domain to or do I need to spin up a VPS and install my own services? Are there concerns tying my accounts to a service that might go under or are some “too big to fail”?\n
\n
I can expand what hangs off the domain later, but for now I just need a way to make my own email addresses and use them with the relative ease of Gmail or others. Thanks in advance!!
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 96
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1723325014 {#2102
date: 2024-08-10 23:23:34.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2121 …}
+votes: Doctrine\ORM\PersistentCollection {#2114 …}
+reports: Doctrine\ORM\PersistentCollection {#2099 …}
+favourites: Doctrine\ORM\PersistentCollection {#2261 …}
+notifications: Doctrine\ORM\PersistentCollection {#2220 …}
+badges: Doctrine\ORM\PersistentCollection {#2290 …}
+children: [
App\Entity\EntryComment {#2067
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2071 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2049
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2069 …}
+votes: Doctrine\ORM\PersistentCollection {#2068 …}
+reports: Doctrine\ORM\PersistentCollection {#2137 …}
+favourites: Doctrine\ORM\PersistentCollection {#2135 …}
+notifications: Doctrine\ORM\PersistentCollection {#2159 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2070
date: 2024-01-14 18:39:17.0 +01:00
}
+"title": 308494
}
]
-id: 28340
-titleTs: "'email':6 'host':3 'person':5 'self':2 'self-host':1 'solut':7"
-bodyTs: "'account':21,50,106 'address':143 'advanc':157 'big':118 'common':30 'concern':103 'consid':38,55 'creat':14 'doe':8 'domain':41,68,85,128 'eas':150 'email':20,49,142 'enough':75 'etc':54 'expand':123 'fail':120 'famili':48 'gmail':152 'go':112 'godaddi':71 'good':74 'hang':125 'hope':12 'instal':97 'jane@mydoe.com':53 'john':7 'john@doe.com':25 'john@mydoe.com':52 'johndoe@gmail.com':23 'later':129 'like':22 'look':19 'm':11,58 'make':46,139 'might':111 'name':5,28 'namecheap':73 'need':90,135 'other':154 'permut':33 'person':47 'point':83 'prebuilt':78 'prefer':67 'profession':18 'purchas':39 'reason':32 'registrar':69 'relat':149 'scratch':61 'servic':79,100,109 'sinc':26 'someth':43 'spin':92 'start':59 'taken':35 'thank':155 'think':6 'tie':104 'uniqu':4,16,44 'use':145 'vps':95 'way':137"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704885343
+visibility: "visible "
+apId: "https://lemmy.world/post/10490604"
+editedAt: null
+createdAt: DateTimeImmutable @1704798943 {#2113
date: 2024-01-09 12:15:43.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
12 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#2071
+user: Proxies\__CG__\App\Entity\User {#2115 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Self-hosted-or-personal-email-solutions"
+title: "Self-hosted or personal email solutions?"
+url: null
+body: """
I have a unique name, think John Doe, and I’m hoping to create a unique and “professional” looking email account like johndoe@gmail.com or john@doe.com. Since my name is common, all reasonable permutations are taken. I was considering purchasing a domain with something unique, then making personal family email accounts for john@mydoe.com jane@mydoe.com etc.\n
\n
Consider that I’m starting from scratch (I am). Is there a preferred domain registrar, are GoDaddy or NameCheap good enough? Are there prebuilt services I can just point my domain to or do I need to spin up a VPS and install my own services? Are there concerns tying my accounts to a service that might go under or are some “too big to fail”?\n
\n
I can expand what hangs off the domain later, but for now I just need a way to make my own email addresses and use them with the relative ease of Gmail or others. Thanks in advance!!
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 96
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1723325014 {#2102
date: 2024-08-10 23:23:34.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2121 …}
+votes: Doctrine\ORM\PersistentCollection {#2114 …}
+reports: Doctrine\ORM\PersistentCollection {#2099 …}
+favourites: Doctrine\ORM\PersistentCollection {#2261 …}
+notifications: Doctrine\ORM\PersistentCollection {#2220 …}
+badges: Doctrine\ORM\PersistentCollection {#2290 …}
+children: [
App\Entity\EntryComment {#2067
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2071 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2049
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2069 …}
+votes: Doctrine\ORM\PersistentCollection {#2068 …}
+reports: Doctrine\ORM\PersistentCollection {#2137 …}
+favourites: Doctrine\ORM\PersistentCollection {#2135 …}
+notifications: Doctrine\ORM\PersistentCollection {#2159 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2070
date: 2024-01-14 18:39:17.0 +01:00
}
+"title": 308494
}
]
-id: 28340
-titleTs: "'email':6 'host':3 'person':5 'self':2 'self-host':1 'solut':7"
-bodyTs: "'account':21,50,106 'address':143 'advanc':157 'big':118 'common':30 'concern':103 'consid':38,55 'creat':14 'doe':8 'domain':41,68,85,128 'eas':150 'email':20,49,142 'enough':75 'etc':54 'expand':123 'fail':120 'famili':48 'gmail':152 'go':112 'godaddi':71 'good':74 'hang':125 'hope':12 'instal':97 'jane@mydoe.com':53 'john':7 'john@doe.com':25 'john@mydoe.com':52 'johndoe@gmail.com':23 'later':129 'like':22 'look':19 'm':11,58 'make':46,139 'might':111 'name':5,28 'namecheap':73 'need':90,135 'other':154 'permut':33 'person':47 'point':83 'prebuilt':78 'prefer':67 'profession':18 'purchas':39 'reason':32 'registrar':69 'relat':149 'scratch':61 'servic':79,100,109 'sinc':26 'someth':43 'spin':92 'start':59 'taken':35 'thank':155 'think':6 'tie':104 'uniqu':4,16,44 'use':145 'vps':95 'way':137"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704885343
+visibility: "visible "
+apId: "https://lemmy.world/post/10490604"
+editedAt: null
+createdAt: DateTimeImmutable @1704798943 {#2113
date: 2024-01-09 12:15:43.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
14 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2067
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2071
+user: Proxies\__CG__\App\Entity\User {#2115 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Self-hosted-or-personal-email-solutions"
+title: "Self-hosted or personal email solutions?"
+url: null
+body: """
I have a unique name, think John Doe, and I’m hoping to create a unique and “professional” looking email account like johndoe@gmail.com or john@doe.com. Since my name is common, all reasonable permutations are taken. I was considering purchasing a domain with something unique, then making personal family email accounts for john@mydoe.com jane@mydoe.com etc.\n
\n
Consider that I’m starting from scratch (I am). Is there a preferred domain registrar, are GoDaddy or NameCheap good enough? Are there prebuilt services I can just point my domain to or do I need to spin up a VPS and install my own services? Are there concerns tying my accounts to a service that might go under or are some “too big to fail”?\n
\n
I can expand what hangs off the domain later, but for now I just need a way to make my own email addresses and use them with the relative ease of Gmail or others. Thanks in advance!!
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 96
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1723325014 {#2102
date: 2024-08-10 23:23:34.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2121 …}
+votes: Doctrine\ORM\PersistentCollection {#2114 …}
+reports: Doctrine\ORM\PersistentCollection {#2099 …}
+favourites: Doctrine\ORM\PersistentCollection {#2261 …}
+notifications: Doctrine\ORM\PersistentCollection {#2220 …}
+badges: Doctrine\ORM\PersistentCollection {#2290 …}
+children: [
App\Entity\EntryComment {#2067}
]
-id: 28340
-titleTs: "'email':6 'host':3 'person':5 'self':2 'self-host':1 'solut':7"
-bodyTs: "'account':21,50,106 'address':143 'advanc':157 'big':118 'common':30 'concern':103 'consid':38,55 'creat':14 'doe':8 'domain':41,68,85,128 'eas':150 'email':20,49,142 'enough':75 'etc':54 'expand':123 'fail':120 'famili':48 'gmail':152 'go':112 'godaddi':71 'good':74 'hang':125 'hope':12 'instal':97 'jane@mydoe.com':53 'john':7 'john@doe.com':25 'john@mydoe.com':52 'johndoe@gmail.com':23 'later':129 'like':22 'look':19 'm':11,58 'make':46,139 'might':111 'name':5,28 'namecheap':73 'need':90,135 'other':154 'permut':33 'person':47 'point':83 'prebuilt':78 'prefer':67 'profession':18 'purchas':39 'reason':32 'registrar':69 'relat':149 'scratch':61 'servic':79,100,109 'sinc':26 'someth':43 'spin':92 'start':59 'taken':35 'thank':155 'think':6 'tie':104 'uniqu':4,16,44 'use':145 'vps':95 'way':137"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704885343
+visibility: "visible "
+apId: "https://lemmy.world/post/10490604"
+editedAt: null
+createdAt: DateTimeImmutable @1704798943 {#2113
date: 2024-01-09 12:15:43.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2049
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2069 …}
+votes: Doctrine\ORM\PersistentCollection {#2068 …}
+reports: Doctrine\ORM\PersistentCollection {#2137 …}
+favourites: Doctrine\ORM\PersistentCollection {#2135 …}
+notifications: Doctrine\ORM\PersistentCollection {#2159 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2070
date: 2024-01-14 18:39:17.0 +01:00
}
+"title": 308494
} |
|
Show voter details
|
15 |
DENIED
|
edit
|
App\Entity\EntryComment {#2067
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2071
+user: Proxies\__CG__\App\Entity\User {#2115 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Self-hosted-or-personal-email-solutions"
+title: "Self-hosted or personal email solutions?"
+url: null
+body: """
I have a unique name, think John Doe, and I’m hoping to create a unique and “professional” looking email account like johndoe@gmail.com or john@doe.com. Since my name is common, all reasonable permutations are taken. I was considering purchasing a domain with something unique, then making personal family email accounts for john@mydoe.com jane@mydoe.com etc.\n
\n
Consider that I’m starting from scratch (I am). Is there a preferred domain registrar, are GoDaddy or NameCheap good enough? Are there prebuilt services I can just point my domain to or do I need to spin up a VPS and install my own services? Are there concerns tying my accounts to a service that might go under or are some “too big to fail”?\n
\n
I can expand what hangs off the domain later, but for now I just need a way to make my own email addresses and use them with the relative ease of Gmail or others. Thanks in advance!!
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 96
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1723325014 {#2102
date: 2024-08-10 23:23:34.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2121 …}
+votes: Doctrine\ORM\PersistentCollection {#2114 …}
+reports: Doctrine\ORM\PersistentCollection {#2099 …}
+favourites: Doctrine\ORM\PersistentCollection {#2261 …}
+notifications: Doctrine\ORM\PersistentCollection {#2220 …}
+badges: Doctrine\ORM\PersistentCollection {#2290 …}
+children: [
App\Entity\EntryComment {#2067}
]
-id: 28340
-titleTs: "'email':6 'host':3 'person':5 'self':2 'self-host':1 'solut':7"
-bodyTs: "'account':21,50,106 'address':143 'advanc':157 'big':118 'common':30 'concern':103 'consid':38,55 'creat':14 'doe':8 'domain':41,68,85,128 'eas':150 'email':20,49,142 'enough':75 'etc':54 'expand':123 'fail':120 'famili':48 'gmail':152 'go':112 'godaddi':71 'good':74 'hang':125 'hope':12 'instal':97 'jane@mydoe.com':53 'john':7 'john@doe.com':25 'john@mydoe.com':52 'johndoe@gmail.com':23 'later':129 'like':22 'look':19 'm':11,58 'make':46,139 'might':111 'name':5,28 'namecheap':73 'need':90,135 'other':154 'permut':33 'person':47 'point':83 'prebuilt':78 'prefer':67 'profession':18 'purchas':39 'reason':32 'registrar':69 'relat':149 'scratch':61 'servic':79,100,109 'sinc':26 'someth':43 'spin':92 'start':59 'taken':35 'thank':155 'think':6 'tie':104 'uniqu':4,16,44 'use':145 'vps':95 'way':137"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704885343
+visibility: "visible "
+apId: "https://lemmy.world/post/10490604"
+editedAt: null
+createdAt: DateTimeImmutable @1704798943 {#2113
date: 2024-01-09 12:15:43.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2049
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2069 …}
+votes: Doctrine\ORM\PersistentCollection {#2068 …}
+reports: Doctrine\ORM\PersistentCollection {#2137 …}
+favourites: Doctrine\ORM\PersistentCollection {#2135 …}
+notifications: Doctrine\ORM\PersistentCollection {#2159 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2070
date: 2024-01-14 18:39:17.0 +01:00
}
+"title": 308494
} |
|
Show voter details
|
16 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2067
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2071
+user: Proxies\__CG__\App\Entity\User {#2115 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Self-hosted-or-personal-email-solutions"
+title: "Self-hosted or personal email solutions?"
+url: null
+body: """
I have a unique name, think John Doe, and I’m hoping to create a unique and “professional” looking email account like johndoe@gmail.com or john@doe.com. Since my name is common, all reasonable permutations are taken. I was considering purchasing a domain with something unique, then making personal family email accounts for john@mydoe.com jane@mydoe.com etc.\n
\n
Consider that I’m starting from scratch (I am). Is there a preferred domain registrar, are GoDaddy or NameCheap good enough? Are there prebuilt services I can just point my domain to or do I need to spin up a VPS and install my own services? Are there concerns tying my accounts to a service that might go under or are some “too big to fail”?\n
\n
I can expand what hangs off the domain later, but for now I just need a way to make my own email addresses and use them with the relative ease of Gmail or others. Thanks in advance!!
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 96
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1723325014 {#2102
date: 2024-08-10 23:23:34.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2121 …}
+votes: Doctrine\ORM\PersistentCollection {#2114 …}
+reports: Doctrine\ORM\PersistentCollection {#2099 …}
+favourites: Doctrine\ORM\PersistentCollection {#2261 …}
+notifications: Doctrine\ORM\PersistentCollection {#2220 …}
+badges: Doctrine\ORM\PersistentCollection {#2290 …}
+children: [
App\Entity\EntryComment {#2067}
]
-id: 28340
-titleTs: "'email':6 'host':3 'person':5 'self':2 'self-host':1 'solut':7"
-bodyTs: "'account':21,50,106 'address':143 'advanc':157 'big':118 'common':30 'concern':103 'consid':38,55 'creat':14 'doe':8 'domain':41,68,85,128 'eas':150 'email':20,49,142 'enough':75 'etc':54 'expand':123 'fail':120 'famili':48 'gmail':152 'go':112 'godaddi':71 'good':74 'hang':125 'hope':12 'instal':97 'jane@mydoe.com':53 'john':7 'john@doe.com':25 'john@mydoe.com':52 'johndoe@gmail.com':23 'later':129 'like':22 'look':19 'm':11,58 'make':46,139 'might':111 'name':5,28 'namecheap':73 'need':90,135 'other':154 'permut':33 'person':47 'point':83 'prebuilt':78 'prefer':67 'profession':18 'purchas':39 'reason':32 'registrar':69 'relat':149 'scratch':61 'servic':79,100,109 'sinc':26 'someth':43 'spin':92 'start':59 'taken':35 'thank':155 'think':6 'tie':104 'uniqu':4,16,44 'use':145 'vps':95 'way':137"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704885343
+visibility: "visible "
+apId: "https://lemmy.world/post/10490604"
+editedAt: null
+createdAt: DateTimeImmutable @1704798943 {#2113
date: 2024-01-09 12:15:43.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2066 …}
+body: "If you get your domain from OVH, you get one single mailbox (be it with a lot of aliases, like a different email-address for every service/website you use) for free."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705253957 {#2049
date: 2024-01-14 18:39:17.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@avguser@lemmy.world"
"@ChrislyBear@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2074 …}
+nested: Doctrine\ORM\PersistentCollection {#2069 …}
+votes: Doctrine\ORM\PersistentCollection {#2068 …}
+reports: Doctrine\ORM\PersistentCollection {#2137 …}
+favourites: Doctrine\ORM\PersistentCollection {#2135 …}
+notifications: Doctrine\ORM\PersistentCollection {#2159 …}
-id: 308494
-bodyTs: "'address':25 'alias':19 'differ':22 'domain':5 'email':24 'email-address':23 'everi':27 'free':32 'get':3,9 'like':20 'lot':17 'mailbox':12 'one':10 'ovh':7 'service/website':28 'singl':11 'use':30"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5692822"
+editedAt: null
+createdAt: DateTimeImmutable @1705253957 {#2070
date: 2024-01-14 18:39:17.0 +01:00
}
+"title": 308494
} |
|
Show voter details
|
17 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
18 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#2053
+user: Proxies\__CG__\App\Entity\User {#2221 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Joplin-alternative-needed"
+title: "Joplin alternative needed"
+url: null
+body: """
Hi guys! I think I’m over Joplin. Don’t get me wrong, it’s simple, it works, but… why is it Postgres db…. I have the server on a small box with like 250 GB of space and backing it up with kopia to Backblaze with free 10 GB, so I’m a bit storage cautious.\n
\n
With each snapshot, it seems like a good chunk of the database changes, even when I don’t use Joplin that day. That results in kopia backing up those changed files, and backups keep growing. Right now the Joplin database is like 200Mb, BUT when I export the notes from the app… all of them weigh 2Mb… including images. Yes there is versioning of notes, but they shouldn’t be that big after one-two months lol.\n
\n
I know I know, I’m being a bit weird about it, but I’m getting daily notifications about backups and I see how they grow each day.\n
\n
Anyway, do you have any alternatives that have an app on iOS and on Linux? Or should I just use Apple Notes in the browser? Thanks\n
\n
EDIT: The answer was easier than I thought. Just don’t back it up, it’s synced which means each device has a copy of it anyway so there is not really need for it, thanks @vvv@programming.dev !
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 54
+favouriteCount: 68
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722654717 {#2295
date: 2024-08-03 05:11:57.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: [
"@vvv@programming.dev"
]
+comments: Doctrine\ORM\PersistentCollection {#2278 …}
+votes: Doctrine\ORM\PersistentCollection {#2279 …}
+reports: Doctrine\ORM\PersistentCollection {#2219 …}
+favourites: Doctrine\ORM\PersistentCollection {#2196 …}
+notifications: Doctrine\ORM\PersistentCollection {#2194 …}
+badges: Doctrine\ORM\PersistentCollection {#2193 …}
+children: [
App\Entity\EntryComment {#2191
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2053 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2328
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2058 …}
+nested: Doctrine\ORM\PersistentCollection {#2052 …}
+votes: Doctrine\ORM\PersistentCollection {#2057 …}
+reports: Doctrine\ORM\PersistentCollection {#2047 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2051 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2326
date: 2024-01-09 12:49:28.0 +01:00
}
+"title": 293259
}
]
-id: 28147
-titleTs: "'altern':2 'joplin':1 'need':3"
-bodyTs: "'10':49 '200mb':100 '250':35 '2mb':114 'altern':169 'answer':192 'anyway':164,216 'app':109,173 'appl':184 'back':40,84,201 'backblaz':46 'backup':90,155 'big':129 'bit':55,144 'box':32 'browser':188 'cautious':57 'chang':70,87 'chunk':66 'copi':213 'daili':152 'databas':69,97 'day':79,163 'db':24 'devic':210 'easier':194 'edit':190 'even':71 'export':104 'file':88 'free':48 'gb':36,50 'get':11,151 'good':65 'grow':92,161 'guy':2 'hi':1 'imag':116 'includ':115 'io':175 'joplin':8,77,96 'keep':91 'know':137,139 'kopia':44,83 'like':34,63,99 'linux':178 'lol':135 'm':6,53,141,150 'mean':208 'month':134 'need':222 'note':106,122,185 'notif':153 'one':132 'one-two':131 'postgr':23 'realli':221 'result':81 'right':93 'see':158 'seem':62 'server':28 'shouldn':125 'simpl':16 'small':31 'snapshot':60 'space':38 'storag':56 'sync':206 'thank':189,225 'think':4 'thought':197 'two':133 'use':76,183 'version':120 'vvv@programming.dev':226 'weigh':113 'weird':145 'work':18 'wrong':13 'yes':117"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704830500
+visibility: "visible "
+apId: "https://lemmy.zip/post/8098430"
+editedAt: DateTimeImmutable @1719215272 {#2117
date: 2024-06-24 09:47:52.0 +02:00
}
+createdAt: DateTimeImmutable @1704744100 {#2044
date: 2024-01-08 21:01:40.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
19 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#2053
+user: Proxies\__CG__\App\Entity\User {#2221 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Joplin-alternative-needed"
+title: "Joplin alternative needed"
+url: null
+body: """
Hi guys! I think I’m over Joplin. Don’t get me wrong, it’s simple, it works, but… why is it Postgres db…. I have the server on a small box with like 250 GB of space and backing it up with kopia to Backblaze with free 10 GB, so I’m a bit storage cautious.\n
\n
With each snapshot, it seems like a good chunk of the database changes, even when I don’t use Joplin that day. That results in kopia backing up those changed files, and backups keep growing. Right now the Joplin database is like 200Mb, BUT when I export the notes from the app… all of them weigh 2Mb… including images. Yes there is versioning of notes, but they shouldn’t be that big after one-two months lol.\n
\n
I know I know, I’m being a bit weird about it, but I’m getting daily notifications about backups and I see how they grow each day.\n
\n
Anyway, do you have any alternatives that have an app on iOS and on Linux? Or should I just use Apple Notes in the browser? Thanks\n
\n
EDIT: The answer was easier than I thought. Just don’t back it up, it’s synced which means each device has a copy of it anyway so there is not really need for it, thanks @vvv@programming.dev !
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 54
+favouriteCount: 68
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722654717 {#2295
date: 2024-08-03 05:11:57.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: [
"@vvv@programming.dev"
]
+comments: Doctrine\ORM\PersistentCollection {#2278 …}
+votes: Doctrine\ORM\PersistentCollection {#2279 …}
+reports: Doctrine\ORM\PersistentCollection {#2219 …}
+favourites: Doctrine\ORM\PersistentCollection {#2196 …}
+notifications: Doctrine\ORM\PersistentCollection {#2194 …}
+badges: Doctrine\ORM\PersistentCollection {#2193 …}
+children: [
App\Entity\EntryComment {#2191
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2053 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2328
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2058 …}
+nested: Doctrine\ORM\PersistentCollection {#2052 …}
+votes: Doctrine\ORM\PersistentCollection {#2057 …}
+reports: Doctrine\ORM\PersistentCollection {#2047 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2051 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2326
date: 2024-01-09 12:49:28.0 +01:00
}
+"title": 293259
}
]
-id: 28147
-titleTs: "'altern':2 'joplin':1 'need':3"
-bodyTs: "'10':49 '200mb':100 '250':35 '2mb':114 'altern':169 'answer':192 'anyway':164,216 'app':109,173 'appl':184 'back':40,84,201 'backblaz':46 'backup':90,155 'big':129 'bit':55,144 'box':32 'browser':188 'cautious':57 'chang':70,87 'chunk':66 'copi':213 'daili':152 'databas':69,97 'day':79,163 'db':24 'devic':210 'easier':194 'edit':190 'even':71 'export':104 'file':88 'free':48 'gb':36,50 'get':11,151 'good':65 'grow':92,161 'guy':2 'hi':1 'imag':116 'includ':115 'io':175 'joplin':8,77,96 'keep':91 'know':137,139 'kopia':44,83 'like':34,63,99 'linux':178 'lol':135 'm':6,53,141,150 'mean':208 'month':134 'need':222 'note':106,122,185 'notif':153 'one':132 'one-two':131 'postgr':23 'realli':221 'result':81 'right':93 'see':158 'seem':62 'server':28 'shouldn':125 'simpl':16 'small':31 'snapshot':60 'space':38 'storag':56 'sync':206 'thank':189,225 'think':4 'thought':197 'two':133 'use':76,183 'version':120 'vvv@programming.dev':226 'weigh':113 'weird':145 'work':18 'wrong':13 'yes':117"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704830500
+visibility: "visible "
+apId: "https://lemmy.zip/post/8098430"
+editedAt: DateTimeImmutable @1719215272 {#2117
date: 2024-06-24 09:47:52.0 +02:00
}
+createdAt: DateTimeImmutable @1704744100 {#2044
date: 2024-01-08 21:01:40.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
20 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#2053
+user: Proxies\__CG__\App\Entity\User {#2221 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Joplin-alternative-needed"
+title: "Joplin alternative needed"
+url: null
+body: """
Hi guys! I think I’m over Joplin. Don’t get me wrong, it’s simple, it works, but… why is it Postgres db…. I have the server on a small box with like 250 GB of space and backing it up with kopia to Backblaze with free 10 GB, so I’m a bit storage cautious.\n
\n
With each snapshot, it seems like a good chunk of the database changes, even when I don’t use Joplin that day. That results in kopia backing up those changed files, and backups keep growing. Right now the Joplin database is like 200Mb, BUT when I export the notes from the app… all of them weigh 2Mb… including images. Yes there is versioning of notes, but they shouldn’t be that big after one-two months lol.\n
\n
I know I know, I’m being a bit weird about it, but I’m getting daily notifications about backups and I see how they grow each day.\n
\n
Anyway, do you have any alternatives that have an app on iOS and on Linux? Or should I just use Apple Notes in the browser? Thanks\n
\n
EDIT: The answer was easier than I thought. Just don’t back it up, it’s synced which means each device has a copy of it anyway so there is not really need for it, thanks @vvv@programming.dev !
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 54
+favouriteCount: 68
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722654717 {#2295
date: 2024-08-03 05:11:57.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: [
"@vvv@programming.dev"
]
+comments: Doctrine\ORM\PersistentCollection {#2278 …}
+votes: Doctrine\ORM\PersistentCollection {#2279 …}
+reports: Doctrine\ORM\PersistentCollection {#2219 …}
+favourites: Doctrine\ORM\PersistentCollection {#2196 …}
+notifications: Doctrine\ORM\PersistentCollection {#2194 …}
+badges: Doctrine\ORM\PersistentCollection {#2193 …}
+children: [
App\Entity\EntryComment {#2191
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2053 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2328
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2058 …}
+nested: Doctrine\ORM\PersistentCollection {#2052 …}
+votes: Doctrine\ORM\PersistentCollection {#2057 …}
+reports: Doctrine\ORM\PersistentCollection {#2047 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2051 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2326
date: 2024-01-09 12:49:28.0 +01:00
}
+"title": 293259
}
]
-id: 28147
-titleTs: "'altern':2 'joplin':1 'need':3"
-bodyTs: "'10':49 '200mb':100 '250':35 '2mb':114 'altern':169 'answer':192 'anyway':164,216 'app':109,173 'appl':184 'back':40,84,201 'backblaz':46 'backup':90,155 'big':129 'bit':55,144 'box':32 'browser':188 'cautious':57 'chang':70,87 'chunk':66 'copi':213 'daili':152 'databas':69,97 'day':79,163 'db':24 'devic':210 'easier':194 'edit':190 'even':71 'export':104 'file':88 'free':48 'gb':36,50 'get':11,151 'good':65 'grow':92,161 'guy':2 'hi':1 'imag':116 'includ':115 'io':175 'joplin':8,77,96 'keep':91 'know':137,139 'kopia':44,83 'like':34,63,99 'linux':178 'lol':135 'm':6,53,141,150 'mean':208 'month':134 'need':222 'note':106,122,185 'notif':153 'one':132 'one-two':131 'postgr':23 'realli':221 'result':81 'right':93 'see':158 'seem':62 'server':28 'shouldn':125 'simpl':16 'small':31 'snapshot':60 'space':38 'storag':56 'sync':206 'thank':189,225 'think':4 'thought':197 'two':133 'use':76,183 'version':120 'vvv@programming.dev':226 'weigh':113 'weird':145 'work':18 'wrong':13 'yes':117"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704830500
+visibility: "visible "
+apId: "https://lemmy.zip/post/8098430"
+editedAt: DateTimeImmutable @1719215272 {#2117
date: 2024-06-24 09:47:52.0 +02:00
}
+createdAt: DateTimeImmutable @1704744100 {#2044
date: 2024-01-08 21:01:40.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
21 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
22 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2191
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2053
+user: Proxies\__CG__\App\Entity\User {#2221 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Joplin-alternative-needed"
+title: "Joplin alternative needed"
+url: null
+body: """
Hi guys! I think I’m over Joplin. Don’t get me wrong, it’s simple, it works, but… why is it Postgres db…. I have the server on a small box with like 250 GB of space and backing it up with kopia to Backblaze with free 10 GB, so I’m a bit storage cautious.\n
\n
With each snapshot, it seems like a good chunk of the database changes, even when I don’t use Joplin that day. That results in kopia backing up those changed files, and backups keep growing. Right now the Joplin database is like 200Mb, BUT when I export the notes from the app… all of them weigh 2Mb… including images. Yes there is versioning of notes, but they shouldn’t be that big after one-two months lol.\n
\n
I know I know, I’m being a bit weird about it, but I’m getting daily notifications about backups and I see how they grow each day.\n
\n
Anyway, do you have any alternatives that have an app on iOS and on Linux? Or should I just use Apple Notes in the browser? Thanks\n
\n
EDIT: The answer was easier than I thought. Just don’t back it up, it’s synced which means each device has a copy of it anyway so there is not really need for it, thanks @vvv@programming.dev !
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 54
+favouriteCount: 68
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722654717 {#2295
date: 2024-08-03 05:11:57.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: [
"@vvv@programming.dev"
]
+comments: Doctrine\ORM\PersistentCollection {#2278 …}
+votes: Doctrine\ORM\PersistentCollection {#2279 …}
+reports: Doctrine\ORM\PersistentCollection {#2219 …}
+favourites: Doctrine\ORM\PersistentCollection {#2196 …}
+notifications: Doctrine\ORM\PersistentCollection {#2194 …}
+badges: Doctrine\ORM\PersistentCollection {#2193 …}
+children: [
App\Entity\EntryComment {#2191}
]
-id: 28147
-titleTs: "'altern':2 'joplin':1 'need':3"
-bodyTs: "'10':49 '200mb':100 '250':35 '2mb':114 'altern':169 'answer':192 'anyway':164,216 'app':109,173 'appl':184 'back':40,84,201 'backblaz':46 'backup':90,155 'big':129 'bit':55,144 'box':32 'browser':188 'cautious':57 'chang':70,87 'chunk':66 'copi':213 'daili':152 'databas':69,97 'day':79,163 'db':24 'devic':210 'easier':194 'edit':190 'even':71 'export':104 'file':88 'free':48 'gb':36,50 'get':11,151 'good':65 'grow':92,161 'guy':2 'hi':1 'imag':116 'includ':115 'io':175 'joplin':8,77,96 'keep':91 'know':137,139 'kopia':44,83 'like':34,63,99 'linux':178 'lol':135 'm':6,53,141,150 'mean':208 'month':134 'need':222 'note':106,122,185 'notif':153 'one':132 'one-two':131 'postgr':23 'realli':221 'result':81 'right':93 'see':158 'seem':62 'server':28 'shouldn':125 'simpl':16 'small':31 'snapshot':60 'space':38 'storag':56 'sync':206 'thank':189,225 'think':4 'thought':197 'two':133 'use':76,183 'version':120 'vvv@programming.dev':226 'weigh':113 'weird':145 'work':18 'wrong':13 'yes':117"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704830500
+visibility: "visible "
+apId: "https://lemmy.zip/post/8098430"
+editedAt: DateTimeImmutable @1719215272 {#2117
date: 2024-06-24 09:47:52.0 +02:00
}
+createdAt: DateTimeImmutable @1704744100 {#2044
date: 2024-01-08 21:01:40.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2328
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2058 …}
+nested: Doctrine\ORM\PersistentCollection {#2052 …}
+votes: Doctrine\ORM\PersistentCollection {#2057 …}
+reports: Doctrine\ORM\PersistentCollection {#2047 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2051 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2326
date: 2024-01-09 12:49:28.0 +01:00
}
+"title": 293259
} |
|
Show voter details
|
23 |
DENIED
|
edit
|
App\Entity\EntryComment {#2191
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2053
+user: Proxies\__CG__\App\Entity\User {#2221 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Joplin-alternative-needed"
+title: "Joplin alternative needed"
+url: null
+body: """
Hi guys! I think I’m over Joplin. Don’t get me wrong, it’s simple, it works, but… why is it Postgres db…. I have the server on a small box with like 250 GB of space and backing it up with kopia to Backblaze with free 10 GB, so I’m a bit storage cautious.\n
\n
With each snapshot, it seems like a good chunk of the database changes, even when I don’t use Joplin that day. That results in kopia backing up those changed files, and backups keep growing. Right now the Joplin database is like 200Mb, BUT when I export the notes from the app… all of them weigh 2Mb… including images. Yes there is versioning of notes, but they shouldn’t be that big after one-two months lol.\n
\n
I know I know, I’m being a bit weird about it, but I’m getting daily notifications about backups and I see how they grow each day.\n
\n
Anyway, do you have any alternatives that have an app on iOS and on Linux? Or should I just use Apple Notes in the browser? Thanks\n
\n
EDIT: The answer was easier than I thought. Just don’t back it up, it’s synced which means each device has a copy of it anyway so there is not really need for it, thanks @vvv@programming.dev !
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 54
+favouriteCount: 68
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722654717 {#2295
date: 2024-08-03 05:11:57.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: [
"@vvv@programming.dev"
]
+comments: Doctrine\ORM\PersistentCollection {#2278 …}
+votes: Doctrine\ORM\PersistentCollection {#2279 …}
+reports: Doctrine\ORM\PersistentCollection {#2219 …}
+favourites: Doctrine\ORM\PersistentCollection {#2196 …}
+notifications: Doctrine\ORM\PersistentCollection {#2194 …}
+badges: Doctrine\ORM\PersistentCollection {#2193 …}
+children: [
App\Entity\EntryComment {#2191}
]
-id: 28147
-titleTs: "'altern':2 'joplin':1 'need':3"
-bodyTs: "'10':49 '200mb':100 '250':35 '2mb':114 'altern':169 'answer':192 'anyway':164,216 'app':109,173 'appl':184 'back':40,84,201 'backblaz':46 'backup':90,155 'big':129 'bit':55,144 'box':32 'browser':188 'cautious':57 'chang':70,87 'chunk':66 'copi':213 'daili':152 'databas':69,97 'day':79,163 'db':24 'devic':210 'easier':194 'edit':190 'even':71 'export':104 'file':88 'free':48 'gb':36,50 'get':11,151 'good':65 'grow':92,161 'guy':2 'hi':1 'imag':116 'includ':115 'io':175 'joplin':8,77,96 'keep':91 'know':137,139 'kopia':44,83 'like':34,63,99 'linux':178 'lol':135 'm':6,53,141,150 'mean':208 'month':134 'need':222 'note':106,122,185 'notif':153 'one':132 'one-two':131 'postgr':23 'realli':221 'result':81 'right':93 'see':158 'seem':62 'server':28 'shouldn':125 'simpl':16 'small':31 'snapshot':60 'space':38 'storag':56 'sync':206 'thank':189,225 'think':4 'thought':197 'two':133 'use':76,183 'version':120 'vvv@programming.dev':226 'weigh':113 'weird':145 'work':18 'wrong':13 'yes':117"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704830500
+visibility: "visible "
+apId: "https://lemmy.zip/post/8098430"
+editedAt: DateTimeImmutable @1719215272 {#2117
date: 2024-06-24 09:47:52.0 +02:00
}
+createdAt: DateTimeImmutable @1704744100 {#2044
date: 2024-01-08 21:01:40.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2328
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2058 …}
+nested: Doctrine\ORM\PersistentCollection {#2052 …}
+votes: Doctrine\ORM\PersistentCollection {#2057 …}
+reports: Doctrine\ORM\PersistentCollection {#2047 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2051 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2326
date: 2024-01-09 12:49:28.0 +01:00
}
+"title": 293259
} |
|
Show voter details
|
24 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2191
+user: App\Entity\User {#264 …}
+entry: Proxies\__CG__\App\Entity\Entry {#2053
+user: Proxies\__CG__\App\Entity\User {#2221 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "Joplin-alternative-needed"
+title: "Joplin alternative needed"
+url: null
+body: """
Hi guys! I think I’m over Joplin. Don’t get me wrong, it’s simple, it works, but… why is it Postgres db…. I have the server on a small box with like 250 GB of space and backing it up with kopia to Backblaze with free 10 GB, so I’m a bit storage cautious.\n
\n
With each snapshot, it seems like a good chunk of the database changes, even when I don’t use Joplin that day. That results in kopia backing up those changed files, and backups keep growing. Right now the Joplin database is like 200Mb, BUT when I export the notes from the app… all of them weigh 2Mb… including images. Yes there is versioning of notes, but they shouldn’t be that big after one-two months lol.\n
\n
I know I know, I’m being a bit weird about it, but I’m getting daily notifications about backups and I see how they grow each day.\n
\n
Anyway, do you have any alternatives that have an app on iOS and on Linux? Or should I just use Apple Notes in the browser? Thanks\n
\n
EDIT: The answer was easier than I thought. Just don’t back it up, it’s synced which means each device has a copy of it anyway so there is not really need for it, thanks @vvv@programming.dev !
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 54
+favouriteCount: 68
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1722654717 {#2295
date: 2024-08-03 05:11:57.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: [
"@vvv@programming.dev"
]
+comments: Doctrine\ORM\PersistentCollection {#2278 …}
+votes: Doctrine\ORM\PersistentCollection {#2279 …}
+reports: Doctrine\ORM\PersistentCollection {#2219 …}
+favourites: Doctrine\ORM\PersistentCollection {#2196 …}
+notifications: Doctrine\ORM\PersistentCollection {#2194 …}
+badges: Doctrine\ORM\PersistentCollection {#2193 …}
+children: [
App\Entity\EntryComment {#2191}
]
-id: 28147
-titleTs: "'altern':2 'joplin':1 'need':3"
-bodyTs: "'10':49 '200mb':100 '250':35 '2mb':114 'altern':169 'answer':192 'anyway':164,216 'app':109,173 'appl':184 'back':40,84,201 'backblaz':46 'backup':90,155 'big':129 'bit':55,144 'box':32 'browser':188 'cautious':57 'chang':70,87 'chunk':66 'copi':213 'daili':152 'databas':69,97 'day':79,163 'db':24 'devic':210 'easier':194 'edit':190 'even':71 'export':104 'file':88 'free':48 'gb':36,50 'get':11,151 'good':65 'grow':92,161 'guy':2 'hi':1 'imag':116 'includ':115 'io':175 'joplin':8,77,96 'keep':91 'know':137,139 'kopia':44,83 'like':34,63,99 'linux':178 'lol':135 'm':6,53,141,150 'mean':208 'month':134 'need':222 'note':106,122,185 'notif':153 'one':132 'one-two':131 'postgr':23 'realli':221 'result':81 'right':93 'see':158 'seem':62 'server':28 'shouldn':125 'simpl':16 'small':31 'snapshot':60 'space':38 'storag':56 'sync':206 'thank':189,225 'think':4 'thought':197 'two':133 'use':76,183 'version':120 'vvv@programming.dev':226 'weigh':113 'weird':145 'work':18 'wrong':13 'yes':117"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704830500
+visibility: "visible "
+apId: "https://lemmy.zip/post/8098430"
+editedAt: DateTimeImmutable @1719215272 {#2117
date: 2024-06-24 09:47:52.0 +02:00
}
+createdAt: DateTimeImmutable @1704744100 {#2044
date: 2024-01-08 21:01:40.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: "What is your ‘deleted files’ policy? How long do you keep them? I had a similar issue but then found out that the nextcloud cron-process wasn’t running so files in the ‘deleted files’ folder where never really deleted."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704800968 {#2328
date: 2024-01-09 12:49:28.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@vvv@programming.dev"
"@jaykay@lemmy.zip"
]
+children: Doctrine\ORM\PersistentCollection {#2058 …}
+nested: Doctrine\ORM\PersistentCollection {#2052 …}
+votes: Doctrine\ORM\PersistentCollection {#2057 …}
+reports: Doctrine\ORM\PersistentCollection {#2047 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2051 …}
-id: 293259
-bodyTs: "'cron':26 'cron-process':25 'delet':4,35,41 'file':5,32,36 'folder':37 'found':20 'issu':17 'keep':11 'long':8 'never':39 'nextcloud':24 'polici':6 'process':27 'realli':40 'run':30 'similar':16 'wasn':28"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5527140"
+editedAt: null
+createdAt: DateTimeImmutable @1704800968 {#2326
date: 2024-01-09 12:49:28.0 +01:00
}
+"title": 293259
} |
|
Show voter details
|
25 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
26 |
DENIED
|
moderate
|
App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
} |
|
Show voter details
|
27 |
DENIED
|
edit
|
App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
} |
|
Show voter details
|
28 |
DENIED
|
moderate
|
App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
} |
|
Show voter details
|
29 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
30 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
} |
|
Show voter details
|
31 |
DENIED
|
edit
|
App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
} |
|
Show voter details
|
32 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
} |
|
Show voter details
|
33 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
34 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
} |
|
Show voter details
|
35 |
DENIED
|
edit
|
App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
} |
|
Show voter details
|
36 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
} |
|
Show voter details
|
37 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
38 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
} |
|
Show voter details
|
39 |
DENIED
|
edit
|
App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
} |
|
Show voter details
|
40 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
} |
|
Show voter details
|
41 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
42 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
} |
|
Show voter details
|
43 |
DENIED
|
edit
|
App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
} |
|
Show voter details
|
44 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
} |
|
Show voter details
|
45 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
46 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
} |
|
Show voter details
|
47 |
DENIED
|
edit
|
App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
} |
|
Show voter details
|
48 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090}
0 => App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
} |
|
Show voter details
|
49 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
50 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
} |
|
Show voter details
|
51 |
DENIED
|
edit
|
App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
} |
|
Show voter details
|
52 |
DENIED
|
moderate
|
App\Entity\EntryComment {#2348
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: Proxies\__CG__\App\Entity\Image {#1556 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1558 …}
+slug: "what-if-your-cloud-provider-gets-hacked"
+title: "what if your cloud=provider gets hacked ?"
+url: "https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/"
+body: """
Hi all,\n
\n
As self-hosting is not just “home-hosting” I guess this post should also be on-topic here.\n
\n
Beginning of the year, bleeping-computers published an interesting post on the biggest cybersecurity stories of 2023.\n
\n
Item 13 is an interesing one. (see URL of this post). Summary in short A Danish cloud-provider gets hit by a ransomware attack, encrypting not only the clients data, but also the backups.\n
\n
For a user, this means that a senario where, not only your VM becomes unusable (virtual disk-storage is encrypted), but also the daily backups you made to the cloud-provider S3-storage is useless, might be not as far-fetches then what your think.\n
\n
So … conclussion ??? If you have VMs at a cloud-provider and do daily backups, it might be usefull to actually get your storage for these backups from a different provider then the one where your house your VMs.\n
\n
Anybody any ideas or remarks on this?\n
\n
(*) [bleepingcomputer.com/…/the-biggest-cybersecurity-…](https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 29
+favouriteCount: 96
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1721456735 {#1572
date: 2024-07-20 08:25:35.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1554 …}
+votes: Doctrine\ORM\PersistentCollection {#1613 …}
+reports: Doctrine\ORM\PersistentCollection {#1557 …}
+favourites: Doctrine\ORM\PersistentCollection {#1620 …}
+notifications: Doctrine\ORM\PersistentCollection {#1596 …}
+badges: Doctrine\ORM\PersistentCollection {#1702 …}
+children: [
5 => App\Entity\EntryComment {#2392
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2394 …}
+body: """
Well, the issue here is that your backup may be physically in a different location (which you can ask to host your S3 backup storage in a different datacenter then the VMs), if the servers themselfs on which the service (VMs or S3) is hosted is managed by the same technical entity, then a ransomware attack on that company can affect both services.\n
\n
So, get S3 storage for your backups from a completely different company?\n
\n
I just wonder to what degree this will impact the bandwidth-usage of your VM if -say- you do a complete backup of your every day to a host that will be comsidered as “of-premises”
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704631924 {#2369
date: 2024-01-07 13:52:04.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@originalucifer@moist.catsweat.com"
]
+children: Doctrine\ORM\PersistentCollection {#2395 …}
+nested: Doctrine\ORM\PersistentCollection {#1384 …}
+votes: Doctrine\ORM\PersistentCollection {#1383 …}
+reports: Doctrine\ORM\PersistentCollection {#1405 …}
+favourites: Doctrine\ORM\PersistentCollection {#1382 …}
+notifications: Doctrine\ORM\PersistentCollection {#1404 …}
-id: 288542
-bodyTs: "'affect':61 'ask':19 'attack':56 'backup':8,24,70,98 'bandwidth':87 'bandwidth-usag':86 'compani':59,75 'complet':73,97 'comsid':109 'datacent':29 'day':102 'degre':81 'differ':14,28,74 'entiti':52 'everi':101 'get':65 'host':21,45,105 'impact':84 'issu':3 'locat':15 'manag':47 'may':9 'of-premis':111 'physic':11 'premis':113 'ransomwar':55 's3':23,43,66 'say':93 'server':35 'servic':40,63 'storag':25,67 'technic':51 'themself':36 'usag':88 'vm':91 'vms':32,41 'well':1 'wonder':78"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482822"
+editedAt: null
+createdAt: DateTimeImmutable @1704631924 {#2387
date: 2024-01-07 13:52:04.0 +01:00
}
+"title": 288542
}
4 => App\Entity\EntryComment {#1403
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2019 …}
+body: "The issue is not cloud vs self-hosted. The question is “who has technical control over all the servers involved”. If you would home-host a server and have a backup of that a network of your friend, if your username / password pops up on a infostealer-website, you will be equaly in problem!"
+lang: "en"
+isAdult: false
+favouriteCount: 2
+score: 0
+lastActive: DateTime @1704632115 {#1361
date: 2024-01-07 13:55:15.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@SteefLem@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2023 …}
+nested: Doctrine\ORM\PersistentCollection {#2032 …}
+votes: Doctrine\ORM\PersistentCollection {#2024 …}
+reports: Doctrine\ORM\PersistentCollection {#2018 …}
+favourites: Doctrine\ORM\PersistentCollection {#2011 …}
+notifications: Doctrine\ORM\PersistentCollection {#2021 …}
-id: 288547
-bodyTs: "'backup':33 'cloud':5 'control':16 'equali':55 'friend':40 'home':26 'home-host':25 'host':9,27 'infosteal':50 'infostealer-websit':49 'involv':21 'issu':2 'network':37 'password':44 'pop':45 'problem':57 'question':11 'self':8 'self-host':7 'server':20,29 'technic':15 'usernam':43 'vs':6 'websit':51 'would':24"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482865"
+editedAt: null
+createdAt: DateTimeImmutable @1704632115 {#1362
date: 2024-01-07 13:55:15.0 +01:00
}
+"title": 288547
}
3 => App\Entity\EntryComment {#2020
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2013 …}
+body: "In this case, it is not you -as a customer- that gets hacked, but it was the cloud-company itself. The randomware-gang encrypted the disks on *server* level, which impacted all the customers on every server of the cloud-provider."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704632639 {#2029
date: 2024-01-07 14:03:59.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@Nouveau_Burnswick@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2027 …}
+nested: Doctrine\ORM\PersistentCollection {#2031 …}
+votes: Doctrine\ORM\PersistentCollection {#2037 …}
+reports: Doctrine\ORM\PersistentCollection {#2075 …}
+favourites: Doctrine\ORM\PersistentCollection {#2079 …}
+notifications: Doctrine\ORM\PersistentCollection {#2078 …}
-id: 288558
-bodyTs: "'case':3 'cloud':19,43 'cloud-compani':18 'cloud-provid':42 'compani':20 'custom':10,36 'disk':28 'encrypt':26 'everi':38 'gang':25 'get':12 'hack':13 'impact':33 'level':31 'provid':44 'randomwar':24 'randomware-gang':23 'server':30,39"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482952"
+editedAt: null
+createdAt: DateTimeImmutable @1704632639 {#2012
date: 2024-01-07 14:03:59.0 +01:00
}
+"title": 288558
}
2 => App\Entity\EntryComment {#2082
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2085 …}
+body: """
Yes. Fair point.\n
\n
On the other hand, most of the disaster senarios you mention are solved by geographic redundancy: set up your backup // DRS storage in a datacenter far away from the primary service. A scenario where all services,in all datacenters managed by a could-provider are impacted is probably new.\n
\n
It is something that, considering the current geopolical situation we are now it, -and that I assume will only become worse- that we should better keep in the back of our mind.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1704636460 {#2097
date: 2024-01-07 15:07:40.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@NAK@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2096 …}
+nested: Doctrine\ORM\PersistentCollection {#2081 …}
+votes: Doctrine\ORM\PersistentCollection {#2098 …}
+reports: Doctrine\ORM\PersistentCollection {#2080 …}
+favourites: Doctrine\ORM\PersistentCollection {#2089 …}
+notifications: Doctrine\ORM\PersistentCollection {#2095 …}
-id: 288684
-bodyTs: "'assum':70 'away':30 'back':82 'backup':23 'becom':73 'better':78 'consid':58 'could':47 'could-provid':46 'current':60 'datacent':28,42 'disast':11 'drs':24 'fair':2 'far':29 'geograph':18 'geopol':61 'hand':7 'impact':50 'keep':79 'manag':43 'mention':14 'mind':85 'new':53 'point':3 'primari':33 'probabl':52 'provid':48 'redund':19 'scenario':36 'senario':12 'servic':34,39 'set':20 'situat':62 'solv':16 'someth':56 'storag':25 'wors':74 'yes':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483524"
+editedAt: null
+createdAt: DateTimeImmutable @1704636460 {#2083
date: 2024-01-07 15:07:40.0 +01:00
}
+"title": 288684
}
1 => App\Entity\EntryComment {#2090
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1549}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2093 …}
+body: """
I have been thinking the same thing.\n
\n
I have been looking into a way to copy files from our servers to our S3 backup-storage, without having the access-keys stored on the server. (as I think we can assume that will be one of the first thing the ransomware toolkits will be looking for).\n
\n
Perhaps a script on a remote machine that initiate a ssh to the server and does a “s3cmd cp” with the keys entered from stdin ? Sofar, I have not found how to do this.\n
\n
Does anybody know if this is possible?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704636907 {#2091
date: 2024-01-07 15:15:07.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@MNByChoice@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#2092 …}
+nested: Doctrine\ORM\PersistentCollection {#2241 …}
+votes: Doctrine\ORM\PersistentCollection {#2130 …}
+reports: Doctrine\ORM\PersistentCollection {#2129 …}
+favourites: Doctrine\ORM\PersistentCollection {#2132 …}
+notifications: Doctrine\ORM\PersistentCollection {#2040 …}
-id: 288705
-bodyTs: "'access':31 'access-key':30 'anybodi':93 'assum':42 'backup':25 'backup-storag':24 'copi':16 'cp':76 'enter':80 'file':17 'first':49 'found':87 'initi':66 'key':32,79 'know':94 'look':11,56 'machin':64 'one':46 'perhap':58 'possibl':98 'ransomwar':52 'remot':63 's3':23 's3cmd':75 'script':60 'server':20,36,71 'sofar':83 'ssh':68 'stdin':82 'storag':26 'store':33 'thing':7,50 'think':4,39 'toolkit':53 'way':14 'without':27"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5483590"
+editedAt: null
+createdAt: DateTimeImmutable @1704636907 {#2086
date: 2024-01-07 15:15:07.0 +01:00
}
+"title": 288705
}
0 => App\Entity\EntryComment {#2348}
]
-id: 27807
-titleTs: "'cloud':4 'get':6 'hack':7 'provid':5"
-bodyTs: "'/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':176 '/the-biggest-cybersecurity-':173 '13':43 '2023':41 'actual':146 'also':18,74,99 'anybodi':165 'attack':66 'backup':76,102,140,152 'becom':90 'begin':24 'biggest':37 'bleep':29 'bleeping-comput':28 'bleepingcomputer.com':172 'client':71 'cloud':59,108,135 'cloud-provid':58,107,134 'comput':30 'concluss':127 'cybersecur':38 'daili':101,139 'danish':57 'data':72 'differ':155 'disk':94 'disk-storag':93 'encrypt':67,97 'far':120 'far-fetch':119 'fetch':121 'get':61,147 'guess':14 'hi':1 'hit':62 'home':11 'home-host':10 'host':6,12 'hous':162 'idea':167 'interes':46 'interest':33 'item':42 'made':104 'mean':81 'might':115,142 'on-top':20 'one':47,159 'post':16,34,52 'provid':60,109,136,156 'publish':31 'ransomwar':65 'remark':169 's3':111 's3-storage':110 'see':48 'self':5 'self-host':4 'senario':84 'short':55 'storag':95,112,149 'stori':39 'summari':53 'think':125 'topic':22 'unus':91 'url':49 'useful':144 'useless':114 'user':79 'virtual':92 'vm':89 'vms':131,164 'www.bleepingcomputer.com':175 'www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/)':174 'year':27"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704716431
+visibility: "visible "
+apId: "https://infosec.pub/post/6884026"
+editedAt: null
+createdAt: DateTimeImmutable @1704630031 {#1584
date: 2024-01-07 13:20:31.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2346 …}
+body: "Well, based on advice of Samsy, take a backup of home-server network to a NAS on your home-network. (I do home that your server-segment and your home-segment are two seperated networks, no?) Or better, set up your NAS at a friend’s house (and require MFA or a hardware security-key to access it remotely)"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704783330 {#2350
date: 2024-01-09 07:55:30.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@pineapplelover@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#2351 …}
+nested: Doctrine\ORM\PersistentCollection {#2332 …}
+votes: Doctrine\ORM\PersistentCollection {#2349 …}
+reports: Doctrine\ORM\PersistentCollection {#2141 …}
+favourites: Doctrine\ORM\PersistentCollection {#2164 …}
+notifications: Doctrine\ORM\PersistentCollection {#2314 …}
-id: 292927
-bodyTs: "'access':62 'advic':4 'backup':9 'base':2 'better':42 'friend':49 'hardwar':57 'home':12,21,25,34 'home-network':20 'home-seg':33 'home-serv':11 'hous':51 'key':60 'mfa':54 'nas':17,46 'network':14,22,39 'remot':64 'requir':53 'samsi':6 'secur':59 'security-key':58 'segment':30,35 'seper':38 'server':13,29 'server-seg':28 'set':43 'take':7 'two':37 'well':1"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5522656"
+editedAt: null
+createdAt: DateTimeImmutable @1704783330 {#2330
date: 2024-01-09 07:55:30.0 +01:00
}
+"title": 292927
} |
|
Show voter details
|
53 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
54 |
DENIED
|
moderate
|
App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
}
0 => App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
} |
|
Show voter details
|
55 |
DENIED
|
edit
|
App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
}
0 => App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
} |
|
Show voter details
|
56 |
DENIED
|
moderate
|
App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
}
0 => App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
} |
|
Show voter details
|
57 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
58 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727}
0 => App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
} |
|
Show voter details
|
59 |
DENIED
|
edit
|
App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727}
0 => App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
} |
|
Show voter details
|
60 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727}
0 => App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
} |
|
Show voter details
|
61 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
62 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
}
0 => App\Entity\EntryComment {#1708}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
} |
|
Show voter details
|
63 |
DENIED
|
edit
|
App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
}
0 => App\Entity\EntryComment {#1708}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
} |
|
Show voter details
|
64 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1708
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1744 …}
+slug: "authentik-how-to-backup"
+title: "authentik .. how to backup ?"
+url: null
+body: """
Hi all,\n
\n
Short question. Does somebody here run authentik as single sign-on provider? (dockerised?)\n
\n
I’m looking for information on how to best backup a authentik server? Just do a backup of the postgres database and the docker-compose file? Something else? How crucial is the dump.rdb file of the redis container?\n
\n
Kr.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1712720939 {#1766
date: 2024-04-10 05:48:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1639 …}
+votes: Doctrine\ORM\PersistentCollection {#1647 …}
+reports: Doctrine\ORM\PersistentCollection {#1641 …}
+favourites: Doctrine\ORM\PersistentCollection {#1571 …}
+notifications: Doctrine\ORM\PersistentCollection {#1592 …}
+badges: Doctrine\ORM\PersistentCollection {#1587 …}
+children: [
1 => App\Entity\EntryComment {#1727
+user: App\Entity\User {#264 …}
+entry: App\Entity\Entry {#1464}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#2370 …}
+body: "Great thanks! (also thanks to Mike … you have some valid points)"
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1704628857 {#1618
date: 2024-01-07 13:00:57.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
"@ferngully@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#2363 …}
+nested: Doctrine\ORM\PersistentCollection {#2467 …}
+votes: Doctrine\ORM\PersistentCollection {#2470 …}
+reports: Doctrine\ORM\PersistentCollection {#2459 …}
+favourites: Doctrine\ORM\PersistentCollection {#2380 …}
+notifications: Doctrine\ORM\PersistentCollection {#2359 …}
-id: 288453
-bodyTs: "'also':3 'great':1 'mike':6 'point':11 'thank':2,4 'valid':10"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482343"
+editedAt: null
+createdAt: DateTimeImmutable @1704628857 {#1731
date: 2024-01-07 13:00:57.0 +01:00
}
+"title": 288453
}
0 => App\Entity\EntryComment {#1708}
]
-id: 27721
-titleTs: "'authentik':1 'backup':4"
-bodyTs: "'authentik':9,28 'backup':26,33 'best':25 'compos':42 'contain':55 'crucial':47 'databas':37 'docker':41 'docker-compos':40 'dockeris':16 'dump.rdb':50 'els':45 'file':43,51 'hi':1 'inform':21 'kr':56 'look':19 'm':18 'postgr':36 'provid':15 'question':4 'redi':54 'run':8 'server':29 'short':3 'sign':13 'sign-on':12 'singl':11 'somebodi':6 'someth':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704648332
+visibility: "visible "
+apId: "https://infosec.pub/post/6863776"
+editedAt: DateTimeImmutable @1712542756 {#1466
date: 2024-04-08 04:19:16.0 +02:00
}
+createdAt: DateTimeImmutable @1704579832 {#1465
date: 2024-01-06 23:23:52.0 +01:00
}
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1652 …}
+image: null
+parent: null
+root: null
+body: """
First of all, thanks to all who replied! I didn’t think there would have been that many people who self-host a SSO-server, so I am happy to see these replies.\n
\n
As a side-note, I have also been looking into making the setup more robust, i.e. add redundancy. For a “light redundant” senario (not fully automatic, but -say- where I have a 2nd instance ready to run, so I just need to adapt the DNS-record if it is needed), can I conclude from the “makeing a backup” question, that I just need to run a 2nd instance of postgres and do streaming-replication from the main instance to the backup-instance ?\n
\n
Or are there other caviats I haven’t thought about?
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704629369 {#1717
date: 2024-01-07 13:09:29.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@kristoff@infosec.pub"
]
+children: Doctrine\ORM\PersistentCollection {#1906 …}
+nested: Doctrine\ORM\PersistentCollection {#2383 …}
+votes: Doctrine\ORM\PersistentCollection {#1410 …}
+reports: Doctrine\ORM\PersistentCollection {#1907 …}
+favourites: Doctrine\ORM\PersistentCollection {#1407 …}
+notifications: Doctrine\ORM\PersistentCollection {#2391 …}
-id: 288464
-bodyTs: "'2nd':69,104 'adapt':79 'add':53 'also':43 'automat':62 'backup':95,120 'backup-inst':119 'caviat':126 'conclud':90 'didn':10 'dns':82 'dns-record':81 'first':1 'fulli':61 'happi':31 'haven':128 'host':23 'i.e':52 'instanc':70,105,116,121 'light':57 'look':45 'main':115 'make':47,93 'mani':18 'need':77,87,100 'note':40 'peopl':19 'postgr':107 'question':96 'readi':71 'record':83 'redund':54,58 'repli':8,35 'replic':112 'robust':51 'run':73,102 'say':64 'see':33 'self':22 'self-host':21 'senario':59 'server':27 'setup':49 'side':39 'side-not':38 'sso':26 'sso-serv':25 'stream':111 'streaming-repl':110 'thank':4 'think':12 'thought':130 'would':14"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://infosec.pub/comment/5482406"
+editedAt: null
+createdAt: DateTimeImmutable @1704629369 {#1909
date: 2024-01-07 13:09:29.0 +01:00
}
+"title": 288464
} |
|
Show voter details
|
65 |
DENIED
|
ROLE_ADMIN
|
null |
|
Show voter details
|
66 |
DENIED
|
ROLE_MODERATOR
|
null |
|
Show voter details
|