
deleted by creator
deleted by creator
“Protect the kids!” - always the first thing they use.
SimpleX doesn’t even have a desktop client. IT DO! Discord is mostly used for gaming.
It says information used for age checks will not be stored by Discord or the verification company.
Bullshit. Every time some bitch-ass company says this, 4-5 years later they’re like “we were hacked, someone took everyone’s photo IDs!”
Problem with Dumbphones is that they can’t run the Signal client. I still have a use for smartphones, but I don’t think the fairphone is it. I should probably look at the Pinephone again though.
The moment this is attempted is the moment I’m no longer on discord.
I’m okay with seeing it from time to time - but when my /all would get flooded with PAGES, and PAGES of the stuff with no normal articles in between, I started muting those users.
Why? It’s too much bandwidth, too much upkeep, I already modded/ran communities larger than lemmy; I DON’T want to do it again, especially if I’m paying out of pocket for it. Having to deal with whiny cry-bitches when you DON’T ban something that they don’t like it almost as bad as having the stuff banned in the first place.
Nope. They’re federated, so no reason they wouldn’t show unless you turn all NSFW stuff off.
Nah fuck that. Mods are power hungry fat morons who exert the editorial discretion of a wet noodle. Almost every community in the fediverse is full of this crap. Things aren’t removed because they’re harmful, they’re removed because some mod disagrees.
There’s also the problem with every instance admin having access to deeper internals; I’m waiting for the day people start getting banned for upvoting the wrong thing.
I found that a total of like 5 people post basically all of the lemmynsfw stuff. Once I blocked them, it almost all went away. Pretty sure the internet is nothing but bots now.
Also, if you’re on the internet expecting all sunshine and rainbows – leave now. The internet is not a place for that. Everything now is rage-bait designed to get more clicks, and the internet has always been the wild west with major hostilities all the time. It’s not a good place to spend your time if you’re looking to relax.
Removed by mod
And again - if you put those behind a fail2ban; and you 404 5x in an hour, which is likely - you’ve solved that issue. Had my jellyfin instance publicly available for 2 years on its own VM with passthrough GPU, and haven’t had any issues. People poke around quite often, and get blackholed via the firewall for 30d.
It wouldn’t stop a dedicated attacker, but I doubt anyone’s threat model here is that intense. Most compromised servers happen from automated attacks probing for vulnerabilities in order to get RCE; not probing for what movies you have – Because having movies on a media server doesn’t prove that you didn’t rip them all off of blu-ray…it just means you have movies.
You’re not going to have 100% privacy when you put up ANY service on your network. Everything leaves a trace somehow; but I’m starting to think half of you are Chinese spies or something with the amount of paranoia people here show sometimes. :P
Hmm, that’s a good point. I just checked my Jellyfin, and I don’t put any of the cert data into its config, I’m using caddy as my reverse proxy to serve it and I didn’t even think about this. No reason it has to be a self-signed cert, it could technically be local only and still be a Let’s Encrypt cert.
If they need SSL certs, they’ve got to. Jellyfin doesn’t accept self-signed certs, which means DNS entries in a domain, and access from the internet.
Really, honestly - what they need to do is just install Jellyfin on the Raspberry Pi and ditch the encryption requirement altogether. There’s no reason to have it on a LAN-only environment. They aren’t going to need it, nobody is going to MITM their lan environment, and VPNs will regularly allow LAN passthrough.
If ProntonVPNs own client doesn’t allow LAN connections, they either need to swap to the Wireguard vanilla client (if that’s allowed on free tier), or upgrade their VPN service.
OR switch VPNs altogether.
There isn’t a way to do this without breaking one of their requirements
Only options here are to publicly host with real SSL certs, on a domain and tunnel out – Or swap VPN providers/software so that you can achieve LAN access and forego HTTPS altogether.
Edit: And sorry – the previous post is gone regarding their only needing access within the home, there’s no way I could have known that.
There’s a bit of paranoia going on here to begin with - There’s no reason they need this level of “security” within their home network on the LAN side anyhow. They could possibly buy a managed switch and make the jellyfin server only visible to a specific vlan that didn’t include the router, but that doesn’t quite match up with what it sounds like they’re needing.
Yeah, this whole thread feels like a “but I can’t do that, work around it for me”
Do. And make sure your logs are piped through fail2ban.
All of these “vulnerabilities”, require already having knowledge of the ItemIDs, and anyone without it poking around will get banned.
The rest of them require a user be authenticated, but allows horizontal information gathering. These are not RCEs or anything serious. The ones which allowed cross-user information editing have been fixed.
Tailscale is only for the server/host. You’re not changing all of your VPN services over to this, you’re using it in a ‘reverse’ fashion. You’re VPN-ing the server out to the world so it’s reachable and you have port forwarding options, etc.
From there, it can be reached by any client on the internet as a service. From there though, I don’t know how you’d get to it securely without a domain and SSL (Let’s Encrypt/Caddy) certs.
A domain is only like $16/year. So it’s not prohibitively expensive.
I (wrongly) assumed that if he was hilarious to have made that graphic, that he’d maybe be more reasonable, hopefully funny. I was disappoint.
It did kick off me spending about 2 hours comparing Signal to SimpleX, and Briar, and a bunch of others, and I can only conclude Signal is the best out of them. The security community seems to be REALLY paranoid about every, single, tiny little thing - but I understand that they must be.
SimpleX doesn’t do any kind of IP address masking or have quantum resistant double ratchet encryption.
Briar doesn’t account for rogue-tor nodes, etc.
There’s just always some big glaring flaw in one of them.
It DO! Which one am I mixing it up with then? Briar?