

Stupid me, missed the IP whitelisting part.


Stupid me, missed the IP whitelisting part.


LUKS may not make your server meaningfully more secure. Anyone who can snapshot your server while it’s running or modify your unencrypted kernel or initrd files before you next unlock the server will be able to access your files.
This is a little oversimplified. Hardware vendors have done a lot of work in the last 10-20 years to make it hard to impossible to obtain data this way. AMD-SEV for example.
There are other more realistic attacks like simply etrackt the ssh server signature and MITM the ssh connection and extract the LUKS password.


The whole port range can be scanned in under a second. A real attack does not care if your ssh port is 22 or 69420. Changing Port is just snake oil.


use ddns or similar to keep track of tour IP?


Honestly, the time i had to manually intervene since ~2 years is less then 5-10 times, and that is way before the stable release. So I doubt that.


The Pin is not designed and used for such an authentication. Also can be changed at any time:
How do I manage or change my PIN?
On your phone, go to Signal Settings > Account > Change your PIN


Its not about being complicated, its about dumping the whole chat history with just a few seconds of physical acceas to the device.
LEA has used this method with messangers like Whatsapp for years to quicly exfiltrade the data from a victims phone to other software.
It is less intuitive to set up, but it is extremely lightweight and very fast. That is the one I recommend.
I highly question the decision process to only include the lightweight and speed. There are much more important criterias to consider, like for example stability, maintainability, support etc.
I do not need yet another service that gets abonded 1-2 years after launch or goes subscription only etc.
While lots of ppl will hate on Nextcloud, its pretty good. When you do the setup right, with cache and so on set up it’s fast and serves its purpose not only as cloud storage but as a collaboration platform where you can edit files with other ppl and much more.
If you only want a simple Web App to up and download files there are probably other solutions for that.


Looking at the research they are doing and actually looking critical and scientific on their own product, it is actually believable.
I am actually more worried about the USA honoring any contract or licensing agreementa on their end.


That should be part of the backup configuration. You select in the backup tool of choice what you backup. When you poose your array then you download that stuff again?


Yes, the secrets to submit to the distribution system got compromised and therefore the system got compromised.


To achieve a compromised update you either need to compromise the update infrastructure AND the key or the infratstructure AND exploit the local updater to accept the invalid or forged signature.
As i said, to compromise a signature checked update over the internet you need to compromise both, the distributing infrastructure AND the key. With just either one its not possible. (Ignoring flaws in the code ofc)


After gaining initial access, the malicious cyber actor deployed malware that scanned the environment for sensitive credentials.
So as I said, the keys got compromised. Thats what i said in the second post.


No you cannot, the pub key either needs to be present on the updater or uses infrastructure that is not owned by you. Usually how most software suppliers are doing it the public key is supplied within the updater.


This is incorrect. If the update you download is compromised then the signature is invalid and the update fails.
To achieve a compromised update you either need to compromise the update infrastructure AND the key or the infratstructure AND exploit the local updater to accept the invalid or forged signature.


Not completely correct. A lot of updaters work with signatures to verify that what was downloaded is signed by the correct key.
With bash curl there is no such check in place.
So strictly speeking it is not the same.


No this is just wrong.
Like almost all FOSS and closed source software
How do you know if they sell your data? How do you know the data is secured enough, so no data breach occurs? How do you know if everyone on the company developing it act in good faith?
That they collect completely useless metrics (except for marketing) like connected servers, says a lot about the company and the ppl behind this. Are the keys to your sever even stored locally? How could you know.
Why are you defending those ppl? What is you self intrest here? Enough companies have proof in the past that privacy policies are just text.



So they track you?
Yes, it is called multithreading. Just one example: https://github.com/BrandonBerne/masscan