• 0 Posts
  • 136 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle


  • Oh no you don’t, not likewise. There’s zero chance you have any real world experience under your belt, that much you’ve made very clear. You’ve already let it slip that you’re just a consultant lol. A glorified salesman playing around in SMB land no doubt. At best, maybe an old fart who actually dipped his toes into IT generalism two decades ago before getting out of the game and into consulting? I know the type lol.

    It’s probably best if you were to stay in your lane and let the professionals worry about security.


  • So how did those laptops get stolen? Would that have been possible if their users worked on a local client at the office?

    Yes laptops can be stolen from offices. It would be pretty trivial to do so in fact in most cases. In an all on site office it’d be a juicy target too because now all these laptops are in the same place.

    Rocket science is a fucking joke compared to secure IT practices. You saying that, proves that you know neither well enough to participate in this discourse.

    It is abundantly clear that you have little to no knowledge or experience in modern IT security practices. And before you ask, no, having watched Mr. Robot all the way through does not count.

    There are highly capable technical people that can securely work from home, but this is not the average user.

    You absolutely do not have to be highly technical to work securely from home. That’s just silly. You only need highly technical people to ensure the people who work from home can do so securely.




  • Encrypt-Keeper@lemmy.worldtoSelfhosted@lemmy.worldDNS?
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    4 days ago

    Getting all the functionality of Pihole into Unbound would be a good deal more than “a little work” lol. And for no real practical reason when all you’re trying to do is set up secure DNS with some ad blocking on your network. And this is coming from a professional who wouldn’t have to “learn” anything to do it. If it was really that little work, Pihole + Unbound wouldn’t be the go-to solutions for so many people.


  • Encrypt-Keeper@lemmy.worldtoSelfhosted@lemmy.worldDNS?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    4 days ago

    I mean if you want to build something around Unbound to do ad blocking and set up a monitoring stack for metrics and all that jazz that’s great, more power to you. But you already have two things built for purpose, there’s no reason to go out of your way to do that. And I don’t think OP here is prepared to do all that.


  • Encrypt-Keeper@lemmy.worldtoSelfhosted@lemmy.worldDNS?
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    For the same reason you’re running AdGuard and not just pointing all your devices at the recursive upstream.

    You’re using AdGuard / Pihole as an ad sinkhole, not just to cache and forward DNS requests. Like if you really wanted to you could hack together something in Unbound to do that, but why would you do that when Pihole already exists? You have two things built for purpose.


  • Encrypt-Keeper@lemmy.worldtoSelfhosted@lemmy.worldDNS?
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    4 days ago

    If you want to run your own recursive DNS server, why would you run two separate DNS servers?

    I’m not sure I understand your question. A recursive DNS server and a local DNS cache/forwarder/are two different things with two different purposes. You will always need both. You yourself are using AdguardHome and that is just connecting to recursive DNS server upstream. In my scenario you’re just running both yourself instead of you running one and then letting a 3rd party run the other for you.

    Your outbound queries will still be unencrypted, so your ISP can still log them and create an advertising profile based on them.

    You can encrypt the recursive queries through your ISP if you want to. Though the effectiveness of any profiling your ISP would do to you are minimized by Qname minimization that Unbound does by default.

    If you’re just using DoH then you’re just shifting who’s making that advertising profile on you from your ISP to whoever is hosting your upstream recursive DNS server. It doesn’t matter how much encryption you do because on the other end of that encrypted connection is the entity who you’re giving all your queries to.


  • Encrypt-Keeper@lemmy.worldtoSelfhosted@lemmy.worldDNS?
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    5 days ago

    I would say Pihole is a better choice than AdGuard home because PiHole just runs on top of dnsmasq. Throw Unbound on there too as your upstream recursive resolver and you’re set. You don’t even need to worry about an encrypted session to your upstream anymore because your upstream is now your loopback.



  • Yeah, why not? A quick look at Best Buy and I can see that the Apple USB-C cable is $15.99 and the cheapest reputable third party USB-charger is $13.99. You save a whopping $2.

    So if you’re a deal-oriented shopper you’re probably not even going to buy from a reputable third party, you’ll probably go with the $6 one from the gas station of dubious quality. And you’ll probably be fine. Or maybe after 3 months it causes a short and burns your house down. Best $10 you ever saved.

    Or you can take literally all of the guesswork out of it and just go with whatever manufacturers cable, spend the extra $10 on a cable that will last you years. The point isn’t buying something Apple branded, they don’t even brand it physically. The point is to just buy something guaranteed to work.




  • The point of paid SSL at this stage in the game are the higher tiers of verification. Instead of just verifying that you own the domain, you can verify that you are who you say you are. These are called Extended Validation and Organizational Validation certificates. This has historically been desirable by businesses. It used to be that these higher tier certs would not only give you a lock icon in the address bar of a web browser, but also a little blurb confirming your organization is legit. Not sure if this is still the case though. You will see the extended validation when you check the sites certificate though for sure.

    As far as encryption and security, there’s no difference. Also side note, the Comodo brand still technically exists but it was bought by Sectigo like 7 years ago.




  • Well I just bring it up because part of RCS is encryption, but there are a lot of asterisks and one of them is that RCS with Apple will never be encrypted.

    It’s one of the main problems with RCS is that whether or not the chat is secure depends on the implementation and is dependent on sender and receiver, unlike iMessage where you know that when the chat bubbles are blue, your chat is encrypted.

    IMO inconsistent encryption is worse than no encryption at all, due to the false sense of security.