lud

joined 1 year ago
[–] lud@lemm.ee 0 points 10 months ago (1 children)

Please learn at least something about network security before commenting again.

Thanks.

[–] lud@lemm.ee 1 points 10 months ago (3 children)

But it doesn't matter if you expose your IP.

[–] lud@lemm.ee 1 points 10 months ago

Probably very low due to the DRM. Cinema leaks are extremely rare since they are encrypted and all that.

[–] lud@lemm.ee 1 points 10 months ago

You could probably only find CAMS for in theater movies anyways.

And a CAM is arguably worse than nothing

[–] lud@lemm.ee 0 points 10 months ago* (last edited 10 months ago) (5 children)

I'm getting a bit tired of your replies.

Ditto

The cost of a server at home as you are saying is much more than hiring it online. The only difference is how you boot the BIOS to install the ISO burned into a USB. A hosting service would require you to do it different, and you will anyway learn it in this way, which could help you in the future to deploy some product ready or for your work. So there is no difference at all, and you also need to secure it.

Cost highly depends on what you buy. A proxmox host can be expensive but a raspberry pi isn't.

You can do much more at home, like setting up complicated VM hosts and learn networking. Few servers actually run on bare metal these days, it's all VMs now.

I don't know if you really read it. It is saying that you can never expect when a new 0-day vulnerability comes out. Like: https://venafi.com/blog/ssh-vulnerability-allows-authentication-without-password/ → "attacker could successfully authenticate without any credentials"

The same would happen on a VPS...

Yeah, it solves that they only infect your server on a hosting provider and not your home where you have your phone, router, more devices where they can test more exploits to them. Also, your hosting provider normally also monitors for suspicious requests so if it is infected, your provider will inform you of suspicious activities.

Like I said multiple times, insulate the server from your LAN.

If you know what you are doing there is nothing to worry about. The only attackers a small personal website will encounter are automated bots.

If it ever gets infected which it likely won't unless you are doing something incredibly stupid like exposing SSH with default passwords (or even enabling password authentication at all honestly, auth should be key based.) Just reinstall the device/VM that got infected.

It is fine to refuse to host at home but don't fearmonger others that want to save money and learn more about security, networking, virtualization, and other homelab stuff. And some people just want a single raspberry pi hosting their simple website, that is very cheap and secure enough. You don't need to pay cloud bills if you want a website. That is my point. You can, but you don't need too.

[–] lud@lemm.ee 1 points 10 months ago (7 children)

Much more? It's the same... What's the difference?

You would learn more about the hardware site and maybe more about setting up stuff like VM hosts and of course security.

Basically you learn everything from start to finish. Maybe you could even setup a proper VM host using proxmox or something.

You might not care about that, and that's perfectly fine. But I suspect that most people that selfhosts (at home or cloud) are probably going to be the type of person that wants to learn more.

https://security.stackexchange.com/questions/41983/what-risks-are-involved-in-exposing-our-home-computers-over-the-public-internet

So as expected it isn't really risky as long as you take the appropriate security actions. Especially if you have insulated the server on a DMZ or VLAN. In most cases, personal websites are essentially disposable as long as you keep backups. You are probably not handing payment or personal data or anything else sensitive. The biggest risk is probably ddos but who really ddos a random website and the same risk applies to a VPS except that a ddos could use all your allocated bandwidth.

A VPS doesn't solve any security issues with your website itself. SAAS (like paying wordpress instead of hosting a WP server at home or on a VPS) might help but that's boring and more expensive.

If all you're doing is hosting a simple website, you really don't need to worry. Just take the basic security steps that you would do on a VPS anyways. If you use wordpress I would be a bit more cautious since they are extremely popular targets.

[–] lud@lemm.ee 1 points 11 months ago (9 children)

Same, that's why I am saying there is no need to expose your IP, unnecessary risks.

You will learn much more with self hosting at home though. Which is arguably worth much more.

Same, that's why I am saying there is no need to expose your IP, unnecessary risks.

Why is it a risk?

[–] lud@lemm.ee 2 points 11 months ago

Is true, that's cool.

Probably not the type of car I would ever buy. I heard the patent is about to expire so that's great. Not that I understand why the western world would care about Chinese parents. ¯\_(ツ)_/¯

[–] lud@lemm.ee 1 points 11 months ago (11 children)

I'm of course referring to a real DMZ and not a DMZ host.

I won't call home routers "not firewalls" just bad firewalls Surprisingly even Cisco firewalls support DMZ hosts. I have no idea why you would ever what to use that.

There is no need to expose your IP, there are many alternatives to do stuff without exposing it.

. Maybe but why would it matter, especially enough to pay cloud bills?

I have a cheap VPS for my website but that is just because I'm behind a CGNAT and I won't bother to solve that.

[–] lud@lemm.ee 1 points 11 months ago* (last edited 11 months ago) (13 children)

as you are opening all the ports to the server at home, your server at home has access to all your network so once infected by any 0-day exploit, you are fucked up.

No, the entire point of a DMZ is to insulate a device from the rest of the network and you can (should) configure which ports that are forwarded to the DMZ, don't just forward everything. You can (should) also configure a bunch of other normal firewall rules for the DMZ.

Personally I don't consider "exposing" your home IP to be a big deal. It's just an IP.

[–] lud@lemm.ee 1 points 11 months ago* (last edited 11 months ago)

Either way, I need some evidence or at least some slightly realistic and reputable observations before I will believe it.

[–] lud@lemm.ee 1 points 11 months ago* (last edited 11 months ago) (2 children)

No, there is no proof of it happening and it's extremely likely to be coincidences or even made up. It's the internet after all.

view more: ‹ prev next ›