I think he’s saying they don’t have to if they can read it off of your pc or the server before it’s even encrypted. OS backdoors, in-app backdoors, hardware backdoors inside the CPU like Intel ME…
I think he’s saying they don’t have to if they can read it off of your pc or the server before it’s even encrypted. OS backdoors, in-app backdoors, hardware backdoors inside the CPU like Intel ME…
What does round filing dmca requests mean?
Me too, but I never found it helpful. What’s your experience in using it in life?
This. Also, make sure the proxy is proxying websocket traffic as well. I do it with pure nginx like this:
server {
listen 80;
server_name example.com;
location / {
proxy_pass http://192.168.1.100:8123/;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# WebSocket support
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}
I’m not arguing for cloud flare hahahh it’s horrible. I’m just saying, it’s just one of many ways your data is taken. I don’t see why the backdoors I listed should be used for targeted “attacks” only. They call it telemetry and it’s “used to improve the product you use” hehehh