I’m not arguing for cloud flare hahahh it’s horrible. I’m just saying, it’s just one of many ways your data is taken. I don’t see why the backdoors I listed should be used for targeted “attacks” only. They call it telemetry and it’s “used to improve the product you use” hehehh
- 0 Posts
- 7 Comments
Joined 1 year ago
Cake day: January 27th, 2024
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
I think he’s saying they don’t have to if they can read it off of your pc or the server before it’s even encrypted. OS backdoors, in-app backdoors, hardware backdoors inside the CPU like Intel ME…
tarmarbar@startrek.websiteto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Is Google Fiber cool with bittorrent, ED2K, or other filesharing protocols?English5·1 year agoWhat does round filing dmca requests mean?
Me too, but I never found it helpful. What’s your experience in using it in life?
tarmarbar@startrek.websiteto Selfhosted@lemmy.world•Reverse-proxying from a docker networkEnglish5·1 year agoThis. Also, make sure the proxy is proxying websocket traffic as well. I do it with pure nginx like this:
server { listen 80; server_name example.com; location / { proxy_pass http://192.168.1.100:8123/; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Proto $scheme; # WebSocket support proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; } }
How recent is your experience with Mikrotik? How old is the hardware you tried out?