Skip Navigation

Posts
1
Comments
13
Joined
2 yr. ago

Anti-Imperialist/Scientism/Atheist/Marxist-Leninist/Intersectionality

“War is what happens when language fails”

  • Your Voice Matter

#He Him/She Her/They Them

  • A. Device part of a business infrastructure:Just don't change anything; those policy are there for a reason!

    B. Consumer device:1/ If we're talking about proprietary hardware/software forcing your network to use a specific DNS, then you need to provide more details because you should be able to change it.

    2/ There is also the case for a malware:A fresh start is preferable.Disinfect the system while offline, then back up the needed files.Reinstall the system on a new/old formatted drive.With the exception of taking your privacy/security seriously this time.

  • They're constructed hierarchy not natural (That hints that someone didn't want to be the fuckup alone & created a destructive system for everyone) otherwise we would be living in a socialist utopia.

    I invite everyone to listen to this episode, The history of humanity with Christopher Knight https://www.historicly.net/p/the-history-of-humanity-with-christopher

  • I hope it was in an airgapped environment.

  • Mozilla opposes a proposal because it goes against their principles and vision for the Web.They believe that any browser, server, or publisher that follows common standards should be considered part of the Web.Standards are designed to be independent of specific hardware or software, allowing for a wide range of devices, operating systems, and browsers to access the Web.This diversity of choices promotes accessibility and overcomes personal obstacles.Mechanisms that restrict these choices harm the openness of the Web and are not beneficial for users.

    The proposal's use cases rely on the ability to detect non-human traffic, which could hinder assistive technologies, automatic testing, and archiving and search engine spiders.These tools require access to content intended for humans in order to transform, test, index, and summarize it.The proposed safeguards are unlikely to be effective and fail to address these concerns adequately.

    Mozilla acknowledges the importance of addressing fraud and invalid traffic but finds the proposal lacking in practical progress for the listed use cases and highlights clear downsides to its adoption.

    Credit: https://chatbot.theb.ai/ just another version of https://chat.openai.com/ without the need to sign-up.

  • There are plenty already, why not a joint?More solidarity/less division would be nice but it doesn't mean that some individuals wouldn't need to prove themselves to the tasks.

  • Without accountability it's moot but it's not like it's possible with the current technological advancements & as always they create a hierarchy about fucking everything.

  • Pretty sure you're describing most if not all the developer's demographics, coding can always be optimized.The same goes for a lot of things we do in life (Productivity).

  • If that's the case, you wouldn't be limited to a desktop.Android users can also install the script using Firefox,

    FYI using this method with Mull & Tampermonkey.

  • Have you read the pfSense documentation, you do need a set of compatible hardware so the firewall becomes functional:

  • It's premeditated, the "Drama" is used as a scapegoat & a precursor (Divide & disintegrate).Typical tactics with conservative & neoliberal thrive on Repression/Regression/Chaos/Disorder (We're dealing with corrupt institutions & industry.).

  • There are a lot of users/bots sponsored by corrupt institutions & industries on that platform, be sceptical.

  • use an ethernet cable, you gonna need to keep that connection spotless and WiFi are vulnerable no matter which protocols, better turn it off.

    If I may also add a secure systems (Harden its configuration), a custom firmware on your router(Rec. Tomato series most updated)/hardware firewall(Rec. pfSense) with a VPS if the network is used for other means, they will help you in the long-term.

    It should go without saying if you can't secure a server, don't host one. You're responsible for anything that happens to it & us.


    Gpt-4 Prompt using Forefront.ai (Worth taking a note):

    Q: Recommendations on the levels of security that need to be taken into account for self-hosting a decentralised communityA: Self-hosting a decentralized community involves a number of security considerations. Here are some recommendations:

    1. Secure Server Configuration: Ensure that your server is configured securely. This includes using strong, unique passwords, disabling root login, and setting up a firewall. Also, consider using a security-focused operating system like SELinux or HardenedBSD.
    2. Data Encryption: All data, both at rest and in transit, should be encrypted. Use protocols like HTTPS for web traffic and SFTP for file transfers. For data at rest, consider using disk encryption technologies like BitLocker or LUKS.
    3. Regular Updates and Patches: Keep your server and all software up-to-date. This includes the operating system, web server software, database software, and any other software you're using. Regularly apply patches to fix any known vulnerabilities.
    4. Backup and Recovery: Regularly backup your data and test recovery procedures. This will help you recover quickly in case of a data loss event.
    5. Access Control: Implement strict access control measures. This includes limiting who has access to your server and what they can do. Use technologies like two-factor authentication (2FA) to add an extra layer of security.
    6. Intrusion Detection and Prevention Systems (IDS/IPS): Use IDS/IPS to monitor your network for suspicious activity and automatically block or alert you of potential threats.
    7. Secure Application Development: If you're developing your own applications, follow secure coding practices. This includes input validation, output encoding, and proper error handling. Consider using a security framework to help with this.
    8. Privacy Protection: As a decentralized community, your users will likely value their privacy. Use technologies like Tor or VPNs to help protect user privacy. Also, have a clear privacy policy and follow it.
    9. Auditing and Logging: Keep detailed logs of all activity on your server. This can help you identify and investigate any security incidents. Also, regularly audit your security measures to ensure they're working as expected.
    10. Education and Awareness: Educate yourself and your community about security best practices. This includes things like recognizing phishing attempts, using strong passwords, and being cautious with downloads and attachments.

    Remember, security is not a one-time thing but a continuous process. Always stay informed about the latest threats and security best practices.