• 0 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle


  • Yeah, that’s fair enough, though I’m not sure it’s very different from malicious instances creating normal user accounts?

    You can see when users from an instance are all suspiciously voting the same way at the same time regardless of whether they are usernames or IDs.

    There’s lots of legitimate users that only vote but never post so doing it based on that doesn’t seem very effective?

    The second problem is solved using public key cryptography, the same way that you can’t impersonate someone else’s username to post comments. Votes and comments are digitally signed (There would need to be a different public key for voting to maintain pseudonymity though).


  • How about pseudonymous as a compromise? Votes could be publicly federated but tied to some uuid instead of the username. That way you still have the same anti spam ability (can see that a user upvoted these things from this instance at this time) but can’t tie it directly to comments or actual user accounts without some extra osint.

    It might be theoretically possible to correlate the uuids with an account’s activity and dox the user in some cases, especially with some instances having a single user, but it would be very difficult or impossible to do on larger instances and would add an extra layer. Single user instances would be kind of impossible to make totally private anyway because they can be identified by instance.


  • I’d add to this to say that redis as a key-value store often sits alongside a relational database like postgres etc. to act as a cache for it.

    Basically, requests to be sent to the relational db (like postgres) get turned into a key and the results stored as a value in redis. Then when the same request comes through again, it can pull the results quickly out of the key-value store without having to search postgres by running a long SQL query again. There’s a few different caching strategies to keep things up to date or have the cached data expire regularly, etc. but that’s the gist of it.

    Important to note that not all applications need something like that and not all queries would even benefit from it (postgres is pretty fast and can even do that kind of thing itself) but if there’s a lot of users running the same slow query over and over, caching the results can help immensely.





  • That’s pretty cool!

    Although that’s probably what op is actually asking for, I don’t think it’s a modem. It’s a router with an access point.

    It does have SFP for a fibre connection and pcie and USB for you to potentially add a modem or whatever else you want.

    I’m guessing OP is just looking for a wifi router? Otherwise we’d need to know what kind of modem they’re looking for, like Cellular? VDSL? HFC? Satellite? It depends on the internet connection. Different parts of the world need very different kit.


  • TechLich@lemmy.worldtomemes@lemmy.worldold web grandma
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    8 months ago

    It’s really not… A domain name is what… $5-10 per year? Web server software is free (nginx, apache, lighttptd, pick your poison). You could run a website on your phone. It doesn’t need much hardware or network requirements unless you start hitting thousands of users.

    A static IP helps but dynamic DNS is a thing. If you need more juice or you’re located somewhere that NATs IPs, a public web host is like $5-10 a month if you’re getting ripped off.

    It costs more to get a streaming service subscription.

    Hosting a popular webapp with tens or hundreds of thousands of concurrent users interacting with complex backend code and a database (see Lemmy) gets more expensive but it always was and it’s now cheaper than ever.

    Edit: I should point out that I’m pretty anti-corporate and I’m not defending the current state of social media or search results. I’m just also agreeing with the guy who pointed out that the web is still open and you can host a website on a potato.


  • TechLich@lemmy.worldtomemes@lemmy.worldold web grandma
    link
    fedilink
    arrow-up
    8
    arrow-down
    3
    ·
    edit-2
    8 months ago

    I feel like that’s not a fair comparison. You can’t ride a horse on a freeway but you absolutely can host a website that anyone in the world can access instantly.

    Back when the web was “open” and “free” and not dominated by social media, the 99% of people, the millions and billions of users, weren’t using it. It’s not like your Geocities page in 1999 had a billion visitors (despite what your “one billionth visitor” blink tags proclaimed). Even after it got added to that popular web ring for like-minded netizens.

    I feel like people have forgotten what the old web was really like and that most communities only had a handful of active people. You can still do that and in fact there are thousands of such small independent websites and communities in forums and platforms like this. Hell, a bunch of the old forums and IRC channels etc. from back then are still running and some actually have more users than ever just because of more overall internet adoption.

    It’s a bit sad that Google SEO favours large platforms and garbage medium blogs over smaller personal websites but search was mostly shit back then too (metacrawler ftw).


  • They’re not files, it’s just leaking other people’s conversations through a history bug. Accidentally putting person A’s “can you help me write my research paper/IT ticket/script” conversation into person B’s chat history.

    Super shitty but not an uncommon kind of bug. Often either a nasty caching issue or screwing up identities for people sharing IPs or similar.

    It’s bad but it’s “some programmer makes understandable mistake” bad not “evil company steals private information without consent and sends it to others for profit” kind of bad.


  • Totally agree on all points!

    My only issue was with the assertion that OP could comfortably do away with the certs/https. They said they were already using certs in the post and I wanted to dispel the idea that they arguably might not need them anymore in favour of just using headscale as though one is a replacement for the other.


  • Tailscale isn’t an exposed service. Headscale is

    Absolutely! And it’s a great system that I thoroughly recommend. The attack surface is very small but not non-existent. There have been RCE using things like DNS rebinding(CVE-2022-41924) etc. in the past and, although I’m not suggesting that it’s in any way vulnerable to that kind of thing now, or that it even affected most users we don’t know what will happen in future. Trusting a single point of failure with no defence in depth is not ideal.

    it’s more work and may not always be worth the effort

    I don’t really buy this. Certs have been free and easy to deploy for a long time now. It’s not much more effort than setting up whatever service you want to run as well as head/tailscale, and whatever other fun services you’re running. Especially when stuff like caddy exists.

    I recommended SmallStep+Caddy.

    Yes! Do this if you don’t want to get your certs signed for some reason. I’m only advocating against not using certs at all.

    Are you suggesting that these attack techniques are effective against zero trust tunnels

    No I’m talking about defence in depth. If Tailscale is compromised (or totally bypassed by someone war driving your WiFi or something) then all those services are free to be impersonated by a threat actor pivoting into the local network after an initial compromise. Don’t assume that something is perfectly safe just because it’s airgapped, let alone available via tunnel.

    I feel like it’s a bit like leaving all your doors unlocked because there’s a big padlock on the fence. If someone has a way to jump the fence or break the lock you don’t want them to have free reign after that point.


  • there’s an argument that HTTPS isn’t really required…

    Talescale is awesome but you gotta remember that Talescale itself is one of those services (Yikes). Like all applications it’s potentially susceptible to vulnerabilities and exploits so don’t fall into the trap of thinking that anything in your private network is safe because it’s only available through the VPN. “Defence in depth” is a thing and you have nothing to lose from treating your services as though they were public and having multiple layers of security.

    The other thing to keep in mind is that HTTPS is not just about encryption/confidentiality but also about authenticity/integrity/non-repudiation. A cert tells you that you are actually connecting to the service that you think you are and it’s not being impersonated by a man in the middle/DNS hijack/ARP poison, etc.

    If you’re going to the effort of hosting your own services anyway, might as well go to the effort of securing them too.



  • TechLich@lemmy.worldtoMemes@lemmy.mlDon't ask
    link
    fedilink
    arrow-up
    11
    arrow-down
    4
    ·
    edit-2
    1 year ago

    “aborigines” is not a great word to use these days. It’s generally seen as pretty offensive to Indigenous Australians as it’s a bit dehumanising and comes from colinisers who treated people like animals.

    Better to go with “First Nations people”, “Aboriginal and Torres Strait Islander people” or “Indigenous Australians.”

    But yes, they’ve been treated (and in many cases continue to be treated) pretty horribly.


  • I think the idea is that there are potentially alignment issues in LLMs because it’s not clear what concepts map to what activations. That makes it difficult to see what they’re really “thinking” about when they generate text. Eg. if they’re being misleading or are incorrectly associating concepts that shouldn’t be connected etc.

    The idea here is to use some mechanistic interpretability stuff to see what text activates what neurons in an LLM and then crowd source the meanings behind that and see if that’s something you could use to look up some context from an ai. Sort of trying to make a “Wikipedia of AI mind reading”

    Dunno how practical it is or how effective that approach is but it’s an interesting idea.