• 0 Posts
  • 35 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle







  • Yup. I read it as “compose and manage containers with systemd.”

    Sure, there is a k8s layer abstracted into podman to do this, but you don’t manage or interact with it. Everything is a systemd unit file, a simple text document with a well understood structure. Containers are started and logged like services.

    Easy, direct, tidy.









  • mosiacmango@lemm.eetoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 months ago

    Yes and no. The auditing is likely the harder part. You can use something like tailscale or nebula vpn to get the always on vpn/ACLs. With a dozen or two devices, it should be doable at a home scale.

    If you want clientless zerotrust then you’re talking heavier duty things like Palo alto gear and the like.


  • Maybe. It’s a common refrain from email spam that all of the misspellings and grammatical errors are intentional choices. There is no way to confirm or disprove it either way.

    However, in the “unlikely” column, the spam industry works on a “SaaS” model where the people that send out millions of spam emails are paid to do so by customers. They compromise email severs and end user devices to build up a fleet of machines to send out the messages.

    The spammers themselves don’t care if the customers content succeeds or not, so there is no incentive to help them write good spam. They just pull in the next sucker who thinks sending out 10 million badly worded emails will work to make them money.



  • mosiacmango@lemm.eetoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    64
    ·
    edit-2
    2 months ago

    ZeroTrust is a specific type of network security where every network device has its access to other devices validated and controlled, not a statement on the trustworthiness of vendors.

    Instead of every device on a LAN seeing every other device, or even every device on a VLAN seeing other devices on a VLAN, each device can only connect with the other devices it needs to work, and those connections need to be encrypted. These connectioms are all monitored, logged and alerted on to make sure the system is working as intended.

    You do need to trust or validate the tooling that does the above, regardless of what you’re using.