• 0 Posts
  • 58 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle




  • Yup. I read it as “compose and manage containers with systemd.”

    Sure, there is a k8s layer abstracted into podman to do this, but you don’t manage or interact with it. Everything is a systemd unit file, a simple text document with a well understood structure. Containers are started and logged like services.

    Easy, direct, tidy.






  • Corporations hide crimes all the time, even when they are the victims. If the crime will lose them money in any way, either directly or from a reputation hit, it’s very likely a company will not report it.

    It only because the employees involved had their NDAs expire and confirmed they saw some very fucked up things that we know what he did.

    Twitch fired him publicly when he was one of their biggest streamers. It’s fully possible the explicitly sexual messages are a crime, but the parties involved, including the minor victim, did not want it reported.

    You can argue amazon should have reported it anyway if it rose to that level, but with none of the involved parties forcing the issue, it makes sense from a buisness stance not to.


  • mosiacmango@lemm.eetoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    26 days ago

    Yes and no. The auditing is likely the harder part. You can use something like tailscale or nebula vpn to get the always on vpn/ACLs. With a dozen or two devices, it should be doable at a home scale.

    If you want clientless zerotrust then you’re talking heavier duty things like Palo alto gear and the like.


  • mosiacmango@lemm.eetoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    64
    ·
    edit-2
    30 days ago

    ZeroTrust is a specific type of network security where every network device has its access to other devices validated and controlled, not a statement on the trustworthiness of vendors.

    Instead of every device on a LAN seeing every other device, or even every device on a VLAN seeing other devices on a VLAN, each device can only connect with the other devices it needs to work, and those connections need to be encrypted. These connectioms are all monitored, logged and alerted on to make sure the system is working as intended.

    You do need to trust or validate the tooling that does the above, regardless of what you’re using.