Avatar

ShortN0te

ShortN0te@lemmy.ml
Joined
0 posts • 408 comments
Direct message

Not sure how email verification should help. Just add a couple of line to role a email address and then open the verification link.

permalink
report
reply

Why not? Openssh has proven itself to be reasonable secure. Porbably more research went into its security then most apps you are hosting.

permalink
report
parent
reply

Restic does nit create a single backup file. You can either pack the repository in an archive or use restic do directly backup to b2. If i recall correctly b2 is supported by restic directly.

And just to stress that point: backup > redundancy

permalink
report
parent
reply

Not to mention that not every client has software available.

permalink
report
parent
reply

And yet it is more likely that tailscale get owned since the reward is much higher. I take my chances with my secured openssh server at port 22 vs a 3rd party company who controlls the access.

permalink
report
reply

They are no longer allowed to block servers based on IP addresses. (1 server with 1 IP address can host countless domains)

But domain based blocking (likepiratedmovieas.com) is still allowed.

permalink
report
parent
reply

How should they even know? How should they prove that you are in posession of that data? Yes Hetzer most likely has to respond to reports but again how should the rights holder find out? Just because they find a jellyfin server in the wild? Even if the site is not SSL protected they are not Man in the Middle the traffic.

permalink
report
parent
reply