![](/static/253f0d9/assets/icons/icon-96x96.png)
![](https://programming.dev/pictrs/image/170721ad-9010-470f-a4a4-ead95f51f13b.png)
Reserved for future use
Reserved for future use
Yes, it is generally a good idea to put internet-facing servers on a network that is separated from the local network. The point of this is not to minimize their attack surface (since they are already connected to the internet after all) but to prevent them from being used as a stepping stone for attacks on your internal network. To make this effective, you should block traffic from the internet-facing network to the rest of your network and treat it as potentially untrusted.
raid is essential anyway
Why? If there are offsite backups that can be restored in an acceptable time frame, what’s still the point of RAID?
It seems like this order is rather limited and the IA can continue almost all of their work.
Unit tests or integration tests?
GDPR enforcement is left to the member states. The EDPB isn’t an agency, its more like all the national data protection authorities in a trench coat.
Some national authorities allow it, most don’t. The final word will be from the CJEU or the EDPB.
Applying AI-voodoo to a non-existing problem with unknown side effects? Sign me up!
It’s not. Image hosting sites have existed for decades. Websites are not liable unless they have actual knowledge of illegal content and ignore takedown requests. Stop fearmongering.
DPAs don’t have the resources to take action on every single complaints. You can sue the controller or processor directly under article 79 if you want to be sure that an issue gets dealt with quickly.
While it’s stupid that ISPs are using their monopolies to screw consumers, the concept of data caps is not as stupid as you might think.
You’re not just paying for the connection between you and the ISP, but also all the other data links that get your internet traffic to its destination. For example, those cables across the ocean are owned third parties and they charge money for every byte that goes through. It wouldn’t be unreasonable for ISPs to pass that cost to users.
Furthermore, most links are overprovisioned in order to keep costs down. For example, if you assume that users only use 10% of their bandwidth on average, that means you can fit 10x as many people on a connection (or maybe 8x to account for peaks). This does mean that users should be discouraged from using their full bandwidth for long durations, otherwise the network operators can’t overprovision as much and have to invest more in infrastructure.
Using a VPN does exactly nothing against cookies or device fingerprinting.
The real question is do you encrypt-and-sign or sign-and-encrypt?
It’s slightly different. Your shell will see the /*
and replace it with all the directories under /, e.g. /bin /dev /etc /home
etc. So the actual command that runs is rm -rf /bin /dev /etc /home
etc.
Put the source code in the bag and nobody gets hurt.
Just so you know, this also creates more load on other instances, especially the larger ones.
You can virtualize a TPM, but you can’t obtain a valid endorsement key.
Never repeat anything 👍
The most common physical attacks will be you misplacing your device or some friend/burglar/cop taking it. FDE works great in those scenarios.