
It DO! Which one am I mixing it up with then? Briar?
It DO! Which one am I mixing it up with then? Briar?
deleted by creator
“Protect the kids!” - always the first thing they use.
SimpleX doesn’t even have a desktop client. IT DO! Discord is mostly used for gaming.
It says information used for age checks will not be stored by Discord or the verification company.
Bullshit. Every time some bitch-ass company says this, 4-5 years later they’re like “we were hacked, someone took everyone’s photo IDs!”
The moment this is attempted is the moment I’m no longer on discord.
Nuh uh!
We are IN the timeline where a monkey wrote Shakespeare. That monkey was Shakespeare.
CRT displays with old pixel art are something I taught her about very early on. Scanlines made things look different; and art looked better on CRTs because they were designed with them in mind.
I mean, I get it – Digital either works or it doesn’t. Analog provides all of that scratchy mess on the screen, distorted audio, etc.
I tried getting the 13yr old a Miyoo Mini Plus; and she said she didn’t want it because it wasn’t about the games - she wanted a real GBC. >_>
My 13yr old collects Tamagotchis, and my 17yr old watches VHS tapes because she likes analog horror. So…yeah, I’m already there.
Something is awfully weird here, because Linux literally runs the worlds infrastructure for the internet. It is not unstable by any stretch of the imagination. Something you’re doing between all distros has got to be the culprit - something you do differently than other people.
And again - if you put those behind a fail2ban; and you 404 5x in an hour, which is likely - you’ve solved that issue. Had my jellyfin instance publicly available for 2 years on its own VM with passthrough GPU, and haven’t had any issues. People poke around quite often, and get blackholed via the firewall for 30d.
It wouldn’t stop a dedicated attacker, but I doubt anyone’s threat model here is that intense. Most compromised servers happen from automated attacks probing for vulnerabilities in order to get RCE; not probing for what movies you have – Because having movies on a media server doesn’t prove that you didn’t rip them all off of blu-ray…it just means you have movies.
You’re not going to have 100% privacy when you put up ANY service on your network. Everything leaves a trace somehow; but I’m starting to think half of you are Chinese spies or something with the amount of paranoia people here show sometimes. :P
Hmm, that’s a good point. I just checked my Jellyfin, and I don’t put any of the cert data into its config, I’m using caddy as my reverse proxy to serve it and I didn’t even think about this. No reason it has to be a self-signed cert, it could technically be local only and still be a Let’s Encrypt cert.
If they need SSL certs, they’ve got to. Jellyfin doesn’t accept self-signed certs, which means DNS entries in a domain, and access from the internet.
Really, honestly - what they need to do is just install Jellyfin on the Raspberry Pi and ditch the encryption requirement altogether. There’s no reason to have it on a LAN-only environment. They aren’t going to need it, nobody is going to MITM their lan environment, and VPNs will regularly allow LAN passthrough.
If ProntonVPNs own client doesn’t allow LAN connections, they either need to swap to the Wireguard vanilla client (if that’s allowed on free tier), or upgrade their VPN service.
OR switch VPNs altogether.
There isn’t a way to do this without breaking one of their requirements
Only options here are to publicly host with real SSL certs, on a domain and tunnel out – Or swap VPN providers/software so that you can achieve LAN access and forego HTTPS altogether.
Edit: And sorry – the previous post is gone regarding their only needing access within the home, there’s no way I could have known that.
There’s a bit of paranoia going on here to begin with - There’s no reason they need this level of “security” within their home network on the LAN side anyhow. They could possibly buy a managed switch and make the jellyfin server only visible to a specific vlan that didn’t include the router, but that doesn’t quite match up with what it sounds like they’re needing.
Yeah, this whole thread feels like a “but I can’t do that, work around it for me”
Do. And make sure your logs are piped through fail2ban.
All of these “vulnerabilities”, require already having knowledge of the ItemIDs, and anyone without it poking around will get banned.
The rest of them require a user be authenticated, but allows horizontal information gathering. These are not RCEs or anything serious. The ones which allowed cross-user information editing have been fixed.
Tailscale is only for the server/host. You’re not changing all of your VPN services over to this, you’re using it in a ‘reverse’ fashion. You’re VPN-ing the server out to the world so it’s reachable and you have port forwarding options, etc.
From there, it can be reached by any client on the internet as a service. From there though, I don’t know how you’d get to it securely without a domain and SSL (Let’s Encrypt/Caddy) certs.
A domain is only like $16/year. So it’s not prohibitively expensive.
These shows are both for morons who think this is how nerds act.