TechLich

joined 2 years ago
[–] TechLich 5 points 1 year ago (2 children)

They're not files, it's just leaking other people's conversations through a history bug. Accidentally putting person A's "can you help me write my research paper/IT ticket/script" conversation into person B's chat history.

Super shitty but not an uncommon kind of bug. Often either a nasty caching issue or screwing up identities for people sharing IPs or similar.

It's bad but it's "some programmer makes understandable mistake" bad not "evil company steals private information without consent and sends it to others for profit" kind of bad.

[–] TechLich 10 points 1 year ago (1 children)

I think the idea is that he thought she was confused by what he had said.

"What are they called?" meaning "what are the words for them?" Not "what are their names?" Like he was quizzing her on her English or something.

He was a about to correct her like "no no, I meant what are their names?"

[–] TechLich 1 points 1 year ago

Totally agree on all points!

My only issue was with the assertion that OP could comfortably do away with the certs/https. They said they were already using certs in the post and I wanted to dispel the idea that they arguably might not need them anymore in favour of just using headscale as though one is a replacement for the other.

[–] TechLich 1 points 1 year ago* (last edited 1 year ago) (2 children)

Tailscale isn't an exposed service. Headscale is

Absolutely! And it's a great system that I thoroughly recommend. The attack surface is very small but not non-existent. There have been RCE using things like DNS rebinding(CVE-2022-41924) etc. in the past and, although I'm not suggesting that it's in any way vulnerable to that kind of thing now, or that it even affected most users we don't know what will happen in future. Trusting a single point of failure with no defence in depth is not ideal.

it's more work and may not always be worth the effort

I don't really buy this. Certs have been free and easy to deploy for a long time now. It's not much more effort than setting up whatever service you want to run as well as head/tailscale, and whatever other fun services you're running. Especially when stuff like caddy exists.

I recommended SmallStep+Caddy.

Yes! Do this if you don't want to get your certs signed for some reason. I'm only advocating against not using certs at all.

Are you suggesting that these attack techniques are effective against zero trust tunnels

No I'm talking about defence in depth. If Tailscale is compromised (or totally bypassed by someone war driving your WiFi or something) then all those services are free to be impersonated by a threat actor pivoting into the local network after an initial compromise. Don't assume that something is perfectly safe just because it's airgapped, let alone available via tunnel.

I feel like it's a bit like leaving all your doors unlocked because there's a big padlock on the fence. If someone has a way to jump the fence or break the lock you don't want them to have free reign after that point.

[–] TechLich 1 points 1 year ago (4 children)

there's an argument that HTTPS isn't really required...

Talescale is awesome but you gotta remember that Talescale itself is one of those services (Yikes). Like all applications it's potentially susceptible to vulnerabilities and exploits so don't fall into the trap of thinking that anything in your private network is safe because it's only available through the VPN. "Defence in depth" is a thing and you have nothing to lose from treating your services as though they were public and having multiple layers of security.

The other thing to keep in mind is that HTTPS is not just about encryption/confidentiality but also about authenticity/integrity/non-repudiation. A cert tells you that you are actually connecting to the service that you think you are and it's not being impersonated by a man in the middle/DNS hijack/ARP poison, etc.

If you're going to the effort of hosting your own services anyway, might as well go to the effort of securing them too.

[–] TechLich 5 points 1 year ago

"Toad in the Hood" is the gritty HBO sequel to "The Wind in the Willows" that takes place after Toad breaks out of prison.

[–] TechLich 20 points 1 year ago (8 children)

No, that's "Monk"

A manc is a place where you can go to deposit your money and get home loans and stuff.

[–] TechLich 7 points 1 year ago (2 children)

Do you get that kind of delay when you talk to the assistant on your phone or through a browser? It might be whisper taking a while to process it?

What is your home assistant running on?

Also, what's the range/mic/audio quality like on those atom echos? I'm thinking of looking into something like that now that a decent voice assistant is a possibility.

[–] TechLich 22 points 1 year ago (4 children)

By the sounds of it their entire video team left. So not half of the channel gone, but all of it...

[–] TechLich 3 points 1 year ago

It's an idiom that comes from shooting something in the sky (like a bird or a plane) so that it falls down to the ground. Usually with a gun or a bow or similar weapon. "He shot down that plane!"

To shoot down an idea is like to discredit it. To show that it is not true (by metaphorically blasting the idea out of the sky and making it crash into the earth).

[–] TechLich 7 points 1 year ago* (last edited 1 year ago) (2 children)

"aborigines" is not a great word to use these days. It's generally seen as pretty offensive to Indigenous Australians as it's a bit dehumanising and comes from colinisers who treated people like animals.

Better to go with "First Nations people", "Aboriginal and Torres Strait Islander people" or "Indigenous Australians."

But yes, they've been treated (and in many cases continue to be treated) pretty horribly.

view more: ‹ prev next ›