Show newer

request for historical/scientific context, food/nutrition :boost_requested: 

@cephie The whole "consumption of ultra-processed foods results in health issues" feels a lot to me like the usual "being poor is bad for your health" in a trenchcoat.

I've not read all of the studies that it references on this point, but every single study I've read like it in the past is basically just observing a correlation without being able to highlight *why* it happens (and never talking about the role of poverty), so I'm highly skeptical of such studies by default.

re: linux server security checklist 

@madcap @katnjiapus I have personally not found any value in it from a security perspective; if you're going to be using your SSH access for server administration, then your account will functionally have to have root access anyway (password-based escalation is really easy to keylog by a hypothetical attacker...) so it mostly just adds an extra step for any administrative command you want to run.

That extra step *can* be desirable to reduce the chance of making destructive mistakes yourself, as an extra confirmation step; though it doesn't protect you from all failure modes. But that's not really a security thing so much as a slightly inconvenient usage safeguard.

re: linux server security checklist 

@madcap The problem is that these are complex questions to answer without a lot of background knowledge and experience in server management - how would one know if their IP often changes if they haven't already been doing server stuff for a while, for example?

So providing a list with "niche" recommendations that the recipient is then supposed to choose from, is usually the opposite of helpful, and just becomes overwhelming - it still doesn't tell them what they should or shouldn't do, it just creates more questions they now need to figure out.

(The usual heuristic applies here - as soon as you're saying someone could "just" do something, you should take a step back and ask yourself what this actually entails, and whether it is as easy for someone else as it is for yourself.)

I don't know the exact background and experience of @katnjiapus, but given that they ask specifically for a checklist, I would assume that they are looking for a list of "things they definitely should be doing, so they can be confident that it's set up right even if they're just starting to do server stuff and aren't familiar with it yet".

And to be clear, this is not really about you specifically, I see a *lot* of tech folks having this tendency to frontload all the information (relevant or otherwise) when someone asks a beginner question, but that's really something we should all unlearn if we want to have any hope of having people run their own services. Focus on the certainties, add the nuances later.

request for historical/scientific context, food/nutrition :boost_requested: 

@liketechnik@chaos.social Yeah. Going from the history described on Wikipedia, it sounds like the whole thing is built on "treating correlation as causation"? It's not clear to me how this classification ever became a scientifically acceptable basis to build research on.

Buster is a browser extension that solves captchas for you.

It leverages the fact that blind people should be allowed to use the web too.

github.com/dessant/buster

I love this for 2 reasons:

1. Fuck Captchas
2. Fuck Captcha Companies getting free labor from people to train AI.

I hate this because i fear if it catches on this will negatively impact blind people's ability to use the web.

See also points 1 & 2 re EVERYONE.

Meine Odysee mit einem gesperrten #Hetzner #server
Hetzner sperrte mir einen Server, weil sie von ihm einen Portscan entdeckten. Laut dump den ich bekam, probierte der Server IP Adressen von 235.185.x.x jeweils auf Port 443 durch, ob jemand zuhört. Portscans sind von Hetznerservern aus nicht erlaubt. Also wird die IP gesperrt. Der Server war mein Wireguard Endpunkt, also erstmal suchen, wo der Fehler liegt. Ein vermuteter Plasterouter wurde von mir aus dem VPN genommen, Server wieder entsperrt. Wenige Tage passiert das nochmal, und die IP wird wieder gesperrt.
Nur dieses mal will Hetzner den Server nicht mehr entsperren, auch wenn er komplett neu aufgesetzt ist, alle Keys fürs Wireguard neu erstellt, etc. Nein, da muss ja irgendwo noch ein Fehler sein, den soll ich gefälligst erstmal finden. Das war auch kein Scan mit hunderten parallelen Anfragen, es wurden in etwas mehr als 3 Minuten ein paar Hundert IP Adressen auf Port 443 angeklopft. Es war halt genug, dass die Erkennung bei Hetzner ansprang, aber es wurde keine Netzwerkkapazität beeinträchtigt.
Da ich mein VPN gerne wieder gehabt hätte geht die Suche also weiter. Die IP Adressen gehören Criteo, Online Werbung. Ah-ha, hat sich irgendwer Werbesoftware im VPN eingetreten? Zeitstempel des Dumps von Hetzner angeschaut. Siehe da, zeitgleich war ich mit meinem Rechner bei wetteronline.de
Eine kurze Suche nach Criteo und wetteronline bringt folgendes hervor: www.criteo.com/de/success-stor…
"WetterOnline verdoppelt die App-Umsätze mit Criteo Direct Bidder." Ah, ha. scannt sich da criteo etwa selbst? Also schnell ohne Überzieher, also Adblocker, auf wetteronline gesurft, und parallel einen TCPdump laufen lassen. Plötzlich kommt eine komische DNS Abfrage vorbei nach "gbc1.nl3.eu.criteo.com". Diese liefert 28 IP Adressen aus der gescannten range zurück. ( gbc2.xxxx bis gbc8.xxx liefern alle eine ähnliche Anzahl IPs zurück) Dann probiert irgendein Script auf der Homepage ein paar davon durch auf 443, bis es sich irgendwo verbindet.
Sprich criteo scannt sich selbst zum load balancing, und ich darf mich dafür rechtfertigen. Und so etwas findet man auch nicht in fünf Minuten raus, die Zeit hätte ich gerne anders genutzt.
Nachdem ich Hetzner mitgeteilt habe, dass eine Werbeschleuder sich selbst scannt, und versichert habe, dass ich den kompletten Criteo Adressblock per UFW ausgehend geblockt habe wurde mein Server wieder entsperrt.
Also, falls jemand UFW am laufen hat und keinen Bock auf criteo hat:
ufw deny out from any to 185.235.0.0/16

Kunnen we nou allemaal eens kappen met die term 'domrechts'?

Dat soort validisme is totaal onnodig, en moedigt mensen alleen maar aan om de dreiging van fascisme te onderschatten.

request for historical/scientific context, food/nutrition :boost_requested: 

There's this widespread claim that "highly-processed foods are bad for you". I'm not just talking about things like "high in sugar" here, but merely the property of it being 'processed' being considered bad.

Where does this idea come from? Does it have a legitimate scientific basis? I am seeing this argument pop up suspiciously often in the context of defending particular industries (meat, dairy).

PSA: If someone says their work/research/teaching is in “Ethics in AI” and they do not actively engage with social injustices caused by AI, nor with the work of marginalized scholars in this area, then they are not, in fact, doing Ethics in AI at all.

the mrbeast allegations (2) 

Can't edit my original post, but video CW addition: contains some AI-generated imagery.

Show thread

Important train station ritual: taking a photo of the parking sticker so I can find my bike again.

the mrbeast allegations 

Background: youtube.com/watch?v=k5xf40KrK3 (video CW: gambling, also the second video in the series talks about torture-level stuff.)

The allegations in this video are presented kind of chaotically, and it seemed like an odd mix of trivial and significant problems - while I don't doubt that at least part of it is true, I was kind of uncertain whether *all* of it was accurate.

And while I still feel that way... seeing the response from a current MrBeast staffer (x.com/chucky/status/1817832019) led me to conclude that however shaky the original allegations may have been, the defense is far *shakier* than that, and there's probably fire here, not just smoke.

@eniko congratulations!! Monumental achievements.

Just as an FYI for those who don't know why is this important. What is known behind steam publishing is that getting a 500 overwhelmingly positive rating puts a game in a select pile on steam. It "unlocks stuff and visibility skyrockets", so to speak.

Probably steam reps will not agree, but from anecdotal accounts things do change a lot for a game when this happens.

The again congrats eniko for this achievements. Well deserved 🦊 🎊

linux server security checklist 

@madcap @katnjiapus Or to put it differently and perhaps more concisely: "fiddling with all the subtle knobs and tradeoffs to get a perfect security profile" is the job of security experts and, especially, designers of systems who then package these decisions into simple-to-reason about policy options/defaults.

This is not something to expect from your everyday server admin, they should only need to select the simple-to-reason about policies - and if you feel that the available policies in existing systems aren't good enough, then that is best addressed by contributing to those systems, not by trying to tell individual server admins to deal with a highly complex landscape of unfamiliar security options.

linux server security checklist 

@madcap @katnjiapus Sure, fail2ban has other usecases, but in this case I was talking about SSH only - other usecases would fall under "application-specific needs" (because modern applications generally handle rate-limiting themselves, and do not need an external tool for this).

For "SSH only from home/office IP", a similar problem applies - it is very easy to lock yourself out if, for instance, your ISP suddenly changes your IP. These sorts of measures are not free to add, so before adding them, you need to understand very well what the tradeoffs are.

There are a million things you could do that theoretically, in some rare edge cases, some tiny amount of the time, might slightly help security - usually more by coincidence than anything else. Using fail2ban against SSH exploits is one of those cases; it is vanishingly unlikely to actually do that under real-world circumstances.

Stacking a ton of those "might as well" measures together is not actually good security policy - you just end up adding a lot of complexity (and therefore new ways for the system as a whole thing to fail, through human error or otherwise), with very little to show for it. It can easily end up making things worse.

So unless server security is your expertise, you should just stick with a small set of known-good security policies (like key-only auth) that has a clear and unambiguous security benefit, and leave it at that, honestly.

@mos_8502 From what I understand, if the contacts are sufficiently worn out along the way, chaining power strips (or any other sort of chaining of multiple imperfect connections) can cause some types of breakers to respond dangerously slowly.

One of the reasons I don't like and don't use "enshittification" is that it's inherently agentless and undescriptive

an opinion I feel is validated as I've seen its usage drift into "things getting worse over time" rather than the active thing-being-done by the capital holders

@vkc That's not normal, no. If they refuse to cooperate, I believe you can ask ICANN to step in and force the transfer.

The more I research into it, the more I think people should be grabbing their FA archives immediately.

Unfortunately the states involved in the legals don't just give you free access to business data like I'm used to, so I can't be entirely sure. Only mostly.

Show older
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.