Summary: France “requesting” Telegram keys.
Summary: France “requesting” Telegram keys.
You can remove that, if you are good with Windows you can clean up that pretty much. The problem with Apple is their UI bugged, stupid bugs and lack of decent UI like grid Windows and more features that just Windows has by default, and KDE has even much more. Pretty stupid to pay for an Apple.
What?.. Premium is just like a tier, quality, aesthetic and exclusivity can be on premium tier perfectly, I don’t know what you want to say with that.
Apple users are ignorant and buys Apple products lied by marketing thinking they’re getting premium products, quality, aesthetic or exclusivity, whatever, but Apple tries to make them feel like a premium product while it’s basically trash and worse than a Windows.
It’s funny because I only see stupid bugs on Apple and people still thinks it’s premium material. It’s buggy shit (bad UIX), expensive as shit.
Well if you refer to the torrent to DDL then you are right that there are other better ways. But as he said channels also, I know it’s easy to find movies and series searching on channels, so I thought he meant that.
It’s not a torrent but an alternative to download piracy content, as you could go to another web service like Lemmy or Youtube. Many webs have their code private also. On Telegram, at least the frontend is open source.
Can use the Telegram to download torrents media (videos, movies, music), why not?
yt-dlp -f bestaudio/best --extract-audio --embed-metadata --embed-thumbnail --recode opus --audio-quality 0 $YoutubeLink
I already know about network security.
It does matters if you expose your IP.
That’s why tunnels like Cloudflare and AWS exists to serve your home services to the public without exposing your IP. https://www.kali.org/tools/routersploit/ is a tool for example to target routers, if bad hackers can make botnet to brute force your servers 24/7, they can implement other exploits and you better don’t take any mistake any day.
The only safe device is the one isolated from internet and others connections. If you really want to learn to have your own home lab, then learn it → https://tailscale.com/ and stop being lazy, there is no need to expose your IP, there is absolute no reason unless you are that lazy, but even you said you prefer paying a cheap VPS than messing with it.
Say it again, let’s keep this loop going, but work a bit more on your responses.
They can learn that all without exposing their IP. You don’t really get it, huh… good luck.
I’m getting a bit tired of your replies.
Basically you learn everything from start to finish. Maybe you could even setup a proper VM host using proxmox or something.
The cost of a server at home as you are saying is much more than hiring it online. The only difference is how you boot the BIOS to install the ISO burned into a USB. A hosting service would require you to do it different, and you will anyway learn it in this way, which could help you in the future to deploy some product ready or for your work. So there is no difference at all, and you also need to secure it.
So as expected it isn’t really risky as long as you take the appropriate security actions.
I don’t know if you really read it. It is saying that you can never expect when a new 0-day vulnerability comes out. Like: https://venafi.com/blog/ssh-vulnerability-allows-authentication-without-password/ → “attacker could successfully authenticate without any credentials”
A VPS doesn’t solve any security issues with your website itself.
Yeah, it solves that they only infect your server on a hosting provider and not your home where you have your phone, router, more devices where they can test more exploits to them. Also, your hosting provider normally also monitors for suspicious requests so if it is infected, your provider will inform you of suspicious activities.
You will learn much more with self hosting at home though. Which is arguably worth much more.
Much more? It’s the same… What’s the difference?
Why is it a risk?
I’m of course referring to a real DMZ and not a DMZ host.
Maybe but why would it matter, especially enough to pay cloud bills?
Because we are talking home-made stuff, we didn’t talk about a real firewall or any infrastructure, and even doing that is much more expensive than the cheap VPS.
I have a cheap VPS for my website but that is just because I’m behind a CGNAT and I won’t bother to solve that.
Same, that’s why I am saying there is no need to expose your IP, unnecessary risks.
https://en.wikipedia.org/wiki/DMZ_(computing)#DMZ_host -> By definition, this is not a true DMZ (demilitarized zone), since the router alone does not separate the host from the internal network.
Home routers aren’t firewalls or something similar, they have some minimal logic that can act like a firewall, but they aren’t. There is no need to expose your IP, there are many alternatives to do stuff without exposing it.
I already have my own router, even if a web server is safer, you are still exposing your IP which is what I don’t want to do. DMZ doesn’t solve anything, is just worse than setting up a port forward as you are opening all the ports to the server at home, your server at home has access to all your network so once infected by any 0-day exploit, you are fucked up.
I just hire online servers and I have my own Ansible playbooks to manage those servers, this way I don’t provide my real IP (my home) to anyone.
Why are you saying that? I know it’s not a firewall, I’m just saying it doesn’t expose your router directly to internet, most of the routers also have firewall, and you can DMZ or port forward that you normally turn them on once you expose your router to public so bots or people can make direct requests to your router.
Yeah, I would do that before exposing my router to public and opening ports, but for the tunnel I would use something like WireGuard into a virtual network at my home just to improve security. I’m not a fan of Cloudflare.
I’ve run a small public web server for well over a decade and never had any issues with hackers.
It’s never late to get hacked or an attack or a problem with your ISP router firmware. I don’t think that’s an excuse.
receive backups from my other servers
You can simply do cronjob and scp user@server:/path/to/backup .
to get things from server to your local network, I don’t see the need to expose your router to the public. For a web server, there are cheap VPS providers for less than 5 dollars a month, and you save up energy, hardware, and improve safety at home.
But the act to put him on prison is a way to request the access for no longer asking. Depends on how much Pavel Durov can handle this torture.