(no title)
old-gregg | 9 months ago
When I'm thinking about a hypothetical situation when I need to save the world by hacking into a hypothetical villain, my best hope will be him using your approach to security.
old-gregg | 9 months ago
When I'm thinking about a hypothetical situation when I need to save the world by hacking into a hypothetical villain, my best hope will be him using your approach to security.
lolinder|9 months ago
For now my threat model consists of script kiddies and abusive corporations. Self-hosting gets me away from the corporations and keeping my stuff off of the public internet keeps me away from script kiddies.
bigfatkitten|9 months ago
It certainly helps when your attack surface consists of numerous web apps of unknown quality.
Drive-by RCEs (e.g. log4j) then suddenly become much less of a headache when none of it is reachable by the world at large.
Exactly how you do that, whether via an authenticating reverse proxy or VPN doesn’t really matter.
gugagore|9 months ago
marcusb|9 months ago
You will without exception need to provide an email address to access these white papers, so their inside sales team can ensure you fully understand the importance of trusting their zero trust, and not trusting anyone else’s.
I’m not kidding - even a little.