remotelove

joined 2 years ago
[–] remotelove@lemmy.ca 5 points 7 months ago* (last edited 7 months ago) (2 children)

~~How much? Weight or volume?~~

I assume you mean weight.. Give me a sec and I'll take a guess.

[–] remotelove@lemmy.ca 9 points 7 months ago (4 children)

HF tools are not designed for the long term, generally. If you need a tool to work at least once, for one job that you are never going to do again, HF is "good enough".

The rule of thumb is to never buy a tool there that could result in a gruesome death if it fails to protect your life, like jack stands. (Invest in quality safety equipment first if you get something like an angle grinder.)

[–] remotelove@lemmy.ca 52 points 7 months ago* (last edited 7 months ago)

Let me check....

Sorry to say, we found your name on the list of cool people! High five!

[–] remotelove@lemmy.ca 1 points 7 months ago

I mean, sure. You do you, friend.

[–] remotelove@lemmy.ca -2 points 7 months ago (5 children)

It's a sideways chefs kiss. Also, something, something, penis size.

[–] remotelove@lemmy.ca 44 points 7 months ago (21 children)
[–] remotelove@lemmy.ca 44 points 7 months ago (1 children)

It's worse. We are reverting back to the age of lügenpresse and hearsay comes in short-form video formats.

Many people simply do not care (or are even aware) if a source is trusted if the message aligns with their own bias or the message is presented as a new "fact". Trust is irrelevant, unfortunately.

[–] remotelove@lemmy.ca 8 points 8 months ago (1 children)

"real" is subjective.

[–] remotelove@lemmy.ca 5 points 8 months ago* (last edited 8 months ago)

I would look into something like Doppler instead of Vault. (I don't trust any company acquired by IBM. They have been aquiring and enshittifying companies before there was even a name for it.)

Look into how any different solutions need their keys presented. Dumping the creds in ENV is generally fine since the keys will need to be stored and used somehow. You might need a dedicated user account to manage keys in its home folder.

This is actually a host security problem, not generally a key storage problem per se. Regardless of how you have a vault setup, my approach here is to create a single host that acts as a gateway for the rest of the credentials. (This applies to if keys are stored in "the cloud" or in a local database somewhere.)

Since you are going to using a Pi, you should focus on that being a restricted host: Only run your chosen vault solution on it. Period. Secure and patch it to the best of your ability and use very specific host firewall rules for minimum connectivity. Ie: Have one user for ssh in and limit another user account to managing vault, preferably without needing any kind of elevated access. This is actually a perfect use case for SELinux since you can put in some decent restrictions on the host for a single app (and it's supporting apps...)

If you are paranoid enough to run a HIDS, you can turn on all the events for any type of root account actions. In theory once the host is configured, you shouldn't need root again until you start performing patches.

[–] remotelove@lemmy.ca 3 points 8 months ago (5 children)

Nope. Can't read. You caught me.

[–] remotelove@lemmy.ca 2 points 8 months ago

I would consider The Onion several levels above a generic tabloid. Not even in the same class. Like, The Onion actually has class.

[–] remotelove@lemmy.ca 3 points 8 months ago (7 children)

Show me he stoned soldiers.

view more: ‹ prev next ›