Feel free to argue with facts. Hardening systems is my job.
HW/FW security researcher & Demoscene elder.
I started having arguments online back on Fidonet and Usenet. I’m too tired to care now.
Feel free to argue with facts. Hardening systems is my job.
This is not “the correct answer”. There’s absolutely nothing wrong with “exposing” SSH.
A few replies here give the correct advice. Others are just way off.
To those of you who wrote anything else than “disable passwords, use key based login only and you’re good” - please spend more time learning the subject before offering up advice to others.
(fail2ban is nice to run in addition, I do so myself, but it’s more for to stop wasting resources than having to do with security since no one is bruteforcing keys)
In Sweden a single Volkswagen EV model (ID.7) now sells as much as all the Tesla models together.
In the sense that it does use more of the fuel, like a breeder reactor, that’s good. We need to stop claiming 95% good fuel to be “waste” that needs to be stored for a long time and instead just use it all up.
As I wrote, at the time the MEPs in question believed this to be fully legal. I do not know any MEPs personally today.
Is it correct that the crime Le Pen was convicted of was hiring assistants to her parliament office who in reality were working for the national political party?
I’ve seen this claimed and if true I hope that a lot of people were convicted, not just her. Because I know for a fact that this exact setup has been used by other MEPs. At the time they believed it to be fully legal.
I’m happy she got convicted, but I don’t want this to in any way having been politically targeted because that opens up a shitload of worm cans.
Yeah, that was the point. When you require the world to serve your special needs expect to have to go to quite some lengths to get them.
Don’t buy features you don’t want.
Yeah, you missed how this is absolutely nothing like “we wank to you in-car videofeed”-Tesla and “we spy for the Chinese government”-BYD
A security hole exposing data that the users have agreed to share is nothing like companies willfully breaking user integrity.
You know this of course, you just don’t like being corrected.
I think your view on what happened is based on media headlines rather than the actual technical facts.
https://soundofdevelopment.substack.com/p/volkswagen-data-leak-location-tracking
This is a horrible take. VW are diligent in following GDPR and as an owner (yes, I am) you are constantly asked for exactly which permissions you want to give what service.
They had a misconfigured S3 instance. While bad, that’s not intentional - but you’re comparing it to “At Tesla we wank to your in-car video feed” and “BYD spies for the Chinese government” which is just a whole different thing.
Still no. Here’s the reasoning: A well known SSHd is the most secure codebase you’ll find out there. With key-based login only, it’s not possible to brute force entry. Thus, changing port or running fail2ban doesn’t add anything to the security of your system, it just gets rid of bot login log entries and some - very minimal - resource usage.
If there’s a public SSHd exploit out, attackers will portscan and and find your SSHd anyway. If there’s a 0-day out it’s the same.
(your points 4 and 5 are outside the scope of the SSH discussion)