Migrated account from @[email protected]

  • 3 Posts
  • 235 Comments
Joined 1 year ago
cake
Cake day: April 9th, 2024

help-circle


  • I waffled back and forth on a docker install. Outside of the initial panic to reinstall the OS (Ubuntu 24.04 for me), it was relatively straightforward outside of the config. It may be worth it to dockerize it so I can git control the config but not sure how easy it is under v6. They really changed how the files are parsed.

    Before pihole was essentially a frontend for dnsmasq but it seems like it’s a bit more than that now. I haven’t had the chance to look too much under the hood.

    If I’m being honest, I’ve wanted to off-load pihole to my router but lack the time and patience these days. I’ve reached the point in my life where IT isn’t the most important thing anymore and just need it to work.














  • When you’re discussing your own OPSEC (Operational Security for those unaware), you have to evaluate and determine your personal threat profile. Generally speaking, you need to determine what risks you’re willing to accept, what risks you’re willing to mitigate, and what risks you will not tolerate. There’s a whole field of IT dedicated to this but the general idea is for you to understand that there is no perfect solution and everything is a trade off.

    There is an inherent risk to downloading pirated software, especially software that you use for private activities (e.g. finances, etc.). With today’s landscape of mining crypto, I’d go so far as to say almost any pirated software is at risk of this.

    I would agree that generally playing media files is relatively low risk (though there was a vulnerability I read about a few years back of a zip-type attack. The details allude me at the moment).

    But for executables, you basically have two options:

    • spin up a VM to host your executable, sandboxing it from everything else.
    • trust the people who are providing the executable and run it on your computer

    Personally, I avoid pirated executables. More often than not I can find a similar open source product that I can download. My risk tolerance is not only low, but I don’t see the benefits of using a particular company’s software especially if an open source is available.