
Working on my new home (https://davidaugust.ghost.io/ on day 2 of my 124 day trial) for my articles and #blogging, I am realizing that unlike in the past, it might not make sense to use feedburner anymore.
My new home will allow me to have the whole thing served from a domain I own and control, including the feed.
Making a #proxy for the #feed, to preserve #subscribers if I were to change #tech or companies, seem a little superfluous. Am I missing compelling reasons to use #feedburner in 2025?
@BrodieOnLinux I am pretty shure @torproject / #TorBrowser and any #App that does #Proxy through @guardianproject / #Orbot for #Tor access is not affected but I do encourage both #Tor and Orbot devs to test against #LocalhostTracking!
Oh snap! `YARR - Yet Another RSS Reader` has a new version and I missed it in March!
https://github.com/nkanaev/yarr/releases/tag/v2.5
YARR is like Feedly or NewsBlur, except more like TinyRSS or FreshRSS - you can self-host.
UNLIKE those, you can tell yarr to run at `<ip:port>`, so you can stick it at port 7666 for your reverse #proxy. And its lightweight, I run my own AND 3 other instances for fam. members on the same host accessed via different subdomains re-proxied by #nginx.
#Cybercriminals Are Hiding #Malicious Web Traffic in Plain Sight
In an effort to evade detection, cybercriminals are increasingly turning to “residential proxy” services that cover their tracks by making it look like everyday online activity.
#security #privacy #malware #proxy
https://www.wired.com/story/cybercriminals-are-hiding-malicious-web-traffic-in-plain-sight/
My homelab got it's final touches. I finally removed #Nextcloud and switched completely to #Stalwart, i added automatic #database backups using #cronjobs for all my #databases, i've set up most of my publicly exposed services to run behind the #cloudflare #proxy, improved the directory structure for my #docker #containers, and finally set up pihole as the #dns server on my router. This feels so good.
@shoppingtonz @alternativeto @torproject granted, those cases are "nieche" as in "extreme low latency applications" are out.of scope for #Tor as they are intrinsically incompatible with a self-routing #Proxy network.
Just released: #swad v0.3!
https://github.com/Zirias/swad/releases/tag/v0.3
swad is the "Simple Web Authentication Daemon", your tiny, efficient and (almost) dependency-free solution to add #cookie + login #form #authentication to whatever your #reverse #proxy offers. It's written in pure #C, portable across #POSIX platforms. It's designed with #nginx' 'auth_request' in mind, example configurations are included.
This release brings a file-based credential checker in addition to the already existing one using #PAM. Also lots of improvements, see details in the release notes.
I finally added complete build instructions to the README.md:
https://github.com/Zirias/swad
And there's more documentation available: manpages as well as a fully commented example configuration file.
@nixCraft actually this screams "#GDPR & #BDSG violation" so loudly that even demanding #PII and espechally an #ID should get them sued by @noybeu and @Bundesverband ....
This isn't like a contractual agreement or some finance where one could argue "#KYC" is warranted "to combat #fraud"...
A general purpose HTTP reverse proxy and forwarding tool. Now written in Go!
did a thing!
Big problem in #selfhosting is making sure you've set things up right: #dns resolution, #ports, rev/ #proxy. _Sometimes_ its helpful to query _from the outside_ of your local network.
`canuseeme` - a single binary #webservice that will query the URI you give it and see if its reachable by randos/services on the internet. A bit like a #webproxy, but can exercise it programmatically, and not limited to HTTP/S ports.
@torproject same with #obfs4 bridges: there is no option to say like ports=80,443
or similar, which makes it cumbersome to get said bridges.
And trying to get places to #DontBlockTor that criminalize the use of #Tor is foolish at best.
This afternoon, I got close to what I wanted to achieve in terms of load-balancing between the two #AI #sabots I have running.
I had originally planned to use #OpenBSD's #OpenHTTPD or #RelayD to do the job, but #HAProxy #PROXY protocol was the limiting factor… so I went #nginx instead.
One thing I haven't worked out yet, is how to pass the client IP by PROXY protocol to a HTTP back-end. Seems I can do it for a generic TCP stream, but not HTTP.
The alternative is to set X-Forwarded-For, and have the back-ends trust it, like they trust PROXY for the gateway's IPv4 address for #sniproxy.
But… it works, you can hit https://sabot.vk4msl.com/ and you'll either get sabot01 (which uses nepenthes) or sabot02 (which uses iocaine). Since neither cares about the URI, I can bounce the client between them.
This did get me thinking though, if enough of us did it, we could have a #AISabotAsAService for websites to redirect/link to when they think they're being scraped by an AI bot.
We could provide a pool of servers that would provide the link maze. Front-end proxies would just bounce you between all the pool members, feeding your bot nonsense.
#Go Module Mirror served #backdoor to devs for 3+ years
A mirror #proxy #Google runs on behalf of developers of the Go programming language pushed a backdoored package for more than three years until Monday, after researchers who spotted the malicious code petitioned for it to be taken down twice.
#security
@TheDoctor512 @steampixel noice.
Idealerweise per #burp nen #MITM-#Proxy reinknallen und dessen Zertifikate in den Speicher des Smartphones/Tablets importieren?
Ich frage mich jetzt schon länger was 2025 die Vor- und Nachteile eines "Secure Web Gateway" sind?
Ein SWG ist ein (Forward) Proxy mit zusätzlichen Sicherheitsfeatures. Darunter z.B.:
- TLS-Interception
- Datei-Zerlegung
- URL Filtering
- AV-Scanning
- MIME Erkennung
- Datenverkehrmanipulation
Ein Download einer schädlichen Datei über einen E2E verschlüsselten Cloud-Anbieter (z.B. MEGA oder Filen) würde das alles aushebeln.
Aber um "Grundrauschen" abzufangen?!