Skip Navigation
Mike
  • MSc. Computer Science Student at University of Stuttgart
  • Assistant at the CERT of the University of Stuttgart
  • Admin of QuantenToast
Posts
32
Comments
17
Joined
2 yr. ago
  • I figured I could simply upload them on our webserver, so here you go:

  • I can't imagine the sound of a room with like 20 pupils, each hammering on such a keyboard.

  • I'll do that! Question is where to post it. Lemmy doesn't support videos.

  • Mechanical Keyboards @lemmy.ml
    Mike @postit.quantentoast.de

    I too am now the proud owner of an IBM Model M.

    When 4 IBM Model M keyboards showed up during a cleanup at work (university) and I was asked if I wanted one, I of course said yes!

    It's an IBM model M 1394540 from 1992 with the PS2 connector and the detachable cable. The keyboard and cable are in very good condition, even the manufacturing sticker on the back looks pretty good! All keycaps present, all keys work. It just needed "some" cleaning which ended in a 3h long process haha.

    It will definitely be my daily driver for the next few weeks. I haven't decided yet if I will use it long term. I'm actually very happy with my modded Keychron Q6. Maybe I'll try some lube on the stabilizers and perhaps a little tape mod.

    The best part was that I got to take a second Model M with me, which I will give to a good friend. This one is also in great condition.

    It was an incredible day!

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    cross-posted from: https://lemmy.ml/post/6019673

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Tuya Smart Plugs (Wifi) - ESP Firmware Tasmota

    Aus vergangener Zeit hatte ich noch zwei W-LAN Steckdosen der "Marke" Aisirer herumliegen, welche Software von Tuya verwenden. Da ich keine Smart Home Geräte verwenden möchte welche nur mit Cloud-Anbindung - und erst recht nicht mit zugehöriger Software aus China - funktionieren, habe ich recherchiert wie man den in den Steckdosen enthaltenen ESP flashen könnte.

    Das erste Problem: Die neuen Modelle der Steckdosen nutzen gar keine ESP Module mehr. Glücklicherweise gehören meine Plugs nicht dazu.

    Für manche (ältere) Tuya Geräte kann ganz einfach Tuya Convert genutzt werden um eine andere Firmware zu flashen. Damit ist kein löten notwenig.

    Leider war die Schwachstelle, welche Tuya Convert ausnutzt, bei meinen Geräten schon geschlossen, weshalb doch nur noch löten blieb.

    Das Tasmota Getting Started ist sehr ausführlich und bietet eine gute Grundlage. Gerätespezifi

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Hackerangriff bei Hochschule Furtwangen

    Info von der Website/Startseite

    Liebe Studierende und Studieninteressierte, liebe Mitarbeitende der Hochschule Furtwangen,

    leider ist unsere IT-Infrastruktur von einem Hackerangriff betroffen. Daher steht die gesamte IT-Infrastruktur der Hochschule derzeit nicht zur Verfügung. Dies beinhaltet auch die E-Mail-Kommunikation sowie alle Zugänge, für die Sie Ihr Hochschullogin benötigen (auch von zu Hause aus).

    Betroffen sind neben unserer Webseite auch alle zentralen Services wie FELIX oder die Bibliotheken.

    Wann immer es Berichtenswertes gibt, informieren wir Sie hier umgehend über neue Entwicklungen. Die Nachrichten sind chronologisch sortiert.

    Mit freundlichen Grüßen Ihre Hochschulleitung

    Info von der FAQ Seite:

    Die IT-Infrastruktur der Hochschule Furtwangen ist am 18. September Ziel eines Cyberangriffs geworden. Nach ersten Erkenntnissen wurden Daten verschlüsselt oder gelöscht.

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Ein paar vorab Details zum Fairphone 5

    Zusammenfassung

    • Fairphone 5 wird in den nächsten Tagen vorgestellt, Preis: 699 Euro
    • Fokus auf umweltverträglichen Bau, 70% Fairtrade und Recycling
    • Erhöhte Modularität für einfache Reparierbarkeit
    • 8 Jahre Software-Support
    • 6,46 Zoll 90Hz OLED-Display, 8 GB RAM, 256 GB interner Speicher
    • Verbesserte Kamera mit zwei 50-Megapixel-Sensoren, 4K-Video
    • Akkukapazität von 4200mAh, Bluetooth 5.2, WiFi 6E, IP55
    • Vorstellung am 31. August, Verfügbarkeit Ende September
    Privacy @lemmy.ml
    Mike @postit.quantentoast.de

    Gumb is not GDPR compliant - Meeting Manager for Communities

    GDPR Compliance Check

    For those who haven't heard of it before, Gumb is

    A platform for managing meetings, gatherings, and events for communities of any size. - gump.app/en

    I have investigated this app because it is used by a club where I am occasionally active.

    Landing Page / Homepage

    Fonts: The landing page is using google fonts, so those fonts are loaded (8 requests) from fonts.gstatic.com when opening the website. The first issue here is that google fonts are not listed in the privacy policy at all. Second, by a German court ruling google fonts are not compliant with the GDPR:

    The use of external font services cannot be based on Art. 6 § 1 p.1 f GDPR, as the use of the fonts is also possible without having to establish a connection from visitors to external servers. - LG München Az. 3 O 17493/20

    Images: Furthermore the website is loading

  • I thought this would be visible with my link. Specifically shared the "show changes" Link but that doesn't seem to work.

  • Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    CVE Report for Damn Vulnerable Web Application (DVWA)

    cross-posted from: https://postit.quantentoast.de/post/45325

    In case you need a quick laugh, have a look at this CVE report.

    For context: quote DVWA Repo:

    Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, [...].

    cybersecurity @infosec.pub
    Mike @postit.quantentoast.de

    CVE Report for Damn Vulnerable Web Application (DVWA)

    In case you need a quick laugh, have a look at this CVE report.

    For context: quote DVWA Repo:

    Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, [...].

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Madison Reeves on why she left LMG

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    LMG Reagiert auf Community Backlash: 1 Woche Video Stop und weniger Videos

  • That one was really difficult and IMO the solution wasn't the best possible move...

  • cybersecurity @infosec.pub
    Mike @postit.quantentoast.de

    The Password Game - How many level can you reach?

    I stopped at level 24, but it was super funny!

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Nein das ist kein Passwort-Tester. Besser! Wer schaffts alle Passwortbedingungen zu erfüllen?

  • Nice, thanks for sharing! Mine looks like this atm:

    • HS: Mainly Docker containers and VMs
    • VPS: Wireguard to relay traffic (NAT) to the HS (SSL termination on HS)
    • UPS in case of power outage
    • Pi4 for backups within the local network. It also has a disk station for regular air gapped backup.
    • Pi3 for off site backup
    • Fire extinguisher nearby in case of emergency ^^

  • Die spannende Frage ist: Bekommt er das Bier erstattet?

  • Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    cross-posted from: https://lemm.ee/post/3809973

    Action by regulator follows £12.7m fine by UK for illegally processing data of 1.4m children under 13

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de
    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Hirne Hacken - Menschliche Faktoren der IT-Sicherheit

    media.ccc.de Hirne Hacken

    Die überwältigende Mehrheit der erfolgreichen Hacks in freier Wildbahn setzen auf menschliche Faktoren. Wie können wir Systeme und Interf...

    Hirne Hacken

    Die überwältigende Mehrheit der erfolgreichen Hacks in freier Wildbahn setzen auf menschliche Faktoren. Wie können wir Systeme und Interfaces gestalten, um diese Schwachstellen zu mindern?

    Ob Ransomware oder Phishing, APT-Angriffe oder Stalking: Die am häufigsten ausgenutzte Schwachstelle ist der Mensch.

    Ein Problem, das nur wenig Forschung tatsächlich angehen will. Stattdessen begnügen wir uns damit, den Usern Dummheit zu unterstellen und menschliche Faktoren der IT-Sicherheit "out of scope" zu sehen.

    Zeit, anders über das Problem nachzudenken, denn es gibt einige Interessante Erkenntnisse zu entdecken.

    Vortrag von Linus Neumann

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Beispiel robots.txt um ChatGPT auszuschließen:

     undefined
        
    User-agent: GPTBot
    Disallow: /
    
      
  • Been there, done that. Volatility is something you learn pretty early, yes. ^^

  • First: Good for you, enjoy the journey! Second: Just as others already pointed out, Mastodon is not really a beginner project. You want to understand what you are doing, not just make everything work no matter what. Some reasons why I'd not start with Mastodon:

    • Complex deployment stack (for beginners)
    • Needs regular maintenance
    • Security considerations (if you haven't managed/hardened a server before)
    • Long term project

    So instead: Have a look at awesome-selfhosted for ideas. A personal dashboard, photo gallery or a PiHole/AdGuard is a good start.

    About Docker; it's a bit more than just dependency separation. It's a kind of virtualization, but without each container running it's own kernel. Advantage is: Docker images run (with some configuration) relatively lightweight out of the box. So there's no need to install the applications natively. While I'm a great fan of Docker, you'd probably learn more installing things natively in the beginning. Or maybe do both, it's up to you. However, if you decide to use Docker, be sure to understand what's going on under the hood. That's where the fun begins. Everyone can pull and start images, but not everyone knows how to customize or build them themselves.

    No matter what you decide to do, have fun. And if you've any questions, there's plenty of documentation online or just ask. The selfhosting community is very welcoming towards new members ;)

  • Small Update: When uploading images from the tor mirror, they are stored in the DB with the onion address. One workaround I'm currently applying is running a script periodically that updates image links. It looks like this:

    UPDATE post SET url = REPLACE(url, 'http://your-hidden-address.onion', 'https://your-clear-domain.tld')

    And btw all this is for version 0.18.3 (to avoid confusion in the future)

  • Don't worry, nothing is easy in the beginning and yes, some docs are not up to date because Lemmy has such a steep development curve and therefore frequent changes.

    [...] i think i might try to do it again tomorrow after the frustration of failure of today is gone and i have some more motivation.

    Do have any other self hosting experience? Maybe a software that is a bit more easy to handle would be a good starter. With that, you can experiment and learn a bit, before starting a (long term) project that requires proxy, database, frontend, backend and configs to make them work together. Not to speak from the maintenance.

    Is it okay if i just ask my questions to you directly in this thread?

    Sure thing. I can recommend the Lemmy admin matrix chat as well (if you're a matrix user).

    Do you mean DynDNS with the automatic updates?

    What I mean is: best case is your provider offers an api which allows you to update the DNS records by running a simple script. What I would not recommend is using something like mylemmy.dyndns.org (or similar services) for a Lemmy instance.

  • Since your question is quite basic and general, I'll try to answer equally.

    1. Hardware: For a single user instance a Pi 3B+ is sufficient. Still, Lemmy can take up some storage space over time because of the images. So make sure you don't take the smallest SD card you have lying around. I assume you know how install an OS and get basic things running.
    2. Get a domain; there are many providers out there. Consider using a TLD of your country (e.g. .de, .fr). Domains are usually relatively cheap. You're most likely running your Pi at home, so check if you have a static IP address or if you have a dynamic one. First one? Great, go ahead. Second one: Check if your domain provider offers an API to automatically update the DNS record; example provider api.
    3. Have a look at the Lemmy administration docs. Depending on your experience, it is relatively easy to setup. Make sure you understand what you're doing, i.e. first get to know Docker for example, then follow the commands. If you don't understand something, just ask or search online. Lemmy is not very complex to operate, so for every part of the deployment you should be able to find information online.
    4. Set up port forwarding in your router for ports 80 (HTTP) and 443 (HTTPS). You can find information for your specific router online, but for some routers this cannot be done.
    5. Get a SSL certificate for your domain. You can get one for free with Let's Encrypt.
    6. Once you have your instance up and running, I would recommend setting it to "private" first. This way you can play around with your instance or reinstall if something goes wrong without having to worry about federation. Once you've federated (communicated with other instances, e.g. by subscribing to communities of other instances), you really shouldn't reinstall!

    I hope this helps you with the first steps. Decide for yourself if you want to deal with maintenance and administration "long term". It's perfectly fine to use other instances and not host Lemmy yourself if you don't feel up to it. After all, there is also a security aspect to consider. If you do: have fun with self-hosting!

  • Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de
    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Identitätsprüfung für alle: Putin verbannt Onlineanonymität aus Russland

    Tech'n Privacy @postit.quantentoast.de
    Mike @postit.quantentoast.de

    Tor-Mirror für QuantenToast Lemmy!

    cross-posted from: https://postit.quantentoast.de/post/23088

    🧅 Ihr steht auf Zwiebeln?

    Unsere Lemmy Instanz hat ab sofort einen Tor-Mirror! 🥳

    Ob er genutzt wird und ob sich der Wartungsaufwand lohnt, werden wir sehen. Aber fürs erste: viel Spaß beim anonymen posten! 🕵️

    http://postitlx2byjec2lq3haowhx6x6aa7cwoo4hdplg7vw3meuzxmsh5yyd.onion

    Lemmy Administration @lemmy.ml
    Mike @postit.quantentoast.de

    Lemmy Image Fix for Tor Mirrors

    Current State

    One controversial topic within the admin community is Tor. Many malicious actors that want to harm an instance hide behind the tor network, which is why many instances block traffic originating from Tor. The most common approach is to block requests from exit nodes, a list of which can be found here. Tor blocking is a valid principle that every instance operator must decide for themself. I do not condemn anyone for doing so.

    Motivation for Tor

    However, Tor is also a tool to use the Internet in an anonymous way, bypassing censorship or big firewalls. This means that there is a legitimate use case for the combination of Tor and Lemmy. There is even an official Lemmy documentation on how to run a Lemmy instance as a hidden service.

    The Issue

    There is, however, one significa

  • That's an interesting question. At the time being, I think the only way is to do regular backups and store them at a friends for example. That way an instance can be restored after the server has been taken.

    Really the only way is to not save anything, or perhaps some sort of blockchain for all the comments and posts?

    Blockchain is an interesting thought - or maybe something similar to Matrix. All instances have their own copy of a post and sync with each other. That way it doesn't matter if one instance disappears. Though, that would probably not comply with the Fediverse idea? Interesting thought experiment non the less!

  • I get your point. Then, why not start your own instance with rules that you approve? I know, easier said than done, but that's the nice thing about the Fediverse. Next to the general purpose instances, there are many "themed" ones with focus groups such as musicians, journalists and so on.

  • You lying to yourself or have unfounded expectations.

    Nobody mentioned any expectations hm...

    Everything on Mastodon is in plain text, there is no encryption, and servers get mirrored.

    That's 100% correct, and I think it's important to explain that to non-techy users.

    It’s only the login info that stays with the instance [...]

    Technically yes, but I'd cut the "only" because login info includes the users email. So in case of a raid or data breach, I'd like to know about it.

    The entire point of why Mastodon was ever started was censor evertbody that has the wrong opinion. Twitter wouldn’t delete people because of what they believe, so Mastodon was developed to ban IP address so only approved speech could exist on the internet as far as they are concerned and can avoid ackniwledging the real world. A high number of people on there, especially the admins, live in cult

    I don't know what places on Mastodon you've visited, but that's not the point of Mastodon or the Fediverse in general at all. But we don't have to start a discussion about that since you seem to already have made up your mind about it.

  • As far as I know they seize everything if there's a warrant. No matter whether it's relevant for said warrant.

    Edit: Sorry, misunderstood your comment; Don't know what the reason for the warrant was.