So now your ISP sees all of your queries instead of CF. (Assuming the cloudflared option is using DoH)
I’ll trust Cloudflare over Comcast/AT&T/etc. any day of the week.
So now your ISP sees all of your queries instead of CF. (Assuming the cloudflared option is using DoH)
I’ll trust Cloudflare over Comcast/AT&T/etc. any day of the week.
I found it amusing that these posts were adjacent.
Hyper-V is decent. It’s VMM that is atrocious. Hopefully you don’t have Citrix with MCS catalogs.
Yeah, but that security patch level.
I believe you. I’m just saying their non-firewalls (i.e., switches and APs) don’t have that limitation.
My firewall is a Fortigate 60F.
I would never use their firewalls/gateways, but their switches are pretty good for the price and their APs are decent (although tbh after 3 generations my next AP will likely be an enterprise Aruba).
That said, I still use Unifi in docker, everything is up to date, and nothing is requiring a sign-in to the cloud. Am I missing something? If it’s just the firewalls, then I’m not surprised since I’ve never been remotely tempted to use them, but it sure isn’t all of their devices.
The definition I learned for web 2.0, as it was happening, was a shift from static web pages generated all at once on the server and delivered to the client whole, to using Ajax with in-browser Javascript dynamically changing already-delivered pages with back-end XML calls.
Look man, it’s okay to be wrong. It’s a natural part of growth.
But when you double down on your ignorance instead of taking the opportunity to open your mind and listen to the experts in the room, you just end up embarrassing yourself.
Try to be better.
We can restrict the use of software TOTP, which is what companies are doing when they move users onto the MS Authenticator app.
Admins can’t control the other TOTP apps like Google Authenticator or Authy unless they go full MDM. And I don’t think someone worried about installing the MS Authenticator app is going to be happy about enrolling their phone in Intune.
Edit: And even then, there is no way to control or force users to use a managed device for software TOTP.
This is incredibly well said and I agree 100%. I’ll just add that software TOTP is weaker than the MS Authenticator with number matching because the TOTP seed can still be intercepted and/or stolen by an attacker.
Ever notice that TOTP can be backed up and restored to a new device? If it can be transferred, then the device no longer counts for the “something you have” second factor in my threat model.
While I prefer pure phishing-resistant MFA methods (FIDO2, WHFB, or CBA), the support isn’t quite there yet for mobile devices (especially mobile browsers) so the MS Authenticator is the best alternative we have.
It’s on the higher end of battery usage but it plays remarkably well. I play locked to 45 FPS / 90 Hz and I think I’m using the default Proton.
Lol okay. Where was I defending Samsung? This all started with OP stating “the point of a samsung flagship is access to the S-pen” and “this defeats the purpose of a foldable” as if it was universal truth. It is not.
But that how most people on Lemmy are, at least in the tech communities. They have no concept of nuance and are completely unable to see other points of view. They were wrong. You aren’t even making coherent points. I am happily moving on.
What is hard? Learning? Besides, you’re only proving our point. Samsung (and the market) have determined that the “one size” that people want is the one without an S-pen.
But go ahead and downvote based on your feelings rather than facts. None of you own a foldable anyway so it’s not like your opinions actually matter here.
Same here. Parent poster needs to learn that other people have different needs and experiences than themselves.
I have several docker servers, but for Immich I want a dedicated VM. Regardless the problem isn’t going to be setting it up, that should be easy. But for something as important as this, I am going to pore over every possible architectural design decision from the storage tier to the HA and DR strategy. I don’t want to start migrating to it then realize I wanted to do something differently and have to migrate again.
If it’s replacing Google Photos for my family, I expect the same level of resiliency and data protection standards. Or at least as close as I can reasonably get.
In Chromium browsers you can simply type “thisisunsafe” to bypass even HSTS failures.
They mean CAA records:
https://developers.cloudflare.com/ssl/edge-certificates/caa-records/
That’s been my plan to move off of Google photos. Decided on Immich a few months ago. Now if only I had some more of that free time to set it up.
I know plenty account SNI already, but thanks. You might want to study more yourself, since we’re being condescending.
https://blog.cloudflare.com/encrypted-sni/