Missed opportunity: "Support our dumbness" shoulda said "dumbasses" instead.
Self Hosted - Self-hosting your services.
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules
- No harassment
- crossposts from c/Open Source & c/docker & related may be allowed, depending on context
- Video Promoting is allowed if is within the topic.
- No spamming.
- Stay friendly.
- Follow the lemmy.ml instance rules.
- Tag your post. (Read under)
Important
Beginning of January 1st 2024 this rule WILL be enforced. Posts that are not tagged will be warned and if not fixed within 24h then removed!
- Lemmy doesn't have tags yet, so mark it with [Question], [Help], [Project], [Other], [Promoting] or other you may think is appropriate.
Cross-posting
- !everything_git@lemmy.ml is allowed!
- !docker@lemmy.ml is allowed!
- !portainer@lemmy.ml is allowed!
- !fediverse@lemmy.ml is allowed if topic has to do with selfhosting.
- !selfhosted@lemmy.ml is allowed!
If you see a rule-breaker please DM the mods!
lol! I honestly wonder did they plan it all to come out at the same time or is it just ai coding?
It looks fishy. Happy to see somebody putting something out there but if I am not reading the code I have to trust reputation and the age and number of stars on GitHub (although those can be bought too) are not doing it for me.
When will there be the next xz attack thingy?
It's open source, so you can read the code.
I absolutely could. That doesn't change my stance on this software.
The code hidden in xz was also publicly available and didn't get caught. So much for open source making all things safe just by being open source. And that was a high value target. Imagine what happens (or could) on a smaller scale.
Honestly now, are you reading code of a nice project You want to spin up in a docker to try out? I don't. I check the project and the stars/engagement. If it goes any further I check who is involved in it and that's about it.
Yeah, I had a Android application installed recently which strangely enough tried to reach my vaultwarden DNS? That sounded sketchy AF and just blocked it, removed it and cleaned every trace of it...
Right? It is even odder to me that the selfhosted newsletter shared it.
What is xz attack thingy?