Incessant tinkerer since the 70’s. Staunch privacy advocate. SelfHoster. Musician of mediocre talent. https://soundcloud.com/hood-poet-608190196

  • 8 Posts
  • 153 Comments
Joined 4 months ago
cake
Cake day: March 24th, 2025

help-circle

  • Now that’s an interesting angle. I am a mediocre musician on my best day, but sometimes I incorporate phrases and lyric snippits in a piece. I wonder if I could use WhisperX to find those words or phrases from a stack of songs. For instance, I did a piece that used a line from Jimi Hendrix’s ‘If 6 were 9’ where he says ‘I’m the one who’s gotta die when it’s time for me to die. So let me live my life the way I want to.’ I wonder if WhisperX could pick that out of a stack of Jimi Hendrix songs.







  • irmadlad@lemmy.worldtoSelfhosted@lemmy.worldGot my first script kiddy
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    24 hours ago

    Thing is, for the average consumer of the internet, they have no real concept what’s going on behind the webpage with the fancy graphics they happen to be looking at. When I try to explain to them that bots comprise conservatively 40-50% of all internet traffic which is about ~2 zettabytes per 24 hour period, they still don’t get it. And really, they don’t have to, that’s the job of sysadmin. It’s still pretty mind blowing.




  • Meh. I know everyone is giving OP the piss, but I used to fret about this type of stuff long time ago. LOL That became a job. Then I learned a little more and realized I wasn’t being targeted specifically by some hooded specter in a dimly lit basement emphatically announcing ‘I’m in!’, but that these were bots. Sophisticated bots tho, I’ll give them that.


  • Not on AWS and yes I know I can’t stop port scanning and bad traffic is a thing. Doesn’t stop me from filling out the form.

    On occasion, if they end up in recidive, I’ll report them to AbuseIPdb. If I did it for all attempts, I’d be as busy as a squirrel in a nut factory, because the bots are thick out in the ether. Like every minute of the day they’re out there throwing rocks at the castle wall. I had to start logrotating because logs were getting so big it was difficult to review and audit. Every so once in a while, they’ll break out the trebuchet and lob something significant, but I’ve had no breaches to date.

    My servers are single user only, so buttoning things down is a little less complicated for me.



  • irmadlad@lemmy.worldtoSelfhosted@lemmy.worldGot my first script kiddy
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    1 day ago

    I am reminded of a Richard Pryor skit in which he tells about a football player he knew who bit the fingers off of an opponent who was trying to gouge his eyes through his helmet. When Pryor asked him why he bit the guy’s fingers off he said ‘Everything outside the mask is his. Everything inside the mask is mine.’




  • VPN - I currently pay for Proton, and we use it on the FireTV, but it sucks cause it doesn’t have killswitch.

    I have been using Private Internet Access so long I can’t remember when I first started but it’s been years. I’ve had great success with PIA and I never fire up a device locally without it. It does have a killswitch, advanced killswitch, split tunnel, multi-hop with shadowsocks or socks5 proxy, openVPN or Wireguard configurations, and a dedicated IP option.

    I’ve tried other top name VPNs, but imho, none come up to what PIA does.


  • Hey bro. I’m just a FNG here, but I’ve found that the more detail you can give, the better the results (answers) will be. However, two sentences about a Cloudfare error is probably not going to garner much interest. People here I’ve found, are willing to help, but they can’t guess what it is you’re talking about.

    Kind Regards


  • Sure, but there are a lot of things you can do with the use of a good firewall, Pi-Hole, VPN, et al, you can mitigate those leaks. Anytime I fire up a new piece of software, my firewall pops up and says ‘Hey bro, you really want this chatty piece of software running uninhibited on your network?’ and here I go plugging holes. It’s not 100%. Some software absolutely refuses to work unless it has internet access. Bluebeam comes to mind. You do what you can, and decide if the hardwired software is something you really need or not.


  • The same thing can happen even when you are first doing the setup process.

    I might get a bit too stressed about standing up a server than I should, but this notion has always been in the back of my mind, prompting me to hurry the fuck up and secure everything before some bot detected I was remiss we in having this or that in place in the initial setup. So, it’s like a sprint trying to get all security in place.

    I don’t share my servers with others like a lot you guys do, so it’s a little simpler. Implementing host.allow and host.deny (ALL:ALL) does the trick. Over the course of 24 hours, I think, conservatively hundreds of bots visit.