• 0 Posts
  • 16 Comments
Joined 3 years ago
cake
Cake day: June 9th, 2023

help-circle


  • To achieve a compromised update you either need to compromise the update infrastructure AND the key or the infratstructure AND exploit the local updater to accept the invalid or forged signature.

    As i said, to compromise a signature checked update over the internet you need to compromise both, the distributing infrastructure AND the key. With just either one its not possible. (Ignoring flaws in the code ofc)











  • The ‘immediate attacks’ ppl mention is just static background noise. Server / scripts that run trying to find misconfigured, highly out to date or exploitable endpoints/servers/software.

    Once you update your software, set up basic brute force protection and maybe regional blocking, you do not have to worry about this kind of attack.

    Much more scary are so called 0-Day attacks.

    1. No one will waste an expensive exploit on you
    2. It sometimes can happen that 0-Days that get public get widly exploited and take long time to get closed like for example log4shell was. Here is work necessary to inform yourself and disable things accorsing to what is patched and what not.

    As i already said, no one will waste time on you, there are so much easier targets out there that do not follow those basic rules or actually valuable targets.

    There is obviously more that you can do, like hiding everything behind a VPN or advanced thread detections. Also choosing the kind of software you want to run is relevant.




    • Truenas Scale - Comercial NAS OS. I bit of work to get started, but very stable once going.
    • Unraid - Enthusiast focused NAS OS. Not as stable as Truenas, but easier to get started and a lot of community support.

    Since OP wants to use Docker i would not recommend either. Trunas scale does not support it usefully and the implementation in Unraid is also weird. Also the main benefit of unraid is the mixing of drives, OP wants to raid.