The latest open weights model from google might be a good fit for you. The 26B model works pretty well on my machine, though the performance isn’t great (6 tokens per second, CPU only).
- 2 Posts
- 137 Comments
cron@feddit.orgto
Selfhosted@lemmy.world•Vigil - a self-hosted dashboard that watches your Docker imagesEnglish
1·11 days agoDoes it offer notifications?
3 of your docker containers have new versions available
With portainer business, you could easily build an update procedure yourself. Just create webhooks for the stacks you want to update and run a daily curl script that triggers these hooks.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•Study Uncovers 25 Password Recovery Attacks in Major Cloud Password ManagersEnglish
4·2 months agoWell done. Vaultwarden is quite easy to selfhost.
Similar approach here:
- Lexmark scanner witg ADF
- Scan to FTP (SftpGO)
- Paperless has the FTP folder as ingest
It doesn’t take more than 10 seconds to scan a doc this way.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•Sicherheitslücke - gesperrte Bezahlmethoden trotzdem nutzbar bei smartsteuer.deEnglish
4·3 months agoI think this is an english-speaking community. There is a german cybersecurity community at feddit.org (c/edv_sicherheit )
cron@feddit.orgto
Cybersecurity@sh.itjust.works•thoughts on this insider threat case?English
19·3 months ago- Why is the IT guy trusted with access to sensitive data after handing in his notice?
- Why does he have access to data that is probably not related to his job?
- Is access to the database monitored? It should trigger an alert if an employee accesses lots of data.
- Apparently, he successfully bypassed the DLP (Data Loss Protection) systems in place by using optical media.
And lastly, insider threats like this are really not easy to mitigate. You said that in this example it was an IT guy. There are lots of different ways to export data from a system when you have privileged access to servers.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•SoundCloud Data Breach Impacts 29.8 Million AccountsEnglish
10·3 months agoWe have completed an investigation into the data that was impacted, and no sensitive data (such as financial or password data) has been accessed. The data involved consisted only of email addresses and information already visible on public SoundCloud profiles.
Doesn’t sount too critical for me
They require an “data center” subscription now, and they will end support for that in 2029. So self hosting jira is basically not an option anymore.
Nice that you added “status=progress” so I can closely follow what is happening.
cron@feddit.orgto
Selfhosted@lemmy.world•BentoPDF is a self hostable, privacy first PDF ToolkitEnglish
3·4 months agoIs there a function to create a booklet or brochure?
This was a very useful feature to print a number of pages and have them in an easy format to read.
However, at least my Ubuntu print driver doesn’t have this feature, and I would need an extra tool to achive this goal.
cron@feddit.orgto
Selfhosted@lemmy.world•Do you rebuild your container images yourself?English
6·4 months agoI did it only once (yet) because i needed a specific addon for the software.
In my case, I wanted to use caddy webserver with a specific plugin. It was quite easy to create a new image exactly the way i wanted it.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•WhatsApp, Signal, untraceable security riskEnglish
1·4 months agoIf you want “mass surveillance” with thousands of suspects, millions of requests per subject (the paper mentions 20 requests per second IIRC), over weeks … you probably get blocked and/or caught.
Also, your suspects will be “significantly unhappy” if your espionage costs them 11-18% of their battery per hour. Even without other usage, the battery would be dead by noon.
And lastly, this attack uses so much bandwidth that video streaming is impacted. I would guess that it probably needs about 1 MBit, which is 11 GB per 24 hours.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•WhatsApp, Signal, untraceable security riskEnglish
6·4 months agoA service provider has no reason to do this. They see you moving around all the time. They can likely determine your location as close as a few hundred meters.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•WhatsApp, Signal, untraceable security riskEnglish
2·4 months agoBattery draw? There are other explanations that are far more likely.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•WhatsApp, Signal, untraceable security riskEnglish
4·4 months agoI guess that it could also be used to compare different people. Do they have fast and slow connections at about the same time? Then they might be spending time together.
This is clearly not for mass espionage, but at least a theoretical approach to confirm a suspicion.
cron@feddit.orgto
Cybersecurity@sh.itjust.works•NVIDIA research shows how agentic AI fails under attack - Help Net SecurityEnglish
1·4 months agoWould be interesting to see this from a pentester’s perspective. But it sounds pretty annoying to find flaws that only occur in a small percentage of cases - and need very long time to run (compared to e.g. SQL injection attacks).
cron@feddit.orgto
Selfhosted@lemmy.world•Decreasing Certificate Lifetimes to 45 DaysEnglish
2·4 months agoThe maintainers of the big web browsers have pretty strict rules for CAs in this list. If any one of them gets caught issuing only one certificate maliciously, they are out of business.
And all CAs are required to publish each certificate in multiple public, cryptographically signed ledgers.
Sure, there is a history of CAs issuing certificates to people that shouldn’t have them (e.g. for espionage), but that is almost impossible now.
cron@feddit.orgto
Selfhosted@lemmy.world•Decreasing Certificate Lifetimes to 45 DaysEnglish
5·5 months agoFor 3 more months or so, you can’t buy them in april 2026 anymore

The article explains exactly what it did measure and what this does not mean: