• 0 Posts
  • 40 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle

  • Yup. I read it as “compose and manage containers with systemd.”

    Sure, there is a k8s layer abstracted into podman to do this, but you don’t manage or interact with it. Everything is a systemd unit file, a simple text document with a well understood structure. Containers are started and logged like services.

    Easy, direct, tidy.





  • My teams new hire project manager was even more advanced. When they found out we were working on 5-10 projects at once with no PM, they quit.

    We had 3 PMs when I started here, and have been down to 0-1 for 6 months. That 0-1 runs a whole unrelated team, but is technical still a PM.

    Dysfunction is fun. The plus side? No one asks me for estimates.


  • mosiacmango@lemm.eetoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 months ago

    Yes and no. The auditing is likely the harder part. You can use something like tailscale or nebula vpn to get the always on vpn/ACLs. With a dozen or two devices, it should be doable at a home scale.

    If you want clientless zerotrust then you’re talking heavier duty things like Palo alto gear and the like.


  • mosiacmango@lemm.eetoSelfhosted@lemmy.worldZeroTrust Your Home
    link
    fedilink
    English
    arrow-up
    63
    ·
    edit-2
    2 months ago

    ZeroTrust is a specific type of network security where every network device has its access to other devices validated and controlled, not a statement on the trustworthiness of vendors.

    Instead of every device on a LAN seeing every other device, or even every device on a VLAN seeing other devices on a VLAN, each device can only connect with the other devices it needs to work, and those connections need to be encrypted. These connectioms are all monitored, logged and alerted on to make sure the system is working as intended.

    You do need to trust or validate the tooling that does the above, regardless of what you’re using.










  • Ehh. Depending on the industry and issue, thats wholley justified, not only from a “least privilege” sense, but from a regulatory one.

    Step over into cybersecurity and you end up spending all day clamping down on usability because the company has legal requirements to meet to continue to exist. Many of the things we are compelled to do are overeager and overly pedantic, but it’s either “do it, pay up, or shut down.” The execs tend to prefer “do it” in my experience, which makes everyone’s day a bit more tiresome.

    So its entirely possible that was out of their hands.



  • All over the article you posted:

    and since Floorp currently has no advertising, my own salary is, of course, zero. It’s just not going to last.

    I have made many plans, including earning development money on this projects, but all have been derailed by open source projects.


    There is some code in the closed source code to prepare for this. If these are forked, my hundreds of hours will have been wasted.


    The purpose is to learn how to publish code that cannot be used for forking as open source.

    I have to obligate the folks to choose whether they want to pay me or help me code.

    So hes forked the open source Firefox, added some polish, and is now miffed that others have taken his forked project and forked it themselves, because it cuts off a possible income stream he had planned. That code, the things he intended to profit from, is whats hidden in the “closed source” part of the repo. He says he will open source it eventually, likely after he figures out a way to profit from all of the code Mozilla kindly let him fork for free.

    He doesnt want anyone else to profit from the hundreds of hours of code hes added to the millions of hours of free code hes currently trying to profit from. This is of course a very reasonable and consistent moral stance in line with common open source principles.