• 0 Posts
  • 32 Comments
Joined 2 years ago
cake
Cake day: October 28th, 2023

help-circle
rss








  • I’d like to do the same, but atm I use nginx to serve all the web interfaces… And keycloak support is either a plus subscription feature or made to work with hacky Lua scripts.

    So for now it’s security through obscurity, I got a wildcard cert and the pages are accessed based on subdomain. So afaik nobody has a clue unless they start iterating common subdomain names. (At some point™️ I’m adding proper auth though)




  • It gets even better, each function of the port also needs proper support from the cable. Often cables do not support the full spec of usb to cut costs.

    While the symbols in the post are often put on computers, for usb cables this is seldom done (only a few brands do).

    Source: had to find a cable that supports both DP and PD to connect a portable external monitor after I lost the original cable. (1/9 cables worked)








  • In practice, there are several types of CAPTCHAs: text-based, image-based, audio-based and behavior-based.

    Computer scientist writing an article about captchas doesn’t know that proof-of-work captchas exist… Such a joke.

    Of course those don’t do much against automated fake form filling, but against DDoS they’re THE solution.

    Proof of work (PoW) captchas make the (computing) cost for the attacker exponentially higher than for the website. Basically the website creates a challenge, which has to be solved by the client/attacker before getting access to content. Best of all the website can set the difficulty of the challenge to anywhere from instant to seconds to solve, so normally the users don’t even notice it (as it runs in the background) but once someone starts DDoS’ing the difficulty goes up.