Why don’t you use a Cloud flare zero trust tunnel? In this way you don’t need a public IP and open port on your router.
Why don’t you use a Cloud flare zero trust tunnel? In this way you don’t need a public IP and open port on your router.
Damn, now I get where is your “shitty individuals” coming from. Thanks for the info.
Why “shitty individuals”?
What’s there to laugh about? DNS protocol uses both ports: TCP for zone transfer and UDP for queries.
You can’t have TCP and UDP on the same port.
Why not? They are 2 completely separated set of ports. You can have a service listening on port 88 TCP while having another listening on port 88 UDP and they never know about each other.
@squirrel@discuss.tchncs.de 5$ is kinda nothing, but his 5$ plus my 5$ plus your 5$ and all the others that donates, it’s something
Good! What about feeding via HTTP?
This seems really cool! Right now I use GoxPod app in Nextcloud deeded by GPSLogger on my smartphone, but it uses GPX files and having hundreds of them it’s very slow. Is it possible to bulk import files on Wanderer? Can I feed it today directly from GOSLogger (by custom URL maybe)? Thanks!
@chebra@mstdn.io Thanks a lot for your time explaining that to me!
But the JS code could be checked on the webpage, correct? If so, the page could be trysted (if vetted).
@chebra@mstdn.io but the owner of the server could change it, could it be checked directly on the webpage of the service? Not that I will do it (I can’t, I can’t read that code), I’m just curious.
Oh, ok, now I get it. So it could be checked by a third party if that code is really created by the browser and if it’s not sent to the server, correct?
But it’s the server that creates the URL in the first place, so it must knows it, right? …or wrong?
Do you mind sharing with us what’s incorrect? I’m here to learn.
Oh, now I get it, the whole system works if we trust the guy that provide that system.
How it works: I don’t know about this service in particular, but usually the shared contains the encryption key so like this: example.com/files/file_id/encryption_key or something similar
But if the key is in the URL, that’s provided by the server, where’s the utility of the encryption since the server knows it and so does everyone that has the URL?
The recipients retrieve the encrypted data and decrypt it themselves
Ok, but how can the recipient decrypt it if he doesn’t have the key? The only thing that’s shared is the URL and if the key is in the URL, well, I don’t know what’s the use for it since the server knows it.
Send lets you share files with end-to-end encryption
How is this possible if the only thing that is shared between sender and receiver is just a link (that is provided by the website)?
How can we trust https://send.vis.ee/? Who are they?
Why post an article from 2022? Did something happen lately about K9/Thunderbird?
It is a MITM, but I think that for us self hoster ther’s nothing to worry about. What could they sniff? And it makes things easy.