Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Help about MediaWiki
FUTO
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Introduction to a Self Managed Life: a 13 hour & 28 minute presentation by FUTO software
(section)
Main Page
Discussion
English
Read
Edit
Edit source
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
Edit source
View history
General
What links here
Related changes
Special pages
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Why Opening Every Port is Dumber Than an [https://rossmanngroup.com/unibody-macbook-pro-display-assembly-repair-replacement-service/ ''820-2330 Macbook’s hinge design''] === Here’s why exposing all of this directly is a terrible idea: '''You’re Advertising What You’re Running''': Any script kid with a port scanner can see exactly what you’re running. '''Your Software is Probably Full of Holes''': These projects are great, but they have 10,000 users, 5 of which believe they are entitled to 25 years of updates & bugfixes after a $3 donation, maintained by [https://www.explainxkcd.com/wiki/index.php/2347:_Dependency one person in their spare time], whose users are assholes that think [https://www.reddit.com/r/immich/comments/1codh0p/comment/l5rfpu7/ feeding yourself off of your work is too much to ask for]. <div class="figure"> <gallery mode="packed-hover" heights=250 widths=400 perrow=2> File:lu55028jxaty_tmp_37a2ee92.png </gallery> </div> If I were smart (and evil), I could make a list of: * Every IP address * What software they ran * What version they ran Then, I’d keep up with exploits/vulnerabilities that are announced in the news. I’d go back to my list & double check to see who’s running that software, and see if they work. At best, you become part of a botnet and waste some electricity mining my crypto. At worst, I’ve stolen all of your data & use it to blackmail you. I like these programs; they’re fun software! But, similar to my taste in relationships; it isn’t about '''who I''' '''''like.''''' It’s about '''who I''' '''''trust'''''. The software I have the most '''fun''' with isn’t who I’d trust with banking credentials (or my future children). Maybe I got that the wrong way around…. <span id="openvpn-only-1-port-to-open-with-better-security"></span>
Summary:
Please note that all contributions to FUTO may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
FUTO:Copyrights
for details).
Do not submit copyrighted work without permission!
To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:
Cancel
Editing help
(opens in new window)