Skip to content

The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says

Technology
97 56 294
  • digital sovereignty and you

    Technology technology
    3
    37 Stimmen
    3 Beiträge
    2 Aufrufe
    S
    "Now give me back my rights, you baldy bastard!"
  • 0 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet
  • 0 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • [Horses] Phones Ruined Everything

    Technology technology
    2
    1
    16 Stimmen
    2 Beiträge
    42 Aufrufe
    M
    I found this really interesting and thought provoking. I loved the line how ultimate optimism is not always misplaced.
  • 21 Stimmen
    19 Beiträge
    187 Aufrufe
    B
    The AI only needs to alert the doctor that something is off and should be tested for. It does not replace doctors, but augments them. It's actually a great use for AI, it's just not what we think of as AI in a post-LLM world. The medically useful AI is pattern recognition. LLMs may also help doctors if they need a starting point into researching something weird and obscure, but ChatGPT isn't being used for diagnosing patients, nor is anything any AI says the "final verdict". It's just a tool to improve early detection of disorders, or it might point someone towards an useful article or book.
  • Airbnb Hosting Assistants

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    27 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    1 Beiträge
    19 Aufrufe
    Niemand hat geantwortet
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    560 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.