I think he’s saying they don’t have to if they can read it off of your pc or the server before it’s even encrypted. OS backdoors, in-app backdoors, hardware backdoors inside the CPU like Intel ME…
I think he’s saying they don’t have to if they can read it off of your pc or the server before it’s even encrypted. OS backdoors, in-app backdoors, hardware backdoors inside the CPU like Intel ME…
Good to know hahahh i might
I went through all the endings in under two hours and spent the rest of the afternoon in intense terror about the idea of eternal life and the possibility of eternal suffering…
Probably not what the author intended, but I’m not playing it again.
You’re right, and nothing wrong with being pedantic when working with code :)
What does round filing dmca requests mean?
Me too, but I never found it helpful. What’s your experience in using it in life?
This. Also, make sure the proxy is proxying websocket traffic as well. I do it with pure nginx like this:
server {
listen 80;
server_name example.com;
location / {
proxy_pass http://192.168.1.100:8123/;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# WebSocket support
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}
I’m not arguing for cloud flare hahahh it’s horrible. I’m just saying, it’s just one of many ways your data is taken. I don’t see why the backdoors I listed should be used for targeted “attacks” only. They call it telemetry and it’s “used to improve the product you use” hehehh