• 0 Posts
  • 11 Comments
Joined 3 months ago
cake
Cake day: June 24th, 2025

help-circle
  • Client data absolutely is encrypted in TLS. You might be thinking of a few fields sent in the clear, like SNI, but generally, it’s all encrypted.

    Asymmetric crypto is used to encrypt a symmetric key, which is used for encrypting everything else (for the performance reasons you mentioned). As long as that key was transferred securely and uses a good mode like CBC, an attacker ain’t messing with what’s in there.

    I think you’re confusing the limitations of each building block with how they’re actually implemented together in TLS. The whole suite together is what matters for this thread.









  • 5e needs a better way to balance encounters than Challenge Rating. It also has important rules for players in the DM book. Both of which are problems you can work around.

    Yeah, it’s basically fine. It got a lot of new people interested in RPGs (and Critical Role certainly helped, too). If they’re all now looking for other systems to play, that’s fine, too.



  • Frezik@lemmy.blahaj.zonetoSelfhosted@lemmy.worldJellyfin over the internet
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    2
    ·
    3 months ago

    Nah, setting non-standard ports is sound advice in security circles.

    People misunderstand the “no security through obscurity” phrase. If you build security as a chain, where the chain is only as good as the weakest link, then it’s bad. But if you build security in layers, like a castle, then it can only help. It’s OK for a layer to be weak when there are other layers behind it.

    Even better, non-standard ports will make 99% of threats go away. They automate scans that are just looking for anything they can break. If they don’t see the open ports, they move on. Won’t stop a determined attacker, of course, but that’s what other layers are for.

    As long as there’s real security otherwise (TLS, good passwords, etc), it’s fine.

    If anyone says “that’s a false sense of security”, ignore them. They’ve replaced thinking with a cliche.