• 3 Posts
  • 21 Comments
Joined 2 years ago
cake
Cake day: July 7th, 2023

help-circle
  • I’m not talking about snapshots. I’m talking about viewing the RAM of a running instance and having that be useful for anyone who managed to get it. And let me give you two simple reasons why it’s not going to be useful:

    • Encryption extensions at the CPU
    • Hypervisor resource evictions

    Unless you were to go and be on that instance at the exact moment something was happening (or shortly thereafter), that memory is going to be useless.

    Now, if someone were absolutely stupid, disabled CPU security extensions at the Hypervisor, AND did something like make a RAM disk and stored something on that-which is really just going out your way to leave a trail-then yeah, maybe you’d get something.

    The default of every hosting provider I’m familiar with is encryption by default on absolutely everything from the Hypervisor up except the disk, so I’m seriously doubting the claim of OP unless there is otherwise non-TMB information.

    Disk snapshots are another story if unencrypted.















  • If you don’t want to expose port 80 or 443, then just change the ports they are running on. Right now you’re mapping 80/443 in docker, so just change those numbers to something else if you don’t want to use them. The number on the right is the internal service port, and the left of the colon is the port you’re opening to proxy to the port on the left. Adding Caddy does exactly the same thing and serves no purpose except another layer of obfuscation you don’t need.





  • A solar cluster and whole house battery bank would do this for the majority of the day. You need to hook it into your AC circuit with microinverters, and then have a circuit switch to handoff power back and forth. You’d at least be sure to run off solar during the day.

    You could probably use yours for the same, but you need that AC transfer circuit into your breakers. Never do anything like this without an electrician.