You’ll need to provide all the sites you visited immediately after each of the ones you searched. Your origin header will give that info away freely. So if it’s in the query parameters of the URL, then you go to Facebook, it’s as easy as {k: v for k, v in (pair.split("=", 1) for pair in response.headers["origin"].split("?", 1)[-1].split("&"))}
- 0 Posts
- 13 Comments
partofthevoice@lemmy.zipto
Open Source@lemmy.ml•Switzerland government release full FOSS LLM under Apache 2.0, argue for AI as Public Utility
0·17 days agoI’m not knowledgeable in this area, but I wish there was a way to partition the model and stream the partitions over the input, allowing for some kind of serially processing of models that do exceed memory. Like if I could allocate 32gb of ram, and process a 500gb model but at (500/32) a 15x slower rate.
partofthevoice@lemmy.zipto
Open Source@lemmy.ml•Pebble Watch Software Is Now 100% Open Source
0·17 days agoCan’t, he’s too busy with Tasker profiles.
partofthevoice@lemmy.zipto
Open Source@lemmy.ml•Switzerland government release full FOSS LLM under Apache 2.0, argue for AI as Public Utility
0·17 days agoThat’s news to me, unless you’re only referring to the smaller models. Any chance you can run a model that exceeds your ram capacity yet?
partofthevoice@lemmy.zipto
Open Source@lemmy.ml•Switzerland government release full FOSS LLM under Apache 2.0, argue for AI as Public Utility
0·17 days agoSadly, we’ll most likely see an influx of regulation right when it’s broadly accessible to the general public to run locally.
partofthevoice@lemmy.zipto
Selfhosted@lemmy.world•Rybbit - Open source Google Analytics replacementEnglish
0·19 days agoAgain we’re talking past each other. I’m sure those results are available and I’m aware docker doesn’t verify signatures automatically, but I’m asking how that necessarily makes docker insecure in spite of best practices being implemented. It’s about pinning yourself to trusted digests and having a verification process (like time) before updates. Why would you need authorship verification in that case? If there’s a good answer to that, I’d consider alternatives too. I’m just saying I don’t think it’s inherently insecure over this, and at face value It boils back down to the classic: don’t download untrusted software.
partofthevoice@lemmy.zipto
Selfhosted@lemmy.world•Rybbit - Open source Google Analytics replacementEnglish
0·19 days agoYou’re making big claims on security here, like “cannot be done,” and each time you do I feel like we’re talking past each other a bit. I never claimed you can verify that the person who pushed the container had access to a private key file. I claimed you can verify the security of a container, specifically by auditing it and reviewing the publisher’s online presence. Best practices. Don’t upgrade right away, and pin digests to those which can be trusted.
When you pin a digest, you’re not going to get a container some malicious agent force pushed after the fact. You pinned the download to an immutable digest, so hot-swapping the container is out the window. What, as I understand, you’re concerned with is the scenario that a malicious actor (1) compromised the registry login beforehand, (2) you pinned the digest after hand, and (3) the attack is unnoticed by you and everyone else.
I’m trying to figure out under what conditions this would actually occur, and thus justifies the claim that
docker pullis insecure. In a work setting, I only see this being an issue if the process to test/upgrade existing ones is already an insecure process. Can you help me understand why I should believe that, even with best practices in place, Dockers own insecurities are unacceptable? Docker is used everywhere and I’m reluctant to believe everyone just doesn’t care about an unmanageable attack vector.
partofthevoice@lemmy.zipto
Selfhosted@lemmy.world•Rybbit - Open source Google Analytics replacementEnglish
0·19 days agoYou’re talking about authorship. Sure. But if you verify the container yourself as secure and pin the digest, what’s the issue?
partofthevoice@lemmy.zipto
Selfhosted@lemmy.world•Rybbit - Open source Google Analytics replacementEnglish
0·19 days agoWhat are you talking about, “yeah that’s the insecurity I’m talking about.”
I didn’t mention an insecurity and neither have you. Would you mind being a little more clear than “Docker pull is insecure?”
Frankly, I was expressing confidence in dockers security. It goes without saying though, any user can do insecure things like download from untrusted sources. That’s not dockers problem though, it’s the users.
partofthevoice@lemmy.zipto
Selfhosted@lemmy.world•Rybbit - Open source Google Analytics replacementEnglish
0·19 days agoYou can verify the checksum to ensure the contents pulled are exactly the same as what was published. You can also use a private container registry.
How exactly would docker pull be any more insecure than something like pip install? Or, really anything… Let’s go with your preferred alternative, how are you going to get it on your machine in a more secure way than docker provides?
Docker uses TLS with registries, layers and manifests have cryptographic digests, checksums, and you can verify the publisher yourself. Push it into your own registry if you want, or just don’t use
latest.
partofthevoice@lemmy.zipto
Selfhosted@lemmy.world•Rybbit - Open source Google Analytics replacementEnglish
0·19 days agoDocker is a security risk? … excuse me, what? Can’t you just, idunno, secure the environment that docker runs in? Use rootless images? Use immutable images?
And, are you asking for something that runs on bare metal? Couldn’t you just install the ISO that the dockerfile uses, then convert the dockerfile logic to an sh script?
partofthevoice@lemmy.zipto
Privacy@lemmy.ml•Self hosted private underground social media platform called Nanogram
0·1 month agoSorry for asking, but what are the chances this gets an IOS release?
Yeah, thought that was going the other way for a second.