Using this client:
Oisteink
The issue is if it can be used as an attack vector. The article and the presentation that was translated indicates it is, but it seems to require root/firmware access to the device. Thats like saying your fridge is insecure as I can open it if i manage to break into your house.
The issue with links like this is that its been discussed in many places all over the internet, but the link was still posted without op doing due diligence. Maybe not done in bad faith, but it still spreads misinformation. Like I said; why post if you don’t understand or can verify? Clicks and points??
Ah - i registred ages ago, but had to dismiss some silly popups and find the dropdown to show my local content. Im on ios if that matters. Might not be my type of social media anyways, i like to follow topics and not people
It’s a common way to interface with subsystems like wifi/bt/802.15.4 etc. you need physical access to the device or the ability to infect the firmware. If you can flash the device with your own firmware it’s already compromised
More info on the HN thread discussing the article. I dont read HN, but top comments had a bit more insights than the scare-mongering «news» article
Never understood mastodon. I need to follow people for it to start working? Why would i want to create my own echo chamber?
This is misinformation- why spread links your don’t understand? Is this russia??
Theres no millions to message though. Some of the accounts are the same people, just jumping servers to fine one that works for them.
Could be propaganda as well - why not scare the monkeys with the bad Chinese? Without ESPs the market is so much easier to control.
Note:I use both the ES8266ex and different ESP32s in my projects.
*Bri’ish
It always predicts the next word based on its tokenisation, data from training and context handling. So accuracy is all there is.
Theres a subscription for this that works kinda like that.
Otherwise a vpn into your hone network gives you access from your devices. Maybe your router already supports this, otherwise tailscale or zerotier and similar can be a good solution.
I dont have issues exposing my ha to the internet through caddy, but i filter traffic based on country of origin (geoip2). Used to have separate auth in front but i removed that a few months ago
Edit: not too much use of running two containers if you expose the same storage to both. Better option would be to have two reverse proxies, one for local and one for internet, both proxyinf the same ha instance. That way you can get ha on normal https port with certs.
Imo you are pretty safe with a reverse proxy with an extra layer of security.
Yeah - but it’s not presented as: this could be harmful for your compromised devices. If it was I would have no objections