• 0 Posts
  • 22 Comments
Joined 2 years ago
cake
Cake day: December 11th, 2023

help-circle


  • True. Maybe it was not the best phrasing. It may apply to some email providers (eg. Proton) if email communication happens only between recipients of the same provider, which is rarely the case.

    I mentioned this to highlight that if this pressure is put on legitimate secure services like GrapheneOS, then you can imagine that your email data is scrutinized without your knowledge.




  • If privacy is important for you, https://anytype.io/ has E2EE (End-to-End Encryption). You can run your sync nodes also. Personally, I’ve used Roam Research, Doom Emacs, moved to Logseq, then Obsidian, back to Logseq and now I’m using Anytype for two years.

    Edit (hit post by mistake): The encryption part was not a must for me also, but then I started using my notes in my work laptop also and I didn’t want my notes stored in plain text on a computer which is not fully controlled by me. I’m mentioning it because over time you’ll have many, many notes and the transition from one tool to the other is very time consuming.








  • There are a couple of things to cover here:

    1. Keep your software/containers up to date. You can subscribe to the GitHub repo and configure it to get notified for new releases and security alerts. Complementary, you can use RSS feeds, newteleases.io and/or WUD (What’s Up Docker) and add labels to your docker compose files. Personally, I check the notification once a week and change the version for all minor tools I’m using. If there is a major release (or new Immich version) I read the changelog and update instructions (if it’s the case).

    2. For container security scans, you can use Trivy, but the problem is that you don’t have a centralized overview of your scan results. For this you can use DefectDojo. Depending on the case/threat model, vulnerability management for self-hosted things might be overkill, but highly recommended of you want to learn more about this. It worth mentioning Trufflehog as secrets scanner and sops as a solution to encrypt sensitive data so you can push it to git/SCM.