• 0 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: January 24th, 2024

help-circle








  • If you’re running externally, use a cloudflare tunnel.

    No ports exposed = no attack surface. This is 99% of security.

    HTTPS is provided by CF although only secures comms between your devices to CF, not CF to your Pi, meaning CF can see clear text technically.

    If that’s not good enough then use a VPN server like PiVPN and put it on your pi and OpenVPN on your devices. *This has nothing to do with paid VPN Client subscriptions like Tunnelbear or Proton or whatever. *

    You will be running a VPN server on your pi to which you will connect from your devices on which you want to watch JF by downloading a device profile to your devices and opening it in the OpenVPN app.

    You do not need to pay for anything at all anywhere ever (other than something for DDNS and a domain name), use a strong password and make sure your JF is updated if there’s any CVE. Expose nothing else to the internet.

    You don’t even need HTTPS at that point or any certs, a VPN will encrypt your traffic anyway. The only cleartext you’ll have is between your VPN and your JF, and if both are on the pi then the only MITM vector is literally inside your Pi which is unlikely to have any issues.


  • Another way to do this is sudo su -c 'this is my command

    E.g. change a fan setting on a ThinkPad with:

    sudo su -c 'echo "level full-speed" > /proc/acpi/ibm/fan'

    So to run a shell you could do all sorts of tricks like:

    sudo su -c '/bin/bash -i' and such.

    Never know when it comes in handy.

    EDIT: Damn, downvoted, any reason why? It works on my machine with a locked root user or one without a PW and I made sure to test it before posting, but I’d love an explanation of why it wouldn’t work if that’s the reason for the downvote. Was just hoping it would be useful to somebody :/