Primary account is now @Dark_Arc@social.packetloss.gg.

  • 0 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle
  • Dark Arc@lemmy.worldtolinuxmemes@lemmy.worldMany such cases
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    1 year ago

    That’s not what this means at all. Security by obscurity is referencing software that itself has secret pieces that are (to the software authors) “security features” which are only secure so long as their implementation details remain secret.

    Software using a key is not security by obscurity, knowing that a key is used by the software does not result in the application being compromised.

    Software that uses one secret key for all users embedded in the binary is security by obscurity.





  • and that it’s owned by Google.

    I mean yes, but it’s patent irrevocably royalty free (so long as you don’t sue people claiming WebM/P as your own/partially your own work), so it’s effectively owned by the public.

    Google hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer implementations of the WebM Specifications, where such license applies only to those patent claims, both currently owned by Google and acquired in the future, licensable by Google that are necessarily infringed by implementation of the WebM Specifications. If You or your agent or exclusive licensee institute or order or agree to the institution of patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that any implementation of the WebM Specifications constitutes direct or contributory patent infringement, or inducement of patent infringement, then any rights granted to You under the License for the WebM Specifications shall terminate as of the date such litigation is filed. “WebM Specifications” means the specifications to the WebM codecs as embodied in the source code to the WebM codecs or any written description of such specifications, in either case as distributed by Google.

    Source: https://www.webmproject.org/license/bitstream/

    (But Dark, that’s WebM not WebP! – they share the same license: https://groups.google.com/a/webmproject.org/g/webp-discuss/c/W4_j7Tlofv8)













  • I think it’s pretty secure and it will be getting better soon. In reality, I think it’s much more secure than what most people will end up with otherwise.

    ZeroTier is open source, long running without incident, and the traffic is encrypted between peers.

    The threat model is basically two fold though, in theory someone who has control of the ZeroTier roots (if you’re not using your own controller, if you’re using your own, then s/their roots/your roots/) could add routes to your devices, and add/remove devices that are part of your confirmation.

    The encryption also doesn’t currently have perfect forward security, so if there’s a compromise in one of your connections, in theory some past state of that connection could be decrypted. In practice, I’m not sure this matters as traffic at a higher level for most sensitive things uses its own encryption and perfect forward security (but hey maybe you have some software that doesn’t).

    The other thing I will note about that last point is that they’re working on a rust rewrite that will have updated crypto, including perfect forward security.


  • FOSS just means the software is open source. As I said, you can self host ZeroTier and not involve their servers (if you’re not doing things commercially, you pay for the license but still run your own controllers, or you use an older version which has been automatically relicensed by the change date to Apache 2.0).

    That said, the traffic is peer-to-peer, in the majority of use cases there servers are acting as a bit more than syncthing’s servers (acting to facilitate the connection between two devices that want to talk together). See the other comment for some more thoughts here.



  • I’ll pitch ZeroTier instead, it’s the same concept, but it’s more FOSS friendly, older, doesn’t have the non-networking “feature bloat” of Tailscale, and can handle some really niche cases like Ethernet bridging (should you ever care).

    Just:

    1. Go to their website, create an account, and create a network
    2. Add ZeroTier to the devices you need to connect
    3. Enter your network ID on those devices
    4. Approve the devices in the web control panel

    If you want to go full self hosting, you can do that too but you will need something with a static IP to control everything (https://docs.zerotier.com/self-hosting/network-controllers/?utm_source=ztp) this would replace the web panel parts.

    You can also do a LAN routing based solution pretty easily using something like a Raspberry Pi (or really any Linux computer).