Comment on Do bots/scrapers check uncommon ports?
frongt@lemmy.zip 1 day ago
Yes, they do. Most just search the common ports, but some scan all.
Being tiny and obscure doesn’t mean they won’t find you, it might just take longer.
Comment on Do bots/scrapers check uncommon ports?
frongt@lemmy.zip 1 day ago
Yes, they do. Most just search the common ports, but some scan all.
Being tiny and obscure doesn’t mean they won’t find you, it might just take longer.
confusedpuppy@lemmy.dbzer0.com 11 hours ago
That’s been my main goal throughout securing my personal devices including my web facing server. To make things inconvenient as possible for potential outside interference. Even if it means simply wasting their time.
With how complex computers and other electronic devices have become, I never expect anything I own to be 100% secure even if I take steps I think will make me secure.
I’ve been on the internet long enough to have built a habit of obscuring my online or digital presence. It won’t save me but it makes me less or a target.
med@sh.itjust.works 2 hours ago
Everything’s a trade off, as you already know. I still use lets encrypt, despite the fact that I know attackers watch CT logs, and they’ll know as soon as I mint a cert.
frongt@lemmy.zip 11 hours ago
There’s no “wasting their time”. These attacks are all automated, not some guy sitting at a keyboard running stuff interactively.
confusedpuppy@lemmy.dbzer0.com 10 hours ago
I get that.
I was generally speaking about all my devices. If someone stole my computer, the full disk encryption is more of a deterrence than the idea of my data being fully secured. My hope is that the third party is more likely to delete than to access. If I catch the attention of someone that actually wants my data, I have bigger issues to worry about than security of my electronic devices.