XMPP Service Operators - 2021-04-08


  1. thndrbvr

    To follow up on the topic of server location hosting from the other day, I messaged Flokinet and they replied with: we dont care what the US thinks or wants, we follow icelandic law. So why would we care about Third-party doctrine? Thats an US based law / idea. We are not in the US but Iceland. The US is "sniffing" 24/7/365 all data on this planet regardless whch country you host or operate in. Thats why you have to use proper encryption.

  2. moparisthebest

    right, anything outside the USA the NSA will just gobble up in transit, it's not allowed to do that inside the USA, but any law enforcement is allowed to simply request all data hosted at 3rd parties, so it doesn't need to

  3. moparisthebest

    I agree, encryption is a must regardless, but hosting at your own house is a added benefit if you can do it

  4. thndrbvr

    But they collect data from inside the US anyway. They're just not always allowed to use it without a warrant.

  5. thndrbvr

    Hosting the server yourself only protects you. Anyone else who signs up is signing up at a third party unless they're part owner in the company of "Mopar's XMPP Server, LLC" or whatever.

  6. moparisthebest

    yep, I'm saying ideally everyone hosts their own server in their house

  7. moparisthebest

    for themselves and their family

  8. thndrbvr

    I'm not sure family members, who aren't also admins to any degree, would even be protected. Except maybe a spouse or <18 child.

  9. moparisthebest

    I guess if someone asked for details from my brother's account via 3rd party doctrine I could at the least tell him :P

  10. Kris

    Hmm, I guess it depends on the country, but I think often direct relatives (siblings, parents, children) regardless of age are within your right not to be a witness to crime

  11. Kris

    or however that is called in legalese. IANAL obviously

  12. ernst.on.tour

    moparisthebest: > .... I could at the least tell him :P You *could* but you are *not allowed* to do so, as newest law in germany told you since yesterday 😡

  13. Kris

    ernst.on.tour, you got a link for that?

  14. Kris

    can be in german

  15. rob

    I think if some government wanted data off my server I'd just burn it 😊

  16. xorman

    back to thermite hosting

  17. tom

    You really shouldn't rely on thermite in the age of freely available mature open source full disk encryption

  18. xorman

    $5 wrenches are also widely available

  19. tom

    Instead of burning the disk, which isn't a guarantee the platter, just destroy your key material

  20. tom

    Which is only a few bytes in size

  21. tom

    And shouldn't be stored on the same storage medium as your ciphertext

  22. tom

    Configure a watchdog program to watch the tamper sensors

  23. tom

    Most if not all ECC memory zeros itself on reset. If your keys are stored in ram and a tamper switch is tripped you could just immediate reset the server, wiping keys from memory and rendering the confidential data unusable to the attacker

  24. tom

    There really is no excuse to not do disk encryption nowadays as even consumer CPUs have hardware acceleration for AES

  25. rob

    Yes I didn't mean fire, but delete and overwrite

  26. tom

    It prevents some asshole in the datacenter from going over to your server and yoinking out a drive

  27. tom

    What also prevents someone from doing that is PLEASE DO install the SECURITY BEZEL the server came with

  28. tom

    I know it's just a simple physical lock and key latch mechnism but it does provide a physical barrier from people screwing with your server

  29. tom

    Also cages in the datacenter

  30. tom

    But those can be expensive

  31. tom

    A bezel is free

  32. tom

    Rob It takes too long to delete and overwrite terabytes of data

  33. tom

    There's also the possibility of recovery

  34. tom

    Deploying full disk encryption makes the process of decommissioning drives so much cheaper, as you can even resell the used drives to make a little bit of money back

  35. tom

    Without having to worry about a data breach

  36. rob

    And my server is at home, but yes I agree. I think if I actually had anything to hide and it had to be transmitted digitally I would use a second key pair on a hardware device. But if they really want to get your data they will somehow

  37. tom

    You don't have to make it easy for them

  38. tom

    And if it's a physical server at your house that's easier because you don't have to implement some kind of remote partial init to ssh in and enter keys and check system integrity you can just walk over to a machine, boot it up, enter keys

  39. tom

    There's not just the government to worry about

  40. tom

    What happens if someone breaks into you home

  41. tom

    Steals your server

  42. tom

    Better to think about these things now, than lose sleep when it actually happens and prey and hope that the robber isn't smart enough or doesn't sell your drives to someone smart enough to mount a unix filesystem

  43. rob

    True, but I wonder how hard it's going to be moving a btrfs pool to full disk encryption. I've only ever started a new system with it

  44. tom

    rob: ZFS has encrypted datasets

  45. tom

    Try that

  46. tom

    It's also much more mature than btrfs

  47. tom

    Doesn't have a write hole