It's a nice service but seriously lacking on some fronts. Especially their relationship with Bits of Freedom is great. I looked into migrating our business email to Soverin but the absence of 2FA and less importantly DKIM and IPv6 kept us from doing so.
> There is no group of users that should be using the code in this repository here under any circumstances at the moment, not even beta testers or dare devils.
Despite the warning I attempted to use it, but without any real docs I didn't get very far.
The Go implementation is not done yet! But it will be soon. In the meantime, feel free to use the Linux kernel implementation, which works quite well and has extensive documentation and man pages:
If you join the mailing list [1], there'll be an announcement when it's ready, which hopefully won't be before long. Other perks include free stickers too :D [2].
[1] Send a blank email to wireguard-join at lists dot zx2c4 dot com.
Strange decision, as systemd-nspawn[1] specifically mentions and supports btrfs as a CoW filesystem for its containers. And as far as I understand, systemd is primarily developed by Red Hat employees. So either they'll add support for CoW alternatives, or they'll remove btrfs support from systemd-nspawn all together.
nspawn uses btrfs snapshotting natively for its templating and no other FS (ZFS was explicitly rejected by Mr. Poettering because "it's not in the kernel") so yeah either they are going to have to do something about this or there will be a significant step down in functionality for nspawn. I can't see how this isn't really bad news for nspawn.
I guess one option is to pull btrfs tree into Systemd :-)
Services like these give Tor and related projects a bad name. Taking down illegal market places is part of the police's job and this is definitely a success story. The article is lacking in details a bit, but it seems they've taken it down using regular old police work as they mention an "undercover operation". This proves once more that the weakening of security for everybody is not needed to catch criminals.
> Services like these give Tor and related projects a bad name
In more ways than one.
What if this had been a tor website that was sharing documents proving government or police corruption? And yet somehow, the police did manage to shut it down. It goes to show that the tech needed for fully anonymous websites may not be good enough yet.
Any sufficiently anonymous website that could be used for good reasons can also be used for bad reasons. If Tor works, we have the good at the bad. If Tor doesn't work, we have neither.
>It goes to show that the tech needed for fully anonymous websites may not be good enough yet.
The tech will never be good enough. Even if we had magic unexploitable webapps hosted in the platonic realm of pure forms whose privacy is protected by magic cryptography, darknet markets would still get busted. Darknet markets require support staff, managers and engineers to run the site. The humans who run such sites will always be exploitable.
It may be parallel construction, but in a kind of cynical way we can publicly praise it as good traditional police work. It takes credibility away from demands for special or clandestine access.
When we call it parallel construction we buy into the surveillance communities marketing... that surveillance it is effective.
I suppose that if you have one administrator in a cell, it's probable that you will get the login credentials after a while.
The question is how to put them in a cell to begin with, but I don't think that it requires some super high tech or shady wiretapping. The publicly known lawful interception laws are most likely good enough for finding almost anyone accessing a know site.
As the current situation is in regards to islamistic terrorism in Europe, I really expect the law to be used to its full extent.
Unfortunately, the harsh stand on drugs play both criminal organizations and islamists in hand as they can make good money on even relatively harmless drugs. I'd prefer a legalization and regulation on those, in order to decapitate the black market.
The fixed version does not seem to be released yet on pypi or their launchpad PPA. The only (official) place where a fixed release is available seems to be https://releases.ansible.com/ansible/
One thing it has over ELK worth mentioning is that it has authentication in the open source version. Also able to configure it more through the web interface than ELK.
It's a lot easier to set up and manage in my experience. The interface is very user friendly. It all depends on your specific needs of course. ELK is a bit more performant I think, although I have never compared them properly. Both have good scaling capabilities.
https://fosdem.org/2019/schedule/event/http3/