ssh to hloth's production server! public to everyone
Find a file
2026-01-23 19:06:08 +01:00
.vscode Add nested subscreens 2026-01-21 09:48:44 +01:00
guest-chroot Update screens/about.sh, add screens/sudo/jerma985.hs 2026-01-23 19:06:08 +01:00
.editorconfig Add nested subscreens 2026-01-21 09:48:44 +01:00
.gitignore Add jerma985 and sillycat gifs 2026-01-23 18:44:28 +01:00
create-guest-user.sh Add nested subscreens 2026-01-21 09:48:44 +01:00
deploy.sh Copy ls to chroot 2026-01-23 00:51:44 +01:00
LICENSE Add deployment scripts, guest shell and docs 2026-01-19 21:40:26 +01:00
README.md Update README 2026-01-20 00:41:21 +01:00
SECURITY.md Add deployment scripts, guest shell and docs 2026-01-19 21:40:26 +01:00
sshd_config Remove UsePAM 2026-01-19 22:09:14 +01:00

ssh to hloth's production server!

Check out hloth.dev via SSH.

ssh hi@hloth.dev

open to everyone!!! everyone is welcome!!! no authorization, no password!!! 24 hours a day!!! all year!!! have fun!!!

FAQ

chat is this for real??

yes!!!

is it THE server?? the one this Forgejo instance is hosted at??

yes!!! dig +short A git.hloth.dev dig +short A hloth.dev

it's also the one that hosts my Vaultwarden (bitwarden) instance with all my passwords, pass keys, otp codes, accounts, bank cards, documents and official IDs — vw.hloth.dev

and the one that hosts my mail server with all my dirty secrets and a dkim key — mail.hloth.dev

and the one that hosts my matrix server AND a self hosted element web client I use exclusively, perfect opportunity for a mitm attack and attack — matrix.hloth.dev, element.hloth.dev

is this a major security vulnerability??

yeah it could be!!! only one way to find out!!! don't hesitate to leave a message in /root/pwned.txt!!!

does this open a ddos attack surface??

no!!! it's a dash (shell) script 💀 what

but why??????

ask Eduard Ilin!!!

License

MIT