| .vscode | ||
| guest-chroot | ||
| .editorconfig | ||
| .gitignore | ||
| create-guest-user.sh | ||
| deploy.sh | ||
| LICENSE | ||
| README.md | ||
| SECURITY.md | ||
| sshd_config | ||
ssh to hloth's production server!
Check out hloth.dev via SSH.
ssh hi@hloth.dev
open to everyone!!! everyone is welcome!!! no authorization, no password!!! 24 hours a day!!! all year!!! have fun!!!
FAQ
chat is this for real??
yes!!!
is it THE server?? the one this Forgejo instance is hosted at??
yes!!! dig +short A git.hloth.dev dig +short A hloth.dev
it's also the one that hosts my Vaultwarden (bitwarden) instance with all my passwords, pass keys, otp codes, accounts, bank cards, documents and official IDs — vw.hloth.dev
and the one that hosts my mail server with all my dirty secrets and a dkim key — mail.hloth.dev
and the one that hosts my matrix server AND a self hosted element web client I use exclusively, perfect opportunity for a mitm attack and attack — matrix.hloth.dev, element.hloth.dev
is this a major security vulnerability??
yeah it could be!!! only one way to find out!!! don't hesitate to leave a message in /root/pwned.txt!!!
does this open a ddos attack surface??
no!!! it's a dash (shell) script 💀 what
but why??????
ask Eduard Ilin!!!