• 0 Posts
  • 57 Comments
Joined 3 years ago
cake
Cake day: June 2nd, 2023

help-circle

  • Hotzilla@sopuli.xyztoSelfhosted@lemmy.worldCams, anyone?
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 month ago

    The problem is that it can only be speculated how they work, because they have not published it. That is quite suspicious in my book.

    I personally would avoid reolink and use rtsp + frigate + ha, to have full control with known open source selfhosting solution.

    I understand that people like the easy setup, but if you already do selfhosting, it isn’t that big jump.


  • Hotzilla@sopuli.xyztoSelfhosted@lemmy.worldCams, anyone?
    link
    fedilink
    English
    arrow-up
    10
    ·
    edit-2
    1 month ago

    Be careful with reolink, their P2P solution is pretty suspicious. No body really knows how it works and who it shares the data with.

    You can disable those features, but it will stop reolink app from working.

    They have never explained how the peer-2-peer network works, and it security and privacy is quite unknown.

    Reolink is Chinese, which doesn’t really help these concerns.

    Better to selfhost frigate and just rtsp cameras there.





  • Hotzilla@sopuli.xyztoProgrammer Humor@lemmy.mlInsufferable
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    7 months ago

    D365 ain’t really even that bad. It is just model driven power platform app. It is actually quite expandable, you can code it with plain javascript or more complex components on React. Backend is OData which is quite flexible.

    Old Dynamics AX and onprem CRM were shit shows.










  • CrowdStrike Falcon is XDR product, there is hundreds of similar products available.

    The role of XDR is to detect and block if some bad actor is trying to do something malicious in the machine. Old school virus signature detection is not enough anymore, you need pattern detection from network communication/DNS queries etc.

    When corporation has thousands of devices to monitor the OS each of those devices Is not relevant. You need to detect if some random user logs to some Linux info display thousand kilometers away, and starts scanning the network.

    Because the detection and response, needs to happen near realtime, for example Incase of cryptolockers, where all devices are encrypted within seconds, the software blocking this needs kernel level access.

    I work in critical infrastructure as IT, but luckily we did not use falcon