• invalidusernamelol [he/him]
    ·
    4 days ago

    A good bet it to open a dummy ssh port that no one should ever connect to, then immediately add any ip that tries to connect to it to a blacklist.

    At the end of the day every security measure can be bypassed, you just need to be prepared for that inevitability.

    • Deadend [he/him]
      ·
      4 days ago

      Locks are based on time/difficulty/detectability in the real world. The goal is “can’t to break in without getting caught”

      It’s all a balance between risk/security and actually being useful.