LastPass doesn’t have your password, so it can’t be stolen during a breach.
But 1Password goes a step further, also requiring a “secret key”, which also can’t be stolen.
https://support.1password.com/secret-key-security/
Even if an attacker manages to steal your encrypted data from 1Password and also guess your master password, they still can’t access your data without a secret key.
For that reason, your 1Password account is more likely to compromised through your own device, not their server. And if your own devices are thoroughly compromised, no password manager can save you— the attacker can potentially grab all you type and see all you see.
You use an IMAP syncer, like this one:
A word of caution: I professionally hosted email for over a decade.
90% or incoming email will be spam. Anti-spam tools will need regular updates. Backups are also super important.
All things considered, I don’t host my own email anymore although I know all the pieces involved.
There are also some independent email hosts that are good like Fastmail or for extra privacy, Proton Mail.
There aren’t log visualizers for every artisanal log file format. But there’s a movement towards supporting JSON format logs for more services, and lots tools that can understand JSON logs making generating graphs and metrics from arbitrary logs fairly efficient.
If this tool is making the logs harder to parse by using a custom format, that’s something the tool could improve.
Some apps support both plaintext logs for humans and JSON logs for tools.
Look at how Dynamic DNS supported. Does it require full access to the account-- dangerous-- by using your login credentials or an API token with full read/write access? Or does it over a very limited scope access that gives the Dynamic DNS tool precisely the access it needs to update a single DNS record-- much safer! The latter is what CloudDNS does.
There are two services involved. Domain registration and DNS. Most domain registrars now provide some free DNS service, with basic features. I monitor dozens of domains, and I can tell you that these free DNS services with registrars are most likely to have short DNS outages as well.
ClouDNS is a professional, high-quality DNS service and that does one thing well. As far as I can tell, they don’t do domain registration, so that will always be a separate service. One of the things that ClouDNS does well is making Dynamic DNS easier.
Domain.com sounds like a domain registrar. You would keep that service and point your name servers for the domain to the ClouDNS name servers.
Other efficiency benchmarks place Apple Silicon and AMD chips ahead of Intel chips:
https://www.cpu-monkey.com/en/cpu_benchmark-cpu_performance_per_watt
As someone who has done e-commerce development and supports FLOSS and self-hosting, this is something I would outsource.
It’s complex, and you can’t really handle payments yourself anyway. That requires certification.
And people really don’t like it when their e-commerce is down and may able to quantify lost business due to an outage or bug in dollars or sense. It doesn’t feel great to realize something on your end resulted in hundreds of dollars of lost business.
If the business is very small, places like Shopify have cheap starter tiers.
As someone who has had a career in hosting: good luck.
Don’t forget backups, logging, monitoring, alerting on top of security updates, hardware failure, power outages, OS updates, app updates, and tech being deprecated and obsolete at a rapid pace.
I’m in favor of a decentralized net with more self-hosting, but that requires more education and skill. You can’t automate away all the unpleasant and technical bits.
If you use the AWS load balancer product or their certificates, they have access to the private key, regardless of whether you forward traffic from the LB to the container over HTTPS or not.
If you terminate the SSL with your own certificate yourself, Amazon still installs the SSM agent by default on Linux boxes. That runs as root and they control it.
If you disable the SSM agent and terminate SSL within Linux boxes you control at AWS, then I don’t think they can access inside your host as long as you are using encrypted EBS volumes encrypted with your key.
Ironically, the part of Perl that looks most cursing is the regular expressions, and that’s the feature that so many modern languages have borrowed from Perl directly.