Hacker News new | past | comments | ask | show | jobs | submit login

Some of the recommended steps like removing machine-id to prevent fingerprinting are especially funny when the rest of the article perfectly describes how to get your system in a completely uniquely fingerprintable state via obscure knobs most people don't touch.

As you've mentioned, it's a hardening "guide" without specifying a threat model, so its value is very limited anyway.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: