this post was submitted on 29 Jan 2024
308 points (99.0% liked)

Technology

59440 readers
3605 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] originalucifer@moist.catsweat.com 46 points 9 months ago (2 children)

information itself is a liability. best to have a policy of 'we keep no IPs in logs, so are happy to hand over whatever'.. dump data the moment you dont require it

[–] Tangent5280@lemmy.world 29 points 9 months ago

yeah, this sounds like a much more sustainable solution. Do it the way signal does it. Collect as little as necessary, and delete it as soon as you dont need it.

[–] cmnybo@discuss.tchncs.de 9 points 9 months ago (1 children)

Just store what logs you need on a ram drive. The logs will be gone the instant the server shuts down and there is no way to recover them.

[–] nevemsenki@lemmy.world 8 points 9 months ago (1 children)

Downsides include : if any intrusion happens on the server, red team just needs to reboot it to wipe evidence.

[–] Perhyte@lemmy.world 5 points 9 months ago* (last edited 9 months ago)

If they have the root access typically needed to reboot a server^1^ they could also just wipe the logs without rebooting.

^1^: GUIs typically have a way to reboot without such privileges, but those are typically not installed on machines just used as servers.