xlash123,
@xlash123@sh.itjust.works avatar

The best you can do is use OSS software that has been battle tested. Stuff like OpenSSH and OpenVPN are very unlikely to have backdoors or major vulnerabilities currently being exploited. If you don’t trust something to not be vulnerable, you’re best to put it behind a more robust layer of authentication and access it only by those means.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • fightinggames
  • All magazines