I just gave someone the advice without being asked (ignoring all i know about „nonviolent communication“ – sorry for that!) to include a „Scope“ in his blog: he wrote an article how to setup a Raspberry-Pi but skipped all security considerations about how to setup a productive computer system. I assume many readers of his blog don’t have a clue how to harden a linux-operated Raspberry-Pi. I assume: those readers need at least a hint: „there are additional steps required“ or even better, concrete advice: „what to do next“ – maybe in a follow-up article. How many people are part of a bot-net since the’veRead More →