I was a happy FastMail customer for years, but lack of IPv6+DNSSEC was also disappointing for me. I eventually heard about Migadu ( https://www.migadu.com/ ) which has all that, and AFAIK, EU servers as well.
The only downside for me is the web UI isn't nearly as polished as FastMail.
Thx for your feedback. Will check their website. What about real IMAP Push for iOS devices? Does it work, or only every X minutes push like others? (mailbox.org, Fastmail, iCloud Mail do have real IMAP push for iOS/macOS).
> While Gmail is an IMAP client app, it will not check for new mails continuously. Not only it does not support IMAP Push extensions which are standard nowadays, but the [most] frequent polling interval is 15 minutes
Which I guess implies they offer IMAP push, since they're expressing disapproval that the Gmail app doesn't support IMAP push
I don't know a lot about C or the internals of OpenSSL, but going by the commit message, does this mean we should disable TLSv1.3 until we've had a chance to patch OpenSSL?
Edit: Actually, reading through the code a few times, maybe TLSv1.2 should be disabled?
I really wish we had some way to protect ourselves until the patch is widely available.
See the other comments for why the parent is wrong.
> I really wish we had some way to protect ourselves until the patch is widely available.
I would hope/expect that the OpenSSL project has no indication that this vulnerability is used in the wild. And that is probably why they preferred announcing a patch date instead of releasing a fix right away. (But I don’t know their policies, so this is just speculation.)
That would mean that you don’t really need to do anything you shouldn’t have already been doing prior to this announcement to protect yourself until the patch is out.
Unless the vulnerability is easy to find — in which case we’d already hear about exploitation attempts, so I don’t think it is — worrying about this is as useful as worrying about the other critical yet-to-be-found vulnerabilities in the software you use (which most certainly exist).
The website on https://1.1.1.1 is horrible. Completely dead modern corporate design which advertises an app and otherwise it is completely useless. Not expecting anything to be here honestly, but this... A connection refused page from your favorite browser might be preferable.
Perhaps it's for https://radar.cloudflare.com/ or maybe a new service where they'll warn you if services like SSH are configured badly or not firewall'd off?
Also, is it possible this traffic is actually coming from a worker, i.e. https://workers.cloudflare.com/ rather than Cloudflare themselves?
There's lots of prior art, such as https://wheelmap.org/ -- so I imagine OSM is somewhat open to this sort of thing. Might be worth looking at how Wheelmap edits OSM. I believe it's from a generic account and edits are tagged such to make it clear it's from a member of the public.
You could also implement OAuth (sign-in with OSM) to do edits, similar to how some tools like https://maproulette.org/ work, though you'll get less contributions if you don't have an option for anonymous public edits.
> Allowed you to block certain domains from your search results
I would love for Google to build this in. Until they do, there is a WebExtension that does this: https://addons.mozilla.org/en-US/firefox/addon/hohser/ ("Block or Highlight Search Engine Results"). I use it to block stuff like W3Schools so when I search for something, MDN is always #1. Saves me a lot of time having to add "MDN" to the end of every query.
The only downside for me is the web UI isn't nearly as polished as FastMail.