this post was submitted on 02 Apr 2025
69 points (100.0% liked)

Technology

38492 readers
400 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 3 years ago
MODERATORS
 

Collection of potential security issues in Jellyfin This is a non exhaustive list of potential security issues found in Jellyfin. Some of these might cause controversy. Some of these are design fla...

you are viewing a single comment's thread
view the rest of the comments
[–] Scary_le_Poo@beehaw.org 1 points 1 week ago* (last edited 1 week ago) (33 children)

The last set of comments is from 2024. These have not been addressed. The fact that it is possible to stream without auth is just bonkers.

The entirity of jellyfin security is security via obscurity which is zero security at all.

"As a cybersec researcher", the limp wristed, hand wavy approach to security should be sending up alarm bells. The fact that it doesn't, means that likely either, you don't take your research very seriously, or you aren't a "cybersecurity researcher".

"Thank you for this list. We are aware of quite a few, but for reasons of backwards compatibility they've never been fixed. We'd definitely like to but doing so in a non-disruptive way is the hard part."

Is truly one of the statements of all time.

[–] bizarroland@fedia.io 1 points 1 week ago (18 children)

You can't say that a solution is no security at all when it requires time and intelligence to bypass.

It is at least 0.01 security.

[–] whats_all_this_then@programming.dev 1 points 1 week ago (17 children)

Effort or no, if an attacker can reasonably bypass it, it's not secure. That's why software gets security patches all the time, why encryption/hashing algorithms can fall out of favor, and why quantum computing can be pretty fucking scary.

[–] B0rax@feddit.org 3 points 1 week ago (1 children)
[–] Scary_le_Poo@beehaw.org 1 points 1 week ago (1 children)
[–] B0rax@feddit.org 3 points 1 week ago

The votes are not on your side

load more comments (15 replies)
load more comments (15 replies)
load more comments (29 replies)