Update Readme
This commit is contained in:
parent
0c4509df07
commit
35b6f9b488
14
readme.md
14
readme.md
|
@ -30,7 +30,13 @@ And a **lot more planned features** are coming!
|
||||||
|
|
||||||
If you have your own self-hosted data, such as a Plex server, or may be your own photo server, **you expose your data to being hacked, or your server to being highjacked** (even on your **local network**!).
|
If you have your own self-hosted data, such as a Plex server, or may be your own photo server, **you expose your data to being hacked, or your server to being highjacked** (even on your **local network**!).
|
||||||
|
|
||||||
It is becoming an important **threat to you**. Managing servers, applications and data is **very complex**, and the problem is that **you cannot do it on your own**: how do you know that the server application where you store your family photos has a secure code? it was never audited. Here's a simple example of how Cosmos can help you:
|
It is becoming an important **threat to you**. Managing servers, applications and data is **very complex**, and the problem is that **you cannot do it on your own**: how do you know that the server application where you store your family photos has a secure code? it was never audited.
|
||||||
|
|
||||||
|
**Even a major application such as Plex** has been **hacked** in the past, and the data of its users has been exposed. In fact, the recent LastPass leak happened because a LastPass employee had a Plex server that **wasn't updated to the last version** and was missing an important **security patch**!
|
||||||
|
|
||||||
|
That is the issue Cosmos Server is trying to solve: by providing a secure and robust way to run your self-hosted applications, **you can be sure that your data is safe** and that you can access it without having to worry about your security.
|
||||||
|
|
||||||
|
Here's a simple example of how Cosmos can help you:
|
||||||
|
|
||||||
![diag_SN](./diag_SN2.png)
|
![diag_SN](./diag_SN2.png)
|
||||||
|
|
||||||
|
@ -38,14 +44,10 @@ Another example:
|
||||||
|
|
||||||
![diag_SN](./diag_SN.png)
|
![diag_SN](./diag_SN.png)
|
||||||
|
|
||||||
Because every new self-hosted applications re-implement **crucial systems** such as authentication **from scratch** everytime, the **large majority** of them are very succeptible to being **hacked without too much trouble**. This is very bad because not only Docker containers are not isolated, but they also run as **root** by default, which means it can **easily be used** to offer access to your entire server or even infrastructure.
|
Additionally, because every new self-hosted applications re-implement **crucial systems** such as authentication **from scratch** everytime, the **large majority** of them are very succeptible to being **hacked without too much trouble**. This is very bad because not only Docker containers are not isolated, but they also run as **root** by default, which means it can **easily be used** to offer access to your entire server or even infrastructure.
|
||||||
|
|
||||||
Most tools currently used to self-host **not specifically designed to be secure for your scenario**. Entreprise tools such as Traefik, NGinx, etc... Are designed for different use-cases that assume that the code you are running behind them is **trustworthy**. But who knows what server apps you might be running? On top of that, a lot of reverse-proxies and security tools lock important security features behind 3 to 4 figures business subscriptions that are not realistic for selfhosting.
|
Most tools currently used to self-host **not specifically designed to be secure for your scenario**. Entreprise tools such as Traefik, NGinx, etc... Are designed for different use-cases that assume that the code you are running behind them is **trustworthy**. But who knows what server apps you might be running? On top of that, a lot of reverse-proxies and security tools lock important security features behind 3 to 4 figures business subscriptions that are not realistic for selfhosting.
|
||||||
|
|
||||||
**Even a major application such as Plex** has been **hacked** in the past, and the data of its users has been exposed. In fact, the recent LastPass leak happened because a LastPass employee had a Plex server that **wasn't updated to the last version** and was missing an important **security patch**!
|
|
||||||
|
|
||||||
That is the issue Cosmos Server is trying to solve: by providing a secure and robust way to run your self-hosted applications, **you can be sure that your data is safe** and that you can access it without having to worry about your security.
|
|
||||||
|
|
||||||
If you have any further questions, feel free to join our [Discord](https://discord.gg/PwMWwsrwHA)!
|
If you have any further questions, feel free to join our [Discord](https://discord.gg/PwMWwsrwHA)!
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
Loading…
Reference in a new issue