security in the context of the indieweb may refer to security concerns regarding personal domains, web hosting, https setup, private data, identity etc. Nearly everything on the internet, including the web, and thus indie web, has security concerns.
You should make your personal site more secure so that in general you and others can trust it more.
Services that require logins or act as authorization servers should provide a way for users to see an audit trail of events relating to their account. For example:
GitHub Security History
Google Recent Activity
Security breaches as reported by sites
- 2014-04 Heartbleed
- 2014-02-15 Kickstarter https://www.kickstarter.com/blog/important-kickstarter-security-notice
https http botches
Today, when standards like HSTS try to mitigate https to http degradation attacks, there's no reason to allow http at all. All http should redirect to https. Examples of "willful degradation" in indie web related software and services:
- Webmentions to Known only work if you mention the http URL. This may encourage using unsafe links to Known (that shouldn't exist in the first place).
- webmention.io regards http and https as different URLs. Perhaps this is not a bug, because in a perfect world there wouldn't be any https.
Should you write about your web hosting setup?
In some regards yes, to help out other members of the community.
However from a security perspective, disclosing what web host you use, software, VPS, or how you implement your server configuration are potential security issues because every piece of information you give a potential attacker about your setup helps narrow the space of weaknesses to explore.
So, how do you share information without endangering yourself in that regard?
You decide you're not a worthy target, or you decide you'd rather share publicly in the hopes that friends will warn you about any flaws before an attacker exploits them.
Dealing with unknown problems
- Peer review existing protocols and implementations.
- Look for docs, advice, potential peer-reviewers at communities like MIT's Liberationtech mailing list (any other ideas?).
- Think in advance about security implications of features like private messages.
- Always prefer existing and popular (i.e. constantly peer reviewed) technology to reinventing crypto.
- Eventually - prepare guidelines for site owners and developers on the Wiki (similar to Eff's SSD).
- 2016-11-09 How to encrypt your entire life in less than an hour
- 2019-05-25 NYTimes: In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc
… vulnerability in unpatched software that allows hackers to spread their malware faster and farther than they otherwise could.
- Follow-up 2019-05-31: Ruppersberger: NSA has no evidence EternalBlue was in Baltimore attack - N.S.A., in briefing with Baltimore Rep. Dutch Ruppersperger, says no evidence that EternalBlue was used in the Baltimore ransomware attack.
- 2019-06-04: Violet Blue Cybersecurity Roundup for June 4, 2019 lays out exchanges between NYT author and security researchers. (see "Uh, enjoy the show?" section).