<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Luiz Felipe F M Costa</title><link>https://thenets.org/tags/security/</link><description>Recent content in Security on Luiz Felipe F M Costa</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 27 May 2025 13:57:19 +0000</lastBuildDate><atom:link href="https://thenets.org/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Backup is not Disaster Recovery</title><link>https://thenets.org/posts/backup-is-not-disaster-recovery/</link><pubDate>Tue, 27 May 2025 13:57:19 +0000</pubDate><guid>https://thenets.org/posts/backup-is-not-disaster-recovery/</guid><description>&lt;p&gt;You probably already heard that RAID is not a backup. When world is ending and everything is burning, we also discover that a backup is not a Disaster Recovery plan. In this blog post I want to discuss why is so important to have an unplugged and reliable Disaster Recovery strategy.&lt;/p&gt;
&lt;h2 id="common-scenario-for-backup-plus-disaster-recovery"&gt;Common scenario for Backup plus Disaster Recovery&lt;/h2&gt;
&lt;p&gt;Let&amp;rsquo;s start talking about the common differences between snapshots, backups, and Disaster Recovery strategies.&lt;/p&gt;</description></item><item><title>How to securely share secrets with podman containers</title><link>https://thenets.org/posts/how-to-securely-share-secrets-with-podman-containers/</link><pubDate>Sat, 03 Jun 2023 08:30:04 +0000</pubDate><guid>https://thenets.org/posts/how-to-securely-share-secrets-with-podman-containers/</guid><description>&lt;p&gt;Podman is a daemon-less, open-source, Linux native tool designed to make it easy to find, run, build, share, and deploy applications. It offers many data isolation options, and in this post, I wanna cover all the options I know to securely share data with a container.&lt;/p&gt;
&lt;h2 id="how-to-be-paranoid-about-security"&gt;How to be paranoid about security&lt;/h2&gt;
&lt;p&gt;Any security measurement should always be based on a multi-layer security system, assuming that any protection can be compromised and another one should exist to block a potential attack. For example, if you want to design a distributed system, you probably want to follow a Zero Trust architecture:&lt;/p&gt;</description></item></channel></rss>