<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, 6 Jun 2024 at 09:35, TimP <<a href="mailto:mythtv@corky.co">mythtv@corky.co</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div>
<p id="m_-260734939302399150reply-intro">On 2024-06-06 03:08, Kevin Johnson wrote:</p>
<blockquote type="cite" style="padding:0px 0.4em;border-left:2px solid rgb(16,16,255);margin:0px">
<div id="m_-260734939302399150replybody1">
<div dir="ltr">
<div dir="ltr">A lot of this discussion is over my pay grade.</div>
<div>
<div>But if all you have on the exposed server is the myth backend, are all the extra steps/security necessary? </div>
</div>
</div>
</div>
</blockquote>
<div id="m_-260734939302399150replybody1">
<div dir="ltr">
<div>
<div>
<p id="m_-260734939302399150reply-intro">Apart from annoying things like deleting all your recordings or scheduling to record every movie with the word Christmas in the title, there is also the possibility of using the settings interface to define a user job that downloads a script and executes it.</p>
<p>Cheers,</p>
<p>Tim.</p>
<p><br></p></div></div></div></div></div></blockquote><div><br></div><div>I believe that 'deleting all your recordings' can be triggered [relatively] innocently by search bots cataloguing the mythweb pages.</div><div><br></div><div>If your mythtv box is compromised then everything else on your home becomes much more at risk.</div></div></div>