▲ | m463 3 months ago | ||||||||||||||||
thing is, there IS a transfer protocol, there are just no controls on the files. If you can log in, there is just passing security. Just take a step back and think what you could do if it were a protocol: - limit visible files - limit access to files by user - make access strictly read-only - allow upload-only (sort of a dropbox) - clear separation between login access and file access - remove login user from the whole mess - trivially tie in as a filesystem. etc... | |||||||||||||||||
▲ | rad_gruchalski 3 months ago | parent [-] | ||||||||||||||||
But why? It can be done with ssh and some mix of linux permissions. It’s simple. There’s always room for more complexity. | |||||||||||||||||
|