Why do you think an RSS feed can’t sit on a CDN?
This is an alt account, you may see it around. I am not ban-dodging intentionally, I promise!
This is the main
https://scribe.disroot.org/u/drkt
Why do you think an RSS feed can’t sit on a CDN?
I pray your ISP is more competent than mine!
Sometimes I’ll lose the static IP I pay them for and they say it’s not their fault. Why am I paying you for it, then!?
An RSS feed is literally the same as going to the website. A request is being made to the domain and anyone who can see the data between you and the website can see it. If you think you’re secure going to the website normally, then an RSS feed would be secure, too.
Why is it so important to them that their antagonists are queer? They keeps mentioning it as if that matters.
I don’t know this project or this person, but this reads like someone who has really bad opinions and people told them so repeatedly.
At that point just get a GSM router
Change swappiness to 10 and ensure that you don’t have anything dynamically adjusting it.
I wouldn’t even know where to begin, but I also don’t think that what I’m doing is anything special. These NVR IPs are hurling abuse at the whole internet. Anyone listening will have seen them, and anyone paying attention would’ve seen the pattern.
The NVRs I get the most traffic from have been a known hacked IoT device for a decade and even has a github page explaining how to bypass their authentication and pull out arbitrary files like passwd.
I love the idea of abuseipdb and I even contributed to it briefly. Unfortunately, even as a contributor, I don’t get enough API resources to actually use it for my own purposes without having to pay. I think the problem is simply that if you created a good enough database of abusive IPs then you’d be overwhelmed in traffic trying to pull that data out.
I have plenty of spare bandwidth and babysitting-resources so my approach is largely to waste their time. If they poke my honeypot they get poked back and have to escape a tarpit specifically designed to waste their bandwidth above all. It costs me nothing because of my circumstances but I know it costs them because their connections are metered. I also know it works because they largely stop crawling my domains I employ this on. I am essentially making my domains appear hostile.
It does mean that my residential IP ends up on various blocklists but I’m just at a point in my life where I don’t give an unwiped asshole about it. I can’t access your site? I’m not going to your site, then. Fuck you. I’m not even gonna email you about the false-positive.
It is also fun to keep a log of which IPs have poked the honeypot have open ports, and to automate a process of siphoning information out of those ports. Finding a lot of hacked NVR’s recently I think are part of some IoT botnet to scrape the internet.
Long live the Linux phone.
I may have misunderstood, but Google isn’t doing Android behind closed doors; it’s just development. The released versions will still be as open as they are now, as far as I’ve understood.
Man I’m not going to dive into it but this reads like a FUD piece and I know the article explicitly calls out people who dismiss evidence as FUD, but please read just the first point that ‘Tor is compromised’:
the agency has worked on several methods that, if successful, would allow the NSA to uncloak anonymous traffic
If succesful, implying that they haven’t been. I’d love to read the paper but I’m European and they block me from clicking it, citing GDPR issues :-)
promised to reveal how a $3,000 piece of kit could unmask the IP addresses of Tor hidden services as well as their users.
a much anticipated talk at the Black Hat hacking conference was abruptly canceled.
The university cancelled the speech and cited no reasons but I can think of several legal ones even if the device didn’t work. No proof.
the FBI is able to de-anonymize Tor users and discover their real IP address remains classified information. In a 2017 court case, the FBI refused to divulge how it was able to do this,
I can fly. No, I don’t have to prove it.
What is a ‘scene’ in this context?
Meshtastic
BOINC
Tor
I2P
Just off the top of my head. Meshtastic is probably the most similar to Helium but I don’t know what Helium is and their landing page makes me not want to. BOINC supports projects not in the official lists, just google around.
Linux is truly extensible and it is the part I both love and struggle to explain the most.
I can sit at my desktop, developing code that physically resides on my server and interact with it from my laptop. This does not require any strange janky setup, it’s just SSH. It’s extensible.
Any file manager on Linux supports this
I just type sftp://[ip, domain or SSH alias]
into my file manager and browse it as a regular folder
That doesn’t really change that it’s one company hosting it. Unless you’re willing to make 10 different accounts because your super-FOSS friends aren’t willing to join each others instances?
Have you tried? Because Proton is the miracle people make it up to be.
If I set a static on my side, it’ll work until they fuck up again.
The excuse I got last time was that, due to a power outage where I live, they lost the configs in the splitter box near me. That didn’t fill me with confidence and you’re probably very correct that whatever they’re doing is very dumb and or incompetent.