

It helps, honestly one of the best defensive strategies is defence in depth.
It helps, honestly one of the best defensive strategies is defence in depth.
Also doing basic things like running your webserver in a VM, and you can write some script or something to just block any IP that is port scanning I’m pretty sure. I would do that if I was hosting. Also remember to block port scanning in Firefox. It’s not enabled by default. This helps to keep you safe when you land on a scanning webpage.
This is why I use emby.
No but I definitely should
One good solution might be decentralized webhosting and infrastructure. If people want high speed access, they have to seed it at a low rate. Nothing crazy is required just constant seeding at low rates. A few max connections and a cap of maybe 50KBps min is required. You also use random hash checking against multiple clients to verify correctness, and you have p2p blacklisting of known bad actors. A solution for people who don’t have steady Internet access might be to just seed a similar amount on quota or to buy p2p credits to access the content.
This is part of an idea I have been working on for an internet 2.0. There is a basic cryptocurrency called compute coin, and as you seed you mine coin. The verification works by utilizes many nodes to verify everything is working correctly. You can buy coin that people mine instead of seeding if you wish. A very small portion of each transaction, a fraction of a fraction of a percent goes to a nonprofit who works on the tech and fomalizes the standard. You can also just buy compute time on the network. People are free to sell their resources at whatever price they want and the market balances itself automatically. The transaction fee is calculated automatically to cover the budget of the nonprofit which oversees it. DNS is also handled p2p. If I were in control I would also make it mesh network friendly, with sliders to prioritize what the user wants, from latency, vs avoiding certain countries, vs cost, vs using a whitelist of trusted nodes for security purposes.
This would also require swarm security to prevent any one user from being able to sniff out keys and passwords and stuff. Basically the network would work together to generate periodic temporary keys to allow machines to access the data for a period of time without revealing itself to anyone. The nonprofit would be the only completely trusted authority and it would have a board who oversees banning of nodes and the money seized would go to support the development of solutions and strategies to combat any fraud on the network. This seems expensive at first, but with Asics this can be made very cheeply. I imagine people would want to run different types of nodes to generate currency. Asics would be a good cheap solution. It’s a market that will build itself very quickly. You can also have verified nodes that cost a bit higher then average probably to access but can provide additional security for certain tasks. These can either be crowd sources or run by institutions which publish node lists.
If the law wishes to regulate it, this could only be achieved by region specific keys and would not be network wide. Courts might have to set up a way to subohena resources that gets registered in a public domain that gets released to the public after a year or so, in order that citizens can verify what the government is snooping on.
It can also be used for free by just having a algorithm automatically determine mining rates to pay for the use of the user, with a buffer to keep a seemless experience.
Perhaps for this particular problem however you could just set up a p2p platform with file verification. People could offer free nodes, businesses could pay money to these nodes to get access to high speeds and large amounts of bandwidth. People can also join p2p nodes where what they can download equals to what they contribute to the network. This can just be estimated based on average use and maintained with a buffer if people really don’t want to seed all the time.
Who cares? The average EU citizen will benefit far more from the regulation. I don’t think any of their laws have been bad so far, mostly requiring standard connectors, requiring user access to install what they want without apples permission, and monopolizing software stores in general. This might be a great opportunity to actually get some consumer friendly competition out of Europe for once. Also Samsung already allows third party app stores, has USB C like every other modern device, and allows side loading. It’s going to get interesting once Google starts complaining that they can’t control users devices after they buy them as well with their upcoming ban on non Google approved software installations.
This is standard for tor, you have to jump through several nodes to get to whatever server you are accessing. There isn’t that many end points and many of them are controlled by feds which mean your data has to also pass through monitoring software which is essentially a slow software router to bottleneck everyone’s traffic. However with tor you get pretty close to real anonymity with your connection, however using Tor as a VPN completely defeats this purpose because all your software and stuff is going to be pinging servers of companies and leaking your personally identifiable information.
Even with just using a browser in a sandbox, it’s hard to actually stay anonymous on Tor because if your browser leaks any information or runs any compromised script which can fingerprint your machine, you lost your anonymity. The only real anonymity you can get for the most part is not using the Internet for stuff that you don’t want to be traced back to you. For hacking type stuff, you could try proxying behind several machines with memory only programs that delete themselves after you finished, while carefully controlling each and every packet being sent to make sure it’s completely anonymous. You can almost guarantee that some corporation some where research’s exploits in tor and common computer hardware to dox you to governments and criminal groups. I wouldn’t put anything on the internet you don’t want the governments, corporations and criminal mafias and cartels of the world knowing.
Remember Tor was created by the D.O.D, just like the internet was created by Darpa and Google was seeded by the CIAs venture capital firm. The technology and plans for mass surveillance were already being established in the 70s and 80s, and Google was created expressly for the purpose of facilitating mass surveillance which is why they were the first company to destroy the internet.
I want it so bad but I live in the U.S where these types of phones are forbidden by our corporate/police state.
Whether you are even capable of learning stuff depends entirely on your genetics and epigendtics. Only a few students in any one area will ever retain much knowledge. The thing that actually determines how well your society becomes, tends to be things like how happy the childhood of your citizens are. Very few people ever seek knowledge long term within a healthy lifestyle. School for most kids is just a way to babysit them while the parents work long shifts for corporations.
The tragedy is the kids in south korea hardly get a childhood at all. They stay in ultra competative schools during the day, only to be shuttled off to cram schools in the evening. They are not even human beings in the eyes of their own parents. They exist soley to fullfill the dreams of their parents, which is to hopefully work hard enough to become some executive for one of the seveal corporations that almost completly own the South Korean Economy.
Many of these kids, like many in South Korea will grow up to be massivly depressed alchoholics and workaholics. Never having much of a life beyond serving their managers. This comes out in several ways in the character of Koreans. Many of them are incredibly dark people. Thats why media like the squid games is so popular over there. Behind the venure of a very productive and industrious society where most forgo almost all of their individuality, never even having a childhood. Behind it lies so many incredibly dark and deeply depressed people traped within a virtual prison of wealth and status.
People like this would maybe end up ruling the world, given they work so much, and so hard, yet with their childhood also dies their soul. Their creativity dies, their dreams die, their human spirit is deminished in the hell they create and call progress. The parts of their dna that make them human, slowly whither away under hyper corporatism. Just like everything else in their society a child is nothing more then property. An investment by corporations. A robot that is as equally bland as it is numb. Never does anyone in a society like that actually consider that maybe they dont have a right to dictate every little aspect of their childs life in order to promote what they believe a child should be. So those that feel, those that see deeply the lights in the city nights. Those that see beauty. They die away as the human race regresses day by day.
South Korea has always been a deeply disturbing place to me. A place that is truely inhumane, yet such a beautiful place as well. Behind every woman who looks likes a flight attendent, and every man wearing a suit or dress clothes, is a society which has almost no creativity and soul. No individualism. No happiness. No relationships. Everything is about efficency, everything is about materialism. All the money in the world doesnt matter if you don’t get to fall in love with someone, and have dreams, and watch your kids play and be happy. What is even the point of life it is nothing but work, followed by a few hours a drinking before crashing out for the night, and starting it all over again?
Cool, I have some ideas as well, like maybe write a script that hashes configuration files that needs a secret password to put into edit mode, if the config changes without being out into edit mode first, disconnect the server. Maybe use a raspberry pi that’s hidden from the network to do this. I know that wouldn’t work for large websites maybe because they can’t afford to go down for hours at a time, but it would give you an additional layer of security for sensitive stuff. I’m more into game programming but I know how exploits work and stuff. I’m pretty sure many types of things like this already exist in the market. One idea I had was pretty neat. Basically in your eula you reserve the right to hack back people that try to hack you, and you have an automated system that uses some known exploits to get a ping or maybe install a rootkit on anyone who is trying to mess around in your system. Later you can just get on and deanonymize them. This requires you actually spend time researching your own zero days. People in defcon hacking competitions do this. They are sort of masters with decompilers and hex editors.