• 6 Posts
  • 129 Comments
Joined 1 year ago
cake
Cake day: June 24th, 2023

help-circle

  • You seem pretty active with OSM, so I’ll propose this here since I don’t have time to make it.

    OSM is very, very popular with hikers and cyclists, and I’d argue rhey drive a lot of it’s use, especially via third-party systems. However, it’s one failing is “gravel” roads. While they support many different gravel road types, they admit on their Wiki that use of the proper terms is low.

    Given the heavy use of Garmin devices, especially among gravel cyclists, mountain bikers, and bikepackers, where terrain definition is important, it would be outstanding to have an app in the Garmin store for Edge devices that could report the exact terrain type (compacted, dirt, etc) with a button mash as you ride it.




  • I think you are confused. You can use ELK under AGPL with this news going forward. The fact that they have to retain SSPL, too, because of previous contributors under that license, has nothing to do with the fact that you can use AGPL going forward. I’ve read your other responses,but they all seem to go down the same seemingly incorrect direction.

    Am I missing something?




  • You, as a network engineer, at a business, where SSH is normal. This is not your realm, as schools look for very different signals. They are rarely actively monitored, but when they are, SSH will 100% look suspicious, and this individual already has a flag on them for tor, so yes they go beyond MAC and can identify them. You haven’t even asked what kind of school it is, how they access school content when on the network that could identify their machine, or what the risks are for getting caught, yet you want to push a method when others have provided better8 options for obscurity. I am looking out for this kid’s (or adult’s) well being.

    Yes, your method works to bypass a firewall, I have even used it myself many times. But it is absolutely not the best option here. And before you ask for credentials again, yes, I have network security experience in multiple domains, including corporate provided POC exploits for software you would know the names of, threat modeling for highly sensitive data, and organization and management of certified systems, along with knowledge of school network infrastructure.