Computers are hard, can everyone go back to unobfuscated telephone calls and handwritten letters?
- Cops everywhere
Computers are hard, can everyone go back to unobfuscated telephone calls and handwritten letters?
There was a Defcon talk a few years ago (oh god it was 8 years ago) where someone found a way mess with Chryslers because they were all on the Sprint wireless network. Things like lock out the physical controls on the radio then max out the volume, or turn it into a GPS tracker, or disable the brakes! The cars had some service listening on port 6667, there was no way to stop them from accepting malicious connections so Sprint just blocked all traffic on that port on their network at the request of Chrysler. The speaker mentioned they were sorry if you were unable to use IRC any more on Sprint wireless.
DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle
“File Browser” or “Sharry” allow you to make public links to share files with others BUT you need to run them on a server that is accessible to both parties.
Spread the chaos! It’s the only way that people will learn!
I read a great post where a guy bit-squatted (bought a domain that was 1 flipped bit away) Google and managed to replace the Google logo on google.com for millions of people. He did the same for facebook and ended up getting thousands of post requests with user data which normally would have failed to resolve or just timed out.
There is still plenty of unexpected fun to be had with domains.
Chaotic good, right there.
I recently setup Guacamole (Web based VNC/RDP/SSH) with totp and was able to close external SSH access. Now everything I run can sit behind a single reverse proxy, no extra ports.
I found WatchYourLan hosed my PiHole logs. Somehow the WYL instance got its hostname associated with ~10 mac addresses on my lan so more than half of my traffic comes from “watchyourlan.local”. FML
DeleteMe
They seem like a scam. Their “Free Scan” gives the same results on a 20 year old email address as it does on a 2 years old address.
Hmm, TIL, thanks.
I love Mullvad and recommend them for everything other than torrenting. Once they disabled port forwarding I moved to AirVPN who seem to be pretty legit.
I’m not trying to keep my ratios up but I have a few torrents of media that are not available anywhere for sale and have less than 10 seeds, so I feel like I am helping keep the shows and movies of my childhood alive.
You expect a cop to understand both the threat and entertainment value of a Defcon talk?
As soon as Google bought YouTube they knew who the users were and everything they did online. This was never not true. Their business is to log all the activity of all internet users, not to make them safe or happy, there is nothing broken in their platform as far as they are concerned.
I keep each service separate as far as DBs, if something breaks or get a major upgrade I don’t have to worry about other containers.
Namecheap, cheap, easy to use, easy to setup DDNS, helpful support staff. I have heard horror stories of them selling popular domains out from under their owner but none were recent.
Because most selfhosters are too lazy or inexperienced to break away from cloud services. Docker is great but it has also enables a “just run this docker” mentality that mirrors the Windows “just run this exe.”
edit: I think that the opportunity to learn how a project works, how to debug problems and how to integrate a project into their own setup is obscured.
I ran my ssh behind 53 for a while because it’s rarely blocked. A few bots even got it right and figured out it was ssh.
Without being able to set a static ip and forward ports you cant host services and point to them with a domain, like driveway-home.com or something.
But I think cloudflare has a service that lets you connect remotely without needing static ip’s (some one else will know the name). If you were to use that then you can use your laptop to host pretty much anything on the Awesome Selfhosted List.
Device agnosticism. Life is easier when it doesn’t take ONE laptop or phone failure to destroy all your data.
Makes me wonder if there are any cyphers that are easy enough that human meat could implement it but hard enough that it would take some serious GPU time to crack?