Admin on the slrpnk.net Lemmy instance.

He/Him or what ever you feel like.

XMPP: povoq@slrpnk.net

Avatar is an image of a baby octopus.

  • 36 Posts
  • 867 Comments
Joined 3 years ago
cake
Cake day: September 19th, 2022

help-circle



  • The R3 isn’t really powerful enough for that.

    On small x86 routers you can install Opnsense or IPfire which come with some non-router software to run a reverse-proxy or so. IP fire also allows to run full VMs, but the more advanced features are pretty limited.

    Some people also do the reverse and run a full OS on them and then virtualize Opnsense and directly pass through a NIC to that VM.





  • A timing attack is extremely realistic when you control one of the end devices which is a common scenario if a person gets arrested or their device compromised. This way you can then identify who the contacts are and with the phone number you can easily get the real name and movement patterns.

    This is like the ideal setup for law inforcement, and it is well documented that honeypot “encrypted” messengers have been set up for similar purposes before. Signal was probably not explicitly set up for that, but the FBI for sure has an internal informant that could run those timing attacts.





  • Be careful with powering HDDs on and off. That is actually the operation that puts the most strain on them AFAIK. Sadly there is no good rule of thumb when it does more harm than good, but I would guess if you turn it on more than once a week, you are probably doing more harm than good compared to just letting in run. Many people even intentionally turn off sleep-mode in “green” drives so that they don’t shut down automatically.