Wireshark is the wrong tool for the job unless you are only interested in the destination IPs, but those are useless to most people because malware and PUPs are hosted on public cloud services or rarely hijacked insecure endpoints, so what value is a source IP going to get you? For example most ‘suspicious’ traffic is from your cell phone and some app is phoning home over TLS, with ‘home’ being an elastic IP in AWS.
Like most things on the internet it’s a game of one-upsmanship. User X uses Firefox with Incognito. User Y say’s that isn’t good enough for his own inconsistent definition of “good enough.”
So User-Y suggests Firefox with 14 different add-ons and only browse through an immutable VM.
But then user-z comes along and says that if you are using windows at all, you don’t really care about privacy, so you should be using Icefox on some obscure fork of ubuntu through an immutable VM, with a pi-hole.
Then user-w says well if you aren’t using a VPN none of this matters, so Obviously you need to rent an Alibaba cloud server hosted in China, that you only connect to through a privacy respecting VPN, and then you only browse through TOR.
And so on. By the time a user is asking about how to stop google ads, the only “serious” answer by the community involves using Packet over Ham-radio -> and spending thousands of dollars a month on 4 different cloud providers, rented through several shell companies set up in Switzerland, the Cayman Islands and China, while only typing in Esperanto using an ASCII-only font.
This is a useful feature. If you are in an abusive household, then yes you should have as much financial separation as possible. For those that are in a happy and functional family with kids that you want to allow freedom for, this provides a measure of safety if you need it for potential emergency’s or if they aren’t answering the phone or whatever.
The EU can and should ban government and business’s from using twitter as part of their official communications. But if private citizens wants to tweet, then sure go for it, even the EU with it’s less then stellar speech record, particularly with the labeling antisemitism, still allows freedom of association.
A square is a regular polygon* with 4 sides.
*Regular Polygon A polygon which is both equiangular and equilateral (i.e. having all sides the same length and all interior angles the same).
Note that this doesn’t preclude the existence of a square with curved sides if projected upon a sphere. But when discussing common geometry the assumption is that we are working within a single plane. If you wish to work in non-planar geometry, that must be explicitly called out in the diagram.
Turn off broadcast of the SSID
Don’t do this. It provides zero security, and just reduces usability. Now you should call your SSID something non-identifiable. So instead of “$YourName Wifi” call it “pleasure chest” or something. Additionally do not set a ridiculous 64 character + special characters password, because again you are providing next to zero additional security, while hugely reducing usability.
Use a simple password scheme of 3-5 unrelated common words like from here: https://www.correcthorsebatterystaple.net/index.html for your wifi password.
I guess having a thick provisioned VM image on your laptop means that you are hiding something. Again if the evil government you are trying to hide something from doesn’t need reasonableness as a reason to detain you, then who cares? No matter what you do you are rolling the dice every time you interact with them.
Which is of course similar to the US today, so if I needed to hide something from them I’d make sure that once i’m legally compelled to give my password they at the very least wouldn’t have what they are looking for, since there is no way I could prove I didn’t have it anyway.
Did you know that potential attackers can pinpoint your location if they are in the same public place as you?
This really seems like complaining that a location enabled app that explicitly shares your location with other users is sharing your location with other users. That is 100% the purpose of the app to begin with!
I dont’ understand the issue here. Is that picture part of some specific VPS’s logo or is it part of the title/theme of the article? I think it’s very poignant, though obviously edgy, if it’s the latter. If your VPS provider isn’t censoring content, then obviously that means Nazism will be able to exist along with militant socialism advocating violence against capitalism. That is kind of the point of the article right? To determine which VPS is actually not going to censor.
Each country is free to create whatever rules they want for their country, but for people that don’t live in those countries then there is nothing more to say. There can be voluntary international cooperation (like there is with copyrighted works) but if I live somewhere that isn’t part of that international cooperation then like it or not, I am free to violate your laws all day.
Full tunnel using routing wouldn’t work but many full tunnel implementations use a shim where once the Tunnel is connected, the system route table isn’t referenced anymore, so you can put as many static routes etc as you want, but all traffic will hit the VPN interface before routing is done. For example Cisco any connect removes route look-up from the TCP/IP stack of the local system.
We’ve all been there right? You paid for a game, it required an active internet connection and a couple of years later the publisher decided they’re done with it and shut it down leaving you with a broken game.
I actually haven’t been there, because I correctly never bought a single player game that requires an internet connection.
i absolutely support the idea of banning internet connectivity for single player games though.
The only problem ShotSpotter solves is not enough public money into private hands. What information does it actually give the police, even assuming that it is 100% accurate?
At a certain time and place a gun was fired. Great? Who cares. That isn’t worth $1million/mo.
If there are 3 people in the general location and time that a gun was fired, what has shotspotter done to help?
Fortunately Chicago is getting rid of this finally. https://chicago.suntimes.com/city-hall/2024/02/22/shotspotter-contract-cost-mayor-brandon-johnson-cancel-extension-summer
I have a USB drive with a keypad on it, it stores my FIPS Compliant SSH-key for IL-5 government systems. I unlock it to add my key into my ssh-agent, and don’t use it for anything else. Though it is an 8gig USB stick, so I could in theory run some kind of security/pen testing flavor of linux plus a VPN Client to connect to said systems.
Why not? They are doing edge caching, they can literally just block the connection from visiting the site just like they do with their DDoS mitigation.