Our News Team @ 11 with host Snot Flickerman

  • 21 Posts
  • 2.8K Comments
Joined 1 year ago
cake
Cake day: October 24th, 2023

help-circle







  • I have all my devices set to reboot once weekly a few hours after daily scheduled updates. I probably don’t need to do this, but I do. It’s a habit I got in with scheduling router reboots, and then started extending it to other devices. It’s nice to have some solid uptime, but I have three unbound DNS servers in sequence so they update and reboot on a staggered schedule so it’s like they never go down.

    You never know when the odd cosmic ray is gonna hit and flip yer bits.









  • That’s because those are Branding places. They’re places to sell your Brand. It’s why business profiles are interchangeable with personal profiles, it’s about branding.

    Branding isn’t just for corporate products anymore, it’s for everyone, apparently.

    It’s the whole “influencer’s real lives are a lot less glamorous than their Insta leads you to believe,” which is totally true, most of the clothes are rented and they get to stay maybe 24 hours in a nice place just for a photo shoot, then they’re sent back to their crappy apartment.

    Asmongold is a gross dumb piece of shit but openly living in filth is at least being honest about how most of these influencers actually live.

    It’s all smoke and mirrors for branding. Real people with real lives don’t spend their time managing their “brand” anywhere, whether it’s Instagram or LinkedIn because, by definition, we have real lives and real connections with real people already.



  • https://www.malwarebytes.com/blog/news/2021/12/was-threat-actor-kax17-de-anonymizing-the-tor-network

    Given the number of servers run by KAX17 the calculated probability of a Tor user connecting to the Tor network through one of KAX17’s servers was 16%, there was a 35% chance they would pass through one of its middle relays, and up to 5% chance to exit through one.

    This would give the threat actor ample opportunity to perform a Sybil attack. A Sybil attack is a type of attack on a computer network service where an attacker subverts the service’s reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. This could lead to the deanonymization of Tor users and/or onion services.

    Given the cost and effort put into this and the fact that actors performing attacks in non-exit positions are considered more advanced adversaries because these attacks require a higher sophistication level and are less trivial to pull off, it is highly likely this is the work of a high-level (state-sponsored?) threat actor. As for who is behind this group, neither Nusenu nor the Tor Project wanted to speculate.

    A spokesperson for the Tor Project confirmed Nusenu’s latest findings and said it had also removed a batch of KAX17 malicious relays.

    “Once we got contacted, we looked through all the relays in the network and identified several hundred relays that are very likely belonging to the same group and removed them on November 8.”

    VPN’s also by definition still use the same corporate pipes as anything else.