• 0 Posts
  • 20 Comments
Joined 10 months ago
cake
Cake day: September 8th, 2023

help-circle
  • Mullvad has written a post about it Here.

    FYI

    The desktop versions (Windows, macOS and Linux) of Mullvad’s VPN app have firewall rules in place to block any traffic to public IPs outside the VPN tunnel. These effectively prevent both LocalNet and TunnelVision from allowing the attacker to get hold of plaintext traffic from the victim.

    Android is not vulnerable to TunnelVision simply because it does not implement DHCP option 121, as explained in the original article about TunnelVision.

    iOS is unfortunately vulnerable to TunnelVision, for the same reason it is vulnerable to LocalNet, as we outlined in our blog post about TunnelCrack. The fix for TunnelVision is probably the same as for LocalNet, but we have not yet been able to integrate and ship that to production.

    I gotta say, i am really impressed with Mullvad. They’re not just a VPN seller. They write security compromise bulletins regularly and as soon as vulnerabilities show up and they actively lobby at the EU organs for more privacy laws. They really work and live their identity in every way.


  • NeuronautML@lemmy.mltoMildly Infuriating@lemmy.worldEmail admin
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    4 months ago

    The survey fatigue is real. Everyone keeps begging for reviews nowadays. Even random things like public parking.

    I grow resentment at any business begging for reviews. Hire a consultant and third party to auction your service, I’m not doing it for free anymore. Specially because they don’t even read the comments you write or reply. It’s just nonsense an intern will put into an end of quarter ppt for some average mediocre manager.


  • From what i read about it, Apple has a walled garden but charges a flat fee for everyone and has no special deals. Everyone pays the same and they make a little money off of the store but also the hardware sold.

    Whereas Google has been caught treating certain parties differently, such as Spotify, something called Project Hug, where they gave extra benefits to parties at risk of leaving the play store, among other unequal dealings.

    So the crux of the question is not about the monopoly itself, but the fact that Google is treating market players differently and throwing its weight around to influence the market to its advantage.




  • Might as well sue the ISP as well. Who else can parents blame for their lack of competence and awareness in what their children are doing in an environment where they can communicate, apparently in an unfiltered manner, with adults ?

    It’s really funny. Companies have made all sorts of lockdown programs and monitoring software anyone can purchase for any operating system and then there’s parents blaming other entities for the fact that they have decided not to use those programs.

    We chose not to have kids, but still we are apparently saddled with raising the kids other people chose to have. It’s like having a toddler and no door, then your toddler walks into traffic, dies, and you blame the city for killing your toddler. That’s UK law for you.

    The guy in the article had the child send him 220 pictures right under a mother and father’s nose before he was caught. A child who, by the way, was 11, barely a teen. Holy terrible parenting, batman. These people should lose custody immediately.



  • NeuronautML@lemmy.mltoScience Memes@mander.xyzWe don't judge here. :)
    link
    fedilink
    English
    arrow-up
    50
    ·
    edit-2
    8 months ago

    What’s the first indicator a scientist tried to build their own experiment using the soldering station ?

    The smell of burnt fingers.

    What’s the scientist waiting for sitting in front of their own experiment ?

    Waiting for the infinite loop they coded to finish after they claimed they didn’t need the engineer’s help to write the code in their experiment.

    How many scientists do you need to change a light bulb ?

    Theoretically just one, but it can take several until one of them can call an engineer and admit they only know how to change light bulbs theoretically.

    What does a scientist call an electrolytic capacitor ?

    Acid distribution subsystem.


  • NeuronautML@lemmy.mltoPrivacy@lemmy.mlRefute this
    link
    fedilink
    arrow-up
    9
    ·
    edit-2
    8 months ago

    A dude got caught making bomb threats at Harvard because he was the only one in his university that connected to TOR and they knew from the entry node it had to be from that area. They checked the logs and only one PC had directly connected to the TOR network from that area at that time. The guy wanted more time to study.


  • NeuronautML@lemmy.mltoPrivacy@lemmy.mlRefute this
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    8 months ago

    And a separate flash with your password database, PGP keyring and an encrypted files vault. If you need to go or to destroy/hide evidence, a flash drive is much easier, specially when the task force going after you is more worried about hard drives and laptops and usually gloss over flash drives at least initially.


  • NeuronautML@lemmy.mltoPrivacy@lemmy.mlRefute this
    link
    fedilink
    arrow-up
    22
    ·
    edit-2
    8 months ago

    Depends on what you wanna do with TOR. If you wanna be anonymous in your regular internet browsing and torrents, go with a good quality paid for VPN with no logs, like mullvad or proton. You don’t need TOR at all. You’re not worth the hassle.

    If you’re trying to commit chill crimes like ordering drugs online, then you should probably look up the DNM bible. Just TOR and maybe a bridge is enough probably, if people where you live in don’t use TOR. LEO can’t see your traffic but if you’re the only one using TOR in your neighborhood, it’s pretty easy to pin you.

    If you’re a journalist and you’re about to piss off a powerful government, you probably need a bridge and TOR and a laptop with no hard drive. You will probably need some self hosted machines to obfuscate your traffic which you will need to recycle really often. You shouldn’t use a phone. You also need a lot of money and a lot of help, specially in countries that are against the country you’re pissing off. Opsec becomes a full time job, depending on how many friends you have.

    If you’re trying to run a drug empire or distribute CSAM, getting caught is merely a question of when no matter what you use, because even politically divergent countries and organizations will unite to put you in jail, even if they’re normally on the crime side of things. Nobody likes CSAM distributors and drug empires usually don’t make a lot of friends and make way too much money to keep the ones they do.


  • NeuronautML@lemmy.mltoPrivacy@lemmy.mlRefute this
    link
    fedilink
    arrow-up
    23
    ·
    edit-2
    8 months ago

    This horse has been beaten to death. There are literal computer science papers debating this specific issue. More than one even. Refuting you here is just a waste of time. Go read those much more comprehensive papers than anything that could be written here. Just use your search engine of choice and type Anonymity, TOR and VPN and watch as a world of refuting unfolds in front of your eyes. Academic, scientific, peer reviewed, quality refuting.

    At the end of the day you use whatever you feel like using. It’s your machine, possibly your freedom at stake. Go ahead, use whatever you please.









  • I can guarantee you that is never going to happen. You ban VPNs and all the companies R&D departments will leave. A VPN is an essential part of corporate data infrastructure. If a company is unable to secure intellectual property, it will move it elsewhere, leaving only sales and manufacturing, at best.

    And since France is in Schengen, I’m sure other European countries would love to get those corporate taxes for themselves.