Emotet

joined 6 months ago
[–] [email protected] 3 points 2 months ago (3 children)

Buying a domain. There might be some free services that, similar to DuckDNS in the beginning, work reliably for now. But IMHO they are not worth the potential headaches.

[–] [email protected] 2 points 2 months ago (6 children)

DuckDNS pretty often has problems and fails to propagate properly. It's not very good, especially with frequent IP changes.

[–] [email protected] 2 points 2 months ago

Damn, that's wild. Cheers for sharing!

[–] [email protected] 3 points 2 months ago (2 children)

I have an understanding of the underlying concepts. I'm mostly interested in the war driving. War driving, at least in my understanding, implies that someone, a state agency in this case, physically went to the very specific location of the suspect, penetrated their (wireless) network and therefore executed a successful traffic correlation attack.

I'm interested in how they got their suspects narrowed down that drastically in the first place. Traffic correlation attacks, at least in my experience, usually happen in a WAN context, not LAN, for example with the help of ISPs.

[–] [email protected] 6 points 2 months ago (6 children)

Sounds interesting, got any links for further reading on that?

I can't quite connect the dots between wifi/internet traffic spikes when IRC is so light on traffic that it's basically background noise and war driving.

[–] [email protected] 4 points 2 months ago (1 children)

Why do you keep stating blatantly false info as facts when it is obvious that you're knowledge of the topic at hand is superficial at best?

In this comment thread alone you've stated that:

  • to avoid "Google Android", one should use Lineage OS (?)
  • Apps on Lineage are some kind of separated on Lineage OS and not abandonware (??)
  • Lineage OS is not terrible for security, because you haven't found anything wrong with it besides that small little, insignificant detail of an unlocked bootloader (???)
  • DivestOS has "all the same issues" as GrapheneOS(????)

Genuinely not trying to stir up shit, I'm curious. Why?

[–] [email protected] 8 points 2 months ago

It's great that it works for you and that you strive to spread your knowledge. Personally, I'm quite happy with my DNS filtering/uBlock Origin and restrictive browser approach and already employ alternatives where feasible in my custom use case.

Thanks for your offer, though!

[–] [email protected] 102 points 2 months ago (6 children)

15-20 years ago, I'd have agreed with you. But apart from a select few news sites and exceedingly rare static sites, what percentage of websites most users use day to day actually function even minimally without JavaScript?

I'm convinced that in practice, most users would be conditioned to whitelist pretty much every site they visit due to all the breakage. Still a privacy and security improvement, but a massive one? I'm not sure.

Very happy to be convinced otherwise.

[–] [email protected] 3 points 3 months ago

I wrote a simple, locally running Webapp some time ago, that targets the Lemmy Import-/Export-API and supports transferring only specific userdata between accounts, as demonstrated in this corresponding Wiki Entry.

The import functionality in Lemmy is additive in nature, meaning anything you import gets added on top of existing settings instead of replacing it.

Does the same thing as these manual instructions for this usecase, may be helpful to some.

[–] [email protected] 3 points 3 months ago (2 children)

if you've flown for 12 hours with all that entails to go to the US (for a reason) and are presented with the choice of unlocking your phone or be denied entry, you will cooperate. Especially if you moved all your sensitive info beforehand.

[–] [email protected] 1 points 3 months ago

I'd appreciate it very much!

[–] [email protected] 0 points 3 months ago

Great suggestion to secure the backups themselfes, but I'm more concerned about the impact an attacker on my network might have on the external network and vice versa.

 

I'm strongly considering adding another backup location in the form of an old Raspberry Pi and a USB HDD.

I want the Pi to exclusively use the available network to connect to my Wireguard Server, so other devices (local to the Wireguard Server and remote connected to the server) can use it as a secondary backup location.

I'm kind of worried about a scenario, where my network is compromised and, through the VPN connection of the Pi in the external network, the external network is as well.

What are the best practices to secure such a setup?

 

Currently, I have two VPN clients on most of my devices:

  • One for connecting to a LAN
  • One commercial VPN for privacy reasons

I usually stay connected to the commercial VPN on all my devices, unless I need to access something on that LAN.

This setup has a few drawbacks:

  • Most commercial VPN providers have a limit on the number of simulations connected clients
  • I either obfuscate my IP or am able to access resources on that LAN, including my Pi-Hole fur custom DNS-based blocking

One possible solution for this would be to route all internet traffic through a VPN client on the router in the LAN and figuring out how to still be able to at least have a port open for the VPN docker container allowing access to the LAN. But then the ability to split tunnel around that would be pretty hard to achieve.

I want to be able to connect to a VPN host container on the LAN, which in turn routes all internet traffic through another VPN client container while allowing LAN traffic, but still be able to split tunnel specific applications on my Android/Linux/iOS devices.

Basically this:

   +---------------------+ internet traffic   +--------------------+           
   |                     | remote LAN traffic |                    |           
   | Client              |------------------->|VPN Host Container  |           
   | (Android/iOS/Linux) |                    |in remote LAN       |           
   |                     |                    |                    |           
   +---------------------+                    +--------------------+           
                      |                         |     |                        
                      |       remote LAN traffic|     | internet traffic       
split tunneled traffic|                 |--------     |                        
                      |                 |             v                        
                      v                 |         +---------------------------+
  +---------------------+               v         |                           |
  | regular LAN or      |     +-----------+       | VPN Client Container      |
  | internet connection |     |remote LAN |       | connects to commercial VPN|
  +---------------------+     +-----------+       |                           |
                                                  |                           |
                                                  +---------------------------+

Any recommendations on how to achieve this, especially considering client apps for Android and iOS with the ability to split tunnel per application?

Update:

~~Got it by following this guide.~~

Ended up modifying this setup to have better control over potential IP leakage

view more: next ›