fmstrat

joined 1 year ago
[–] [email protected] 1 points 2 months ago

I switched to garmin because of the transflective LCD. So much better than AMOLED for a watch. But e-paper would definitely be nice, too (if I didn't use active maps when backpacking).

[–] [email protected] 14 points 2 months ago (1 children)

If you use multi-line commands, and you use bash enough, it starts to look like any other language.

[–] [email protected] 5 points 2 months ago

It is not easy, as it's not even possible on desktop.

[–] [email protected] 0 points 2 months ago (1 children)

I guess they magically knew it was them? And there you go again with "work." Shadowsox has already been mentioned for randomized https traffic. Feel free to learn from the other comments.

[–] [email protected] 0 points 2 months ago (3 children)

He literally said he had already been identified. Read.

[–] [email protected] 3 points 2 months ago

"Will this matter in 6 months?" If not, don't waste your mental energy on it.

[–] [email protected] 0 points 2 months ago (5 children)

You, as a network engineer, at a business, where SSH is normal. This is not your realm, as schools look for very different signals. They are rarely actively monitored, but when they are, SSH will 100% look suspicious, and this individual already has a flag on them for tor, so yes they go beyond MAC and can identify them. You haven't even asked what kind of school it is, how they access school content when on the network that could identify their machine, or what the risks are for getting caught, yet you want to push a method when others have provided better8 options for obscurity. I am looking out for this kid's (or adult's) well being.

Yes, your method works to bypass a firewall, I have even used it myself many times. But it is absolutely not the best option here. And before you ask for credentials again, yes, I have network security experience in multiple domains, including corporate provided POC exploits for software you would know the names of, threat modeling for highly sensitive data, and organization and management of certified systems, along with knowledge of school network infrastructure.

[–] [email protected] 1 points 2 months ago (7 children)

Again these are all assumptions. These are risks that do not need to be taken when there are better methods.

[–] [email protected] 2 points 2 months ago (1 children)

That is a big assumption. Are there any Pacman games with different types of ghosts?

[–] [email protected] 5 points 2 months ago (1 children)

Putting this here,too:

Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.

[–] [email protected] 8 points 2 months ago (11 children)

Highly identifiable. Do not do this. Will it get you through the firewall? Yes. Will it get you in trouble when they see all your traffic going to one place? Also yes.

[–] [email protected] 3 points 2 months ago

And if you host your own VPN, it's identifiable as a single destination for your connection.

view more: ‹ prev next ›