I like you and your username.
I like you and your username.
That would be a good band name, “Blood-Mouth and the Carnists” opening for “The Meatsplainers”!
Makes me wonder if there are any cyphers that are easy enough that human meat could implement it but hard enough that it would take some serious GPU time to crack?
Computers are hard, can everyone go back to unobfuscated telephone calls and handwritten letters?
There was a Defcon talk a few years ago (oh god it was 8 years ago) where someone found a way mess with Chryslers because they were all on the Sprint wireless network. Things like lock out the physical controls on the radio then max out the volume, or turn it into a GPS tracker, or disable the brakes! The cars had some service listening on port 6667, there was no way to stop them from accepting malicious connections so Sprint just blocked all traffic on that port on their network at the request of Chrysler. The speaker mentioned they were sorry if you were unable to use IRC any more on Sprint wireless.
DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle
“File Browser” or “Sharry” allow you to make public links to share files with others BUT you need to run them on a server that is accessible to both parties.
Which is why I am laying 4 feet off the ground instead of ON the ground. Also the giant hogweed.
It’s a Tensile Trillium. First time I’ve had it out of the bag.
It’s huge, 4m on a side.
Just a really wide angle.
I would like to say I am glad I didn’t wear any, but I am not glad, I am itchy.
Spread the chaos! It’s the only way that people will learn!
I read a great post where a guy bit-squatted (bought a domain that was 1 flipped bit away) Google and managed to replace the Google logo on google.com for millions of people. He did the same for facebook and ended up getting thousands of post requests with user data which normally would have failed to resolve or just timed out.
There is still plenty of unexpected fun to be had with domains.
Chaotic good, right there.
I recently setup Guacamole (Web based VNC/RDP/SSH) with totp and was able to close external SSH access. Now everything I run can sit behind a single reverse proxy, no extra ports.
I found WatchYourLan hosed my PiHole logs. Somehow the WYL instance got its hostname associated with ~10 mac addresses on my lan so more than half of my traffic comes from “watchyourlan.local”. FML
DeleteMe
They seem like a scam. Their “Free Scan” gives the same results on a 20 year old email address as it does on a 2 years old address.
Hmm, TIL, thanks.
I love Mullvad and recommend them for everything other than torrenting. Once they disabled port forwarding I moved to AirVPN who seem to be pretty legit.
I’m not trying to keep my ratios up but I have a few torrents of media that are not available anywhere for sale and have less than 10 seeds, so I feel like I am helping keep the shows and movies of my childhood alive.
Paddle’n