innuendo
@mwlucas for Ariel’s sake I hope not 😉
Some X-Com: UFO Defense aka UFO: Enemy Unknown gameplay on #OpenBSD :
@ajroach42 Bah, I've done similar, I don't see it as fundamentally different than stunnel, and it neatly handles NAT and firewalls to boot!
@ajroach42 Running the tor service on the same machine? should be golden.. if not I am sure in 0.001 seconds someone else will chime in!
@ajroach42 Well, that changes EVERYTHING.. like completely everything. TECHNICALLY that last hop is still in the open; BUT you 'have' to trust that the person who setup the service (you?) trusts that last node (hidden services use _6_ nodes instead of 3. You're good unless the person setting up the hidden service is an idiot :)
@ajroach42 No, tor is NOT E2E encrypted, it is encrypted until you hit the exit node, and then its raw whatever protocol out (in this case telnet, non encrypted). So, do you trust the Tor exit node you've picked? Do you even know who runs it? (We know for example that wikileaks got a lot of its documents from tor exit nodes; you can bet that every intelligence service runs tor exit nodes.
@lattera I realized too late the correct snarky reply to hardenedstrcasecmp was that it was called strncasecmp.
@lattera wow. That is super awesome
@lattera merging in? Are you keeping your implementation, just resyncing everything around it?
re: cursing, DNS Over Clown (DoC)
@cynicalsecurity @florian @mwlucas lets be totally clear here. It’s about boosting DNS and web performance for CloudFlare’s customers. Which of course makes them a more attractive CDN
cursing, DNS Over Clown (DoC)
@florian they may be using the rrsig as a way to detect the fuckery. However this REALLY begs the question. Cannot all of the “bad” people they say they are protecting you against just add this to their zones and disable this 🐛 (“feature”)
Full disk encryption gives peace of mind if your computer goes missing and reduces anxiety about throwing out old hard drives or computers.
@Gargron this 1000 times this
@lattera would that be different than attempting to compel a locksmith to open a regular lock? I wouldn’t think so (IANAL). But in that case, even if they did, it would be inadmissible (IANAL)
FreeBSD enthusiast and regular contributor. I have opinions!