Show newer

what a crappy week. Its not even that anything went wrong (though it did), but I've just been anxious all week

always fun to remember humanity had millennia to figure out undergrad physics but i have 4 years.

@ajroach42 Bah, I've done similar, I don't see it as fundamentally different than stunnel, and it neatly handles NAT and firewalls to boot!

@ajroach42 Running the tor service on the same machine? should be golden.. if not I am sure in 0.001 seconds someone else will chime in!

@ajroach42 Well, that changes EVERYTHING.. like completely everything. TECHNICALLY that last hop is still in the open; BUT you 'have' to trust that the person who setup the service (you?) trusts that last node (hidden services use _6_ nodes instead of 3. You're good unless the person setting up the hidden service is an idiot :)

@ajroach42 No, tor is NOT E2E encrypted, it is encrypted until you hit the exit node, and then its raw whatever protocol out (in this case telnet, non encrypted). So, do you trust the Tor exit node you've picked? Do you even know who runs it? (We know for example that wikileaks got a lot of its documents from tor exit nodes; you can bet that every intelligence service runs tor exit nodes.

@lattera I realized too late the correct snarky reply to hardenedstrcasecmp was that it was called strncasecmp.

@lattera merging in? Are you keeping your implementation, just resyncing everything around it?

re: cursing, DNS Over Clown (DoC) 

@cynicalsecurity @florian @mwlucas lets be totally clear here. It’s about boosting DNS and web performance for CloudFlare’s customers. Which of course makes them a more attractive CDN

cursing, DNS Over Clown (DoC) 

@florian they may be using the rrsig as a way to detect the fuckery. However this REALLY begs the question. Cannot all of the “bad” people they say they are protecting you against just add this to their zones and disable this 🐛 (“feature”)

Full disk encryption gives peace of mind if your computer goes missing and reduces anxiety about throwing out old hard drives or computers.

Show thread

@lattera would that be different than attempting to compel a locksmith to open a regular lock? I wouldn’t think so (IANAL). But in that case, even if they did, it would be inadmissible (IANAL)

Show older
Cross Family's Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!