@bcallah I can also help. Let me know what to do, what contacts to make, etc!
re: the worst in-joke
@pamela lol!! I’ve seen that. Ok I get it now.
the worst in-joke
@pamela i am embarrassed to say that I don’t get it
innuendo
@mwlucas for Ariel’s sake I hope not 😉
Some X-Com: UFO Defense aka UFO: Enemy Unknown gameplay on #OpenBSD :
@ajroach42 Bah, I've done similar, I don't see it as fundamentally different than stunnel, and it neatly handles NAT and firewalls to boot!
@ajroach42 Running the tor service on the same machine? should be golden.. if not I am sure in 0.001 seconds someone else will chime in!
@ajroach42 Well, that changes EVERYTHING.. like completely everything. TECHNICALLY that last hop is still in the open; BUT you 'have' to trust that the person who setup the service (you?) trusts that last node (hidden services use _6_ nodes instead of 3. You're good unless the person setting up the hidden service is an idiot :)
@ajroach42 No, tor is NOT E2E encrypted, it is encrypted until you hit the exit node, and then its raw whatever protocol out (in this case telnet, non encrypted). So, do you trust the Tor exit node you've picked? Do you even know who runs it? (We know for example that wikileaks got a lot of its documents from tor exit nodes; you can bet that every intelligence service runs tor exit nodes.
@lattera I realized too late the correct snarky reply to hardenedstrcasecmp was that it was called strncasecmp.
FreeBSD enthusiast and regular contributor. I have opinions!