NeatNit

@NeatNit@discuss.tchncs.de

This profile is from a federated server and may be incomplete. Browse more on the original instance.

NeatNit,

It really doesn’t look that way to me.

NeatNit,

This is all progressing way too slowly T_T

NeatNit,

Linux is affected.

NeatNit,

arstechnica.com/…/novel-attack-against-virtually-…

Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn’t implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.

I did not look into that setting that minimises the effect but from the way it’s written it sounds like this isn’t used by default, so by default you’re still vulnerable. Add even if it’s on, there’s still a side vulnerability.

NeatNit,

I think by client you mean the device and operating system, which is correct to my understanding, but it’s confusing because ‘client’ can also mean the VPN client software which is often supplied by the VPN provider, and that’s what I first think when you say client. So with that in mind it sounds like you’re saying “it’s not about the VPN but the VPN software” which obviously comes from the same provider.

I have not looked into it so you probably understand this more than I, but from the sound of it the VPN software can be built to detect, prevent or counteract the exploit even on affected systems? In which case, even though it’s an environment issue it can still be resolved by the VPN provider.

NeatNit,

I have no idea if they are assisting, it’s all baseless conjecture on my part! Sorry if that wasn’t clear, I thought it was

NeatNit,

Depending on what its purpose it, it likely needs to be unencrypted (or at least decryptable by the operator without the user’s key) in order to function. A recovery email likely needs to be used precisely when you don’t have your password, so it can’t work if it’s encrypted with your private key.

I suppose this isn’t necessarily obvious to a user but it’s not a flaw or fault of Proton, it’s unavoidable if a recovery email is used. Note that it’s optional to add one (see article update).

NeatNit,

Don’t put any recovery info on Proton

About that. I’m still making the transition from gmail and currently most of my mail still goes to gmail first and gets forwarded to Proton through their easy switch process. Surely this is just as up for grabs as a recovery email, right?

FWIW I’m not likely to be investigated any time soon so I’m not worried either way.

NeatNit,

FYI email contents were not decrypted or turned over to police, as far as I know Proton’s E2EE is still as good as whatever system you’re using. Proton doesn’t have the keys to decrypt your emails, it never did. What they have access to is metadata that is necessary to function when your private key is unavailable - e.g. your public encryption key used to encrypt incoming emails from non-Proton sources, or in this case, a recovery email address (I don’t know what the recovery process entails and whether it can restore encrypted emails).

NeatNit,

That’s significantly worse privacy-wise, since Google gets a copy of everything.

Obviously, but I still haven’t gone through all the things I’ve ever signed up to and changed my email to the proton one. When I sign up to new stuff I use Proton, this is a necessary step for transition… And one that is likely to stay in place for a very long time since I’m going to keep procrastinating it.

Unless you’re using proton mail anonymously then you don’t need to consider the recover email as a weakness.

Excellent point.

NeatNit,

This technique can also be used against an already established VPN connection once the VPN user’s host needs to renew a lease from our DHCP server. We can artificially create that scenario by setting a short lease time in the DHCP lease, so the user updates their routing table more frequently. In addition, the VPN control channel is still intact because it already uses the physical interface for its communication. In our testing, the VPN always continued to report as connected, and the kill switch was never engaged to drop our VPN connection.

Sounds to me like it totally works even after the tunnel has started.

NeatNit,

Not really, Linux is still vulnerable and there is a mitigation but it opens a side channel attack.

NeatNit,

I second this. From Merriam-Webster:

just, adjective

  1. a : having a basis in or conforming to fact or reason : reasonable

    had just reason to believe he was in danger

    b : conforming to a standard of correctness : proper

    just proportions

    c archaic : faithful to an original

  2. a(1) : acting or being in conformity with what is morally upright or good : righteous

    a just war

    (2) : being what is merited : deserved

    a just punishment

    b : legally correct : lawful

    just title to an estate

NeatNit,

I didn’t read this all the way through (yet) but it’s excellent so far

NeatNit,

I guarantee that they won’t stay for that long on my computer.

Edit: nor yours, or anyone else’s

NeatNit,

If you think it’s that simple you have no clue how controversial he is, and has been for roughly the entire time (increasing over the years). Israel isn’t (yet?) stuck in a two-party system, so there’s lots of different parties. Needless to say, Likkud (his party) does not get 50% of the votes. It is the largest party most of the time but not a majority.

The previous government formed with parties from opposite sides of the spectrum just to keep the Likkud out. It didn’t last long, but neither did any of Bibi’s governments in the preceding 2 years - we’ve had a political crisis because no one wanted to work with him because he’s so controversial. The only reason he won the last election is that some parties on the left didn’t pass the threshold to be represented (basically throwing away their votes) and he partnered with extremist parties on the far-right, which he previously wouldn’t have lowered himself to but he was desperate to return to power. No one would partner with him but them.

As for the number of votes Likkud does get - yeah, it’s a lot, but so are Trump voters (or pick your least favourite party/politician in your country) and it wouldn’t be fair to generalise and say all Americans support Trump, would it? Not to mention, you only get to pick from the candidates that are available.

FWIW I voted against him, to the party that didn’t pass the threshold :( it was the first time in their history this happened IIRC

NeatNit,

I can’t figure out the last sentence (before fave stars)

NeatNit,

States starting with A are huge, states starting with W are tiny. (If there were states starting with Z they’d be even smaller)

NeatNit,

I don’t know, it’s a dumb concept anyway ¯_(ツ)_/¯

NeatNit,

The excellent podcast That’s Absurd Please Elaborate answered this: thatsabsurdshow.com/…/005-scores-mutual-nightmare…

TL;DL: big mistake, big boom

NeatNit,

I’m absolutely sure this wouldn’t work but I need to know why it wouldn’t work

NeatNit,

no I mean the format, lebron james reportedly …?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • InstantRegret
  • Youngstown
  • thenastyranch
  • slotface
  • hgfsjryuu7
  • rosin
  • ngwrru68w68
  • kavyap
  • Durango
  • khanakhh
  • cubers
  • DreamBathrooms
  • PowerRangers
  • anitta
  • magazineikmin
  • vwfavf
  • mdbf
  • everett
  • tacticalgear
  • GTA5RPClips
  • cisconetworking
  • modclub
  • ethstaker
  • osvaldo12
  • normalnudes
  • tester
  • provamag3
  • All magazines