biscuitswalrus

@biscuitswalrus@aussie.zone

This profile is from a federated server and may be incomplete. Browse more on the original instance.

biscuitswalrus,

Very articulate. Appreciate the post.

biscuitswalrus,

No… It’s malware. It’s not a virus, it’s malicious. It’s malware.

biscuitswalrus,

I have a feeling it did because I remember watching early rtsp multicast streams of the anime initial D found through winamp in like 1999 at 240p. It’s so long ago that I’m not even sure that’s a correct memory.

biscuitswalrus,

That’s so cool

Linux mint or zorin OS for layman beginners who just want everything to work and focuses on stability , privacy , security ? Also what to do if I switched to mint and WiFi stopped working ?

Hey, so I just put this part up first because this is the one I urgently and importantly need answered even tho I wrote that hideous text block first (sorry English isn’t my first language )....

biscuitswalrus,

After installing mint, and you find a problem, just live boot mint again.

You can do a lot in live boot including mount your permanent copy even the kernel. Whatever is missing you can download put onto the installed hdd or usb storage, and then install.

Ask me how I know. Lol.

biscuitswalrus,

100% it’s crazy. I mined 1 btc in 2008(?) on a 9800gx2 over a bit longer than winter in Australia, and I’ve left it in a wallet and watching it flap up and down in value. This announcement was basically “crypto is up so we have enough again”. I mean selling what they must have will crash the market again surely. Or the repayment is over 36 months as they slow sell, but then they risk the value again going down.

Don’t do crypto kids, it’s a game for traders with an appeal to people who want to self host, self sufficient, disconnected from big banks, and all that, but it was corrupted by financially motivated assholes. Therefore it became an investment/wealth vehicle and received the attention of the most morally bankrupt, manipulative people.

Trust is what any currency that has no intrinsic valueis built on. Crypto can’t have that when the fraction of good to bad actors is skewed so heavily.

biscuitswalrus,

Thieves and murderers the lot of em. Just like my great great granddad before he was shipped here.

biscuitswalrus,

They took imaging scans, I just took a picture of a 1MB memory chip and omg my picture is 4GB in RAW. That RAM the chip was on could take dozens of GB!

biscuitswalrus,

Think of this:

You find a computer from 1990. You take a picture (image) of the 1KB memory chip which is on a RAM stick, there are 4 RAM sticks. You are using a DSLR camera. Your image in RAW comes out at 1GB. You project because there’s 8 chips per stick, and 4 sticks it’ll 32GB to image your 4KB of RAM.

You’ve described nothing about the ram. This measurement is meaningless other than telling you how detailed the imaging process is.

‘The cheap option’?: why the Gold Coast may be on track to build the most expensive light rail in the world (www.theguardian.com)

Alon Levy, co-lead of the transportation and land use program at New York University’s Marron Institute, has spent years studying why some countries are able to build transport infrastructure cheaply and others aren’t....

biscuitswalrus,

I don’t know man, I’d prefer light rail than a banananana bus, you know Brisbane style 3 segment bus…

biscuitswalrus,

My oat milk gymnastics:

  • Shamefully ask for oat milk
  • Nobody cares but I feel weak for being unable to handle standard milk any more
  • Why can’t I have soy? It tastes bad but it’s more common
  • Wonder if the people behind me are judging me for asking for long winded flat white
  • Wonder if I’m holding up other people’s orders because the barista has to clean out the milk jug to clean it between milk and oat juice
  • taste it and then go "I guess it’s not so bad"
  • small relief knowing it probably can’t be off unlike the few times I’ve had sour milk
  • coffee still makes me go to the bathroom, just less violently
biscuitswalrus,

Reasonably sure they mean telegram. Only secret chats are encrypted. Telegrams chat otherwise is basically transport layer encryption.

wired.com/…/telegram-encryption-end-to-end-featur…

biscuitswalrus, (edited )

Telegram isn’t encrypting chats (only secret chats).

As far as reproducible builds telegram has got instructions and caveats or excuses around builds for the same issues signal does: core.telegram.org/reproducible-builds#reproducibl…

Both easily make Android reproducible builds. This Twitter message is a rock being thrown in a glass house, knowing most people who consume Twitter like it’s a firehose, won’t swallow the nuance of the details.

I don’t even, not to complete lengths.

biscuitswalrus,

Australian native bees can’t sting, do a great job of pollinating, and make a little honey on the side. They’re very curious from experience with a swarm making a home on my water meter box, but not very scary.

biscuitswalrus,

AGPS probably does work though for location. Many work laptops have sim cards for 5g, and that means connectivity permanence and assisted gps from cell tower triangulation.

However I know from testing things like m365 login just accepts the ip location of vpn endpoint.

My advice is it depends: and it mostly depends on the effort of the sysadmin and the level of logs they look into. The timing of the log from your vpn connection and your location. If they own the networks you did connect to, those networks will know where you are.

Use your personal device for personal things. End of story.

biscuitswalrus,

Oh one different situation: because I’ve been on the side of supplying logs to cyber forensic analysts as part of cyber insurance post breach, the level of scrutiny will matter. If they find you’re doing something they don’t want on work equipment near or around a cyber incident you’ll be part of the post breach recommendations. As in, what to remediate.

SOLVED: If I pay for Proton Unlimited, do I get unlimited aliases through SimpleLogin's API or only through Proton Pass (kbin.run)

I'm gonna be paying for Proton Unlimited soon, which gives me unlimited email aliases through Proton Pass. Currently, however, I use Bitwarden and a SimpleLogin API key to generate aliases. Does paying for Proton give me unlimited aliases through SimpleLogin since SL is owned by Proton?...

biscuitswalrus,

Oh I think I’ve met you! You must be my coworker!

Just joking of course, looking fun of a privacy focused person while making a point my coworkers also don’t read. I’m glad you didn’t delete the post though, I enjoyed the journey. You did read, you’re better than my coworkers.

biscuitswalrus,

I’m not sure what to read into tho whole article, it reads like an onion article from a normal place.

Maybe it’s me taking the crazy pills today.

biscuitswalrus,

The Nintendo lawyers are full time, this is just a Thursday to them. You’re keeping those lawyers employed by giving them work.

biscuitswalrus,

Or maybe they’re trying to keep their system minimised from yet to be found security issues in the hundreds of packages pre installed that they don’t ever use or need, and act as nothing other than additional threat surface.

biscuitswalrus,

I’m not going to argue strongly for this, but there’s a certain irony that if the defender suite (defender for identity, defender for cloud apps, fervently for office, and defender for endpoint) was instantly unlocked in their plan 2 version for every subscriber for free, that would kill a huge segment of the security market including some of the industry leaders like SentinelOne huntress labs, and even SEIM providers like splunk and Arctic wolf and dozens more. The XDR and identity management industry would instantly be forced into an anti competitive environment.

There’s an argument for ‘but if they built it secure, then you wouldn’t need to bolt on detections’. I think a relevant metaphor is you buy a house, but then you add detection like cameras and intrusion detection. Make sure the locks on the doors and windows aren’t bypassed.

So I would think there is some nuance. And frankly for small business the cost for m365 business premium which has all of that, including a bunch of information protection and data loss prevention. You just actually have more of a configuration requirement that nearly none of my customers I onboard ever have done…

biscuitswalrus,

They did, it was cheaper to rebrand! (no I don’t know that, I’m just cynical)

biscuitswalrus,

Ok so you may need to translate a few things.

Routers gateway networks. Networks are extended physically by Ethernet. The ether in Ethernet is basically “to the network it doesn’t matter the medium” and in days past that was coax, or whatever Cabling you had but today is almost exclusively in a house, fibre, WiFi, and cat[5/6/7].

Why does this matter? The router is the pivot between networks. Wireless access points are just part of the network.

A wireless router is a device with two functions!

Ok so how does a router work? When you buy a home grade router like an Asus or netgear, you get a device which has a single routing statement “0.0.0.0/0 via connected interface WAN”. This works on almost everyones home network because they only have a single network.

A local network doesn’t need a router to talk, you only talk when you need to talk to something on another network. Your devices automatically broadcast to every other device on connection or device start up “I’m [mac address] with ip [ip] can you introduce yourself?” and everyone who is online responds back not in broadcast, but unicast directly to that device about their mac address. Your device stores that info in a Mac address table with time outs. This applies to the router too, it knows all the ip addresses on the LAN interface.

Ok now we want to add a second home network to segment IoT away from your highly personal devices with all your personal information. Good idea! So to do that on any “fully fledged” router it’s super easy you would connect a cable to LAN2 plan a second IP subnet and connect a switch or AP to that. The router is now a router for network LAN1 and LAN2. If a device needs to get from LAN1 it goes “this IP isn’t in my subnet therefore I will send it to the router”. It will have no idea if the device is online or offline, it just sends it blindly to the router. Your router gets that IP and now looks at its routing table which now looks like this,for example:

  • 192.168.0.0/24 via connected interface LAN1
  • 192.168.1.0/24 via connected interface LAN2
  • 0.0.0.0/0 via connected interface WAN

So now the router who knows you tried to get to a device within LAN2 from LAN1 will check the mac address table it has for LAN2 and see if there’s a mac address it’s learned from that device connection. If it does it sends the packet on back unmodified. The packet has return address information saying who sent it, and the IoT device can talk back.

Wonderful, that’s the most simplest type of multi-lan network you can create. There are no virtual lans and everyone expects networks to mostly work this way. This exact principle is how the rest of the whole internet works. What networks are via what interface and a traceroute will tell you the resulting path. A router doesn’t need to know the destination just the next network.

One last note on the background info, if you don’t want to setup everything with static IP addresses, you’ll setup a DHCP server which gives out IP details to devices via a lease system, and included can be DNS settings. You must have a dhcp service within a local network. That can be on the router on the LAN1 interface, and another DHCP server with different details on LAN2.

To apply this to your problem, I think you’ll want to review the features of your two WiFi routers that you have. Many home routers do not support two discrete LAN interfaces. If they have 4 LAN ports they could be already configured as a “bridge” which is to say they’re a switch. They’re all grouped all belonging to LAN1. Check to see if you can remove one from the bridge. BTW the WiFi is usually part of this bridge too.

If I had to guess the Asus router is likely more featured and more likely to have the ability to create a new network on a different interface.

The simplest design will be to have your one router be the router for both networks. One wireless router has the router function disabled and becomes a wireless access point connected to LAN2. The router will know all connected networks (WAN/LAN1MLAN2). You won’t even need to write in your own route.

But if this is not possible, it is still possible to use NAT. network address translation is a technology for a router to re-write the “return address” on every packet it sends. The return address becomes the routers WAN interface IP. Your network already has NAT because your LAN IP would send to an external network like “1.1.1.1” and if your return l address was “192.168.0.2” then 1.1.1.1 wouldn’t know how to get back to you since your IP is used on millions of home private networks. Instead your router uses NAT to keep a table of every single connection to the internet and waits for replies and redirects them back to the right device. It replaces the source address with your ISP assigned public IP. So 1.1.1.1 could have got a return address of 12.23.34.45 your home internet ip.

But this can work on your home network but there’s limitations. Just 1.1.1.1 can’t randomly reach back out to the original device ever. Only your device can ask 1.1.1.1. If 1.1.1.1 tried to reach back to your public IP the router has no NAT entry for this, and drops the connection.

Do let’s take the real possibility that you can’t setup two LAN interfaces on your home grade routers. What would you do? Instead could have a second wireless router with NAT enabled (which it is by default). Your second wireless router could broadcast a different SSID and it’s network ip subnet address should be different to your home network IP subnet address. So if your home is 192.168.0.0/24 your IOT could be 192.168.1.0/24. Your WAN interface should be setup static on an address that does not conflict with your DHCP scope. Or if it does, go to the dhcp server and reserve it. It should be an ip that doesn’t change and can’t accidentally be given to another device thereby giving you IP conflicts.

So then your IoT devices now will get that 192.168.1.2+ address and reach to your IOT router to get out of their network. Now this does allow them to talk to your home network devices on 192.168.0.0/24. But the downside is your home lan devices by default can not talk to your IOT devices. This is kind of the reverse of what you want from a security perspective. To configure your IOT you’ll need to join the IOT WIFI. Why is this? If you on your home network connected device on 192.168.0.1/24 try to go to the IOT network device on 192.168.1.0/24, then the home device first notes that the network is not local, so it will send the request to the configured gateway. Your home gateway has no idea where 192.168.1.0/24 is either. So it goes out to the 0.0.0.0/0 route which is to your ISPs router.

I’m sure you’ll think: if this is backwards why not flip my home network behind my second NAT router? And the answer is NAT isn’t free, and you’ll probably have heard CGNAT or carrier grade NAT making a mess of games and services. Double NAT has problems too.

So what about dhcp and dns? The simple answer is the IOT router becomes a dhcp server and offers your IOT pihole for DNS. Your home network shouldn’t need touching

There are ways to band-aid these two networks. If you know your home router has a proper route table you can modify that. remember you setup the IoT router with a static IP? Well here’s why. If you setup a route statement 192.168.1.0/24 via IP 192.168.0.251 (whatever IP is the IoT router) then now your home router can find and redirect traffic. This still occasionally has issues though and this routing statement can create a triangle route which would take a long time to explain, and secondly a fix for that can be more NAT more translation so we can return communication from the same way, but the branching possibilities are still not fully defined. Alternative fixes are on your local computer add a single routing statement to find 192.168.1.0/24 via 192.168.0.251 (or whatever IoT router ip you assigned).

Now my suggestion: get a router which handles two local networks. Then you’re topology is pretty much the simplest, easiest to troubleshoot later, avoid Nat.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • megavids
  • InstantRegret
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ethstaker
  • osvaldo12
  • modclub
  • normalnudes
  • provamag3
  • tester
  • anitta
  • Leos
  • lostlight
  • All magazines