groet

@groet@feddit.de

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Wondering if using ProtonVPN in a VPN chain is an issue.

Pretty much what the title says. I have a subscription to Proton as well as Mullvad. I’ve ordered a router and I plan on running Proton on the router and Mullvad on the device I’m using, or vice versa. I would just like to know with absolute certainty that doing this won’t somehow put my Proton account at risk, before I...

groet,

What do you gain by doing this? I trust both proton and mullvad to not fuck up their encryption so attackers can’t read your traffic even through one VPN. The second one doesn’t offer additional security here.

In your setup, proton will only know you use mullvad but not know which sites you visit in the end. Mullvad knows everything just the same as without proton. So the outer VPN doesnt add privacy either.

If you are suspected of a crime, forcing mullvad to disclose your identity/IP is enough and proton doesn’t help.

If you are worried about traffic correlation analysis, then yes 2 VPNs will help. But honestly for normal usage I don’t see the point of 2 VPNs.

And about the DoS fear. Just do it the other way round? Mullvad on the router, proton on the device? From protons perspective you produce the same amount of traffic, it just comes from a mullvad server. The outer VPN is the one where you have increased traffic due to 2 VPNs. But I am pretty sure neither will be a problem and tunneling a VPN through a VPN is not a TOS violation

groet,

You DONT want to turn it off. Digital forensics work WAAAAAAY better if you have a memory dump of the system. And all the memory is lost if you turn it off. Even if the virus ran 10h ago and the program has long stoped running, there will most likely still be traces in the RAM. Like a hard drive, simply deleting something in RAM doesn’t mean it is gone. As long as that specific area was not written over later it will still hold the same contenta. You can sometimes find memory that belonged to a virus days or even weeks after the infection if the system was never shut down. There is so much information in ram that is lost when the power is turned off.

You want to 1: quarantine from network (don’t pull the cable at the system, but firewall it at the switch if possible) 2: take a full copy of the RAM 2.5: read out bitlocker keys if the drive is encrypted. 3: turn off and take a bitwise copy of the hard drive or just send the drive + memory dump to the forensics team. 4: get coffee

How old is the oldest building in the town you live in?

To those from the Western hemisphere, it’s always fascinating to hear that some homes and businesses from the times of the Greek philosophers still have inhabitants, and then you remember that the Western hemisphere is itself not without its own examples, for example some Mexican villages still have temples from the times of...

groet,

The western hemisphere isn’t just the Americas. It includes half of europe…

There are quite a few people in the western hemisphere that don’t even bat an eye when they walk past a 1000 year old building on their way to work every day.

For me the oldest building is just a random house from the 13 century.

groet,

No. It’s not a magic invisibility field inside. It’s a magic object that works only on living “intelligent” creatures. It also doesn’t work the same on different races. Only humans (hobbits are a subtype of human in Tolkiens lore) turn invisible. And because it’s magic it also turns their clothing etc invisible. So either Frodo and his poop is invisible or nothing is.

Why Your VPN May Not Be As Secure As It Claims (krebsonsecurity.com)

Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target’s traffic off of the protection...

groet, (edited )

I have set it up in a way where all the packets have to go through their VPN and if they don’t, they get dropped before they leave my PC.

That is the function of a firewall and not of the VPN. As I understand portmaster it does both. But that is not normal VPN behavior.

VPNs are not magic. They are a piece of software that encrypt traffic and send it to a special server. They do that by creating a virtual Internet connection (think like pluging in an additional Ethernet cable or connection to an addition WiFi at the same time). Everything that is sent through the virtual connection is encrypted. Your system now has (at least) two valid Internet connections (one real and one virtual). For every packet it sends it needs to decide which connection it should send it from. This is decided by something called the routing table. When you start the VPN it will put two routes into the table.

  • traffic going to the VPN server goes through the real connection (so the encrypted VPN traffic is routed correctly)
  • everything else goes through the virtual connection (the VPN tunnel where it gets encrypted)

The attack described is a way how a network router can add a new route into your devices routing table to basically override the second route from the VPN. The route is still there, there just is another one that has a higher priority.

A VPN is not the ultimate authority over your network traffic. It is just another program sending and recieving taffic.

groet,

There is a famous experiment , where a person gets 100$, and have to offer an arbitrary percentage of that to a stranger. If the stranger declines, both get nothing.

From the strangers perspective, getting offered even 1$ is a win, but the vast majority rejected anything below 30%

groet,

By design nothing in the chain can be altered. But of course you could have a block indicating “person X is now person Y”. But you can always read that Y was at some point X (and at what point the change happened). That would not be good, as it would be a public ledger of all trans people. It would also make things like witness protection impossible because inserting a block “today in 2024, person W was born in 1974” is very suspicious

groet,

Yeah the bird is on a flat roof maybe a garage or something similar on the same height or slightly below the window

If we took material like rock from space and got it back to Earth enough times, would Earth grow as a planet?

As the title says. I’m actually thinking about this hard with my friends because everything that’s produced on Earth stays on Earth so it doesn’t change size, but what if it’s not from Earth but it stays on Earth?...

groet, (edited )

> energy equals mass

That doesn’t mean energy has a weight.

It means it is physically possible to transition energy to mass and vice versa. Sunlight hitting the earth does not add any weight.

Edit: turns out that part was wrong

Also, earth radiates heat out to space. At a rate of (aaaaaaaaalmost, because of the greenhouse effect) 100% of the energy we get from the sun. If it didn’t, earth would be a few million degrees hot by now…

What're some of the dumbest things you've done to yourself in Linux?

I’m working on a some materials for a class wherein I’ll be teaching some young, wide-eyed Windows nerds about Linux and we’re including a section we’re calling “foot guns”. Basically it’s ways you might shoot yourself in the foot while meddling with your newfound Linux powers....

groet,

Can’t remember exactly what happened but it involved changing permissions on /bin /sbin and similar. You know for security …

In the end I didn’t have permissions to run chmod, su or sudo

Fortunately there is little that can’t be fixed by booting from a live image.

groet,

pizza

microwave

I don’t think the mushrooms are the problem in that situation

groet,

A “meat-based” patty isn’t 100% meat either. There might me onions, flour, egg, salt, spices, etc. “plant-based” is a term that just tells you “most of it is noch meat” and so you have to check the ingredients making it a pretty useless term.

Also fuck everybody who makes a meat-alternative-food that isn’t vegan because they added 1% of some shit…

groet,

Most VPNs use UDP. So set up a wireguard, tailscale or openvpn.

But you still need to “open up the firewall”. UDP still works on ports the same way as TCP. I do agree however, that exposing a VPN port is more secure than exposing a port for a game server, as you don’t know about the security of that server software.

groet,

If you want any system to connect to you, you need to open a port. You don’t need to do that for outgoing connections (the OS and your router will automatically open ports for the return connection). So if everybody connects to one central system, nobody needs to (explicitly) open any ports (except for the central connection point)

groet,

Exactly. Bilbo had the ring for 50+ years and he never used it to get more money fame or power. Because neither interested him. He used it in the end to disappear because he wanted his peace and solitude.

groet,

Which makes breaking up with him a good thing… Dating him is probably a very high paying job even if it is a shit job.

(I know literally nothing about the women or her relationship to musk)

groet,

Wait so without the option it checks against the system trust store and with the option it does exactly the same (but may also includes an additional CA if that was passed as the argument)?

This should be a cve. There is a security feature. It does not work as documented. That’s a vulnerability. That should get a cve.

Wtf apple

groet,

Or it was not really news worthy and got inflated by the media untill it was.

Why did distro name carry over into label name of my ssd?

I am a distro-hopper, have yet to find my thing. I’ve recently been trying out NixOS, but decided to give something else a try, so after a lot of digging i landed on this KDE spin, which is based of the Bluefin Project. However, after having installed it via your typical installation of ISO Writer -> USB -> Install. I saw,...

groet,

A drive label is just a string that can be set by any privileged process. Seems like this installation of the new distro didn’t do that. Or you skipped a step in the install where you could have chosen the drive label.

If it is a bug in the installer or if you missed it, I can’t tell.

But you can just change it in gparted or something else.

groet,

Can you verify the software running on an instance is the same as the one in the source code repository? You can’t. Can you verify the instance isn’t running code to read passwords from your login requests even if the code is the original open source code? You can’t.

That’s why (and for other reasons) you should never use a password for more than one site/service/instance.

Lemmy admins (admins in the Lemmy application) probably can’t read your password. But everyone with admin rights on the server operating system can.

groet,

Absolutely. But MS chose to go the evil route again and ask right when you want to open a link. In that situation users want to open a link and not choose browsers so they are more likely to click on edge. It is deliberately annoying which is what op is angry about

groet,

Corporations are doing a bad job at it as well. While Gouvernement standards tend to be slow and stagnant, the free market produces an incomprehensible sea of standards. Like with USB, HDMI, 3/4G signals, cat-X Internet cables. If a single global manufacturer decides to do things slightly different you get a new version of a standard that everybody has to be compatible with.

groet,

Well maybe it’s multiple choice.

  • “Dong, beard broad shoulders”
  • “Tits, hips, smaller waist”
  • “Character deleted on death”

Choose any combination you want

groet,

In the spirit of the meme this does not constitute “finding” the radius. There doesn’t exist a radius for which both the radius and the circumference are rational numbers.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • kavyap
  • DreamBathrooms
  • tester
  • magazineikmin
  • InstantRegret
  • mdbf
  • Youngstown
  • Durango
  • rosin
  • slotface
  • thenastyranch
  • everett
  • cubers
  • JUstTest
  • khanakhh
  • GTA5RPClips
  • Leos
  • tacticalgear
  • ethstaker
  • ngwrru68w68
  • osvaldo12
  • cisconetworking
  • provamag3
  • megavids
  • normalnudes
  • modclub
  • lostlight
  • All magazines