A team of scientists is proposing a new explanation for some cases of long Covid, based on their findings that serotonin levels were lower in people with long Covid. They said that the biological pathway that their research outlines could unite many of the major theories of what causes long Covid: lingering remnants of the...
I’m personally motivated in a non-commercial way to supply everyone with as much cybersecurity as possible in the interests of civlization, especially now. I’ve just finished what I wanted to releae as “set” 2 days ago and it’s time to announce them....
[Image description: a collage of seven photos, showing a view of the increasing eclipse, totality, and decreasing eclipse through the lens of a telescope.]...
Australians have resoundingly rejected a proposal to recognise Aboriginal people in its constitution and establish a body to advise parliament on Indigenous issues....
Insomnia, an API development/debugging/testing tool, has been thoroughly enshittified. It now requires a cloud account to use, even though most of the use is just sending requests from your local machine (to servers often running on localhost too)....
I’m a week late on rent due, I only paid half, I had to call all my credit card companies and utilities to tell them what’s going on. And now my check engine light turned on because the bastard is misfiring. My wife lost her dad which fucked us both up due to missing a ton of work, and I don’t know what to do. I’m tired...
Dude, I don’t know if random internet advice can help you- but I feel for you man, and the dawn is better than the night. Hang in there, things will get better!
Since we’re talking specifically about network traffic, let’s clarify the scope of the problem for reference.
You want to see what is being sent outside, to the wide internet from your network, and how might you be compromised by this traffic.
The logical method would be to snoop on this information. The question is, how would you do that?
There are network analysis tools, including DPI, that might be able to help you in this journey. Suricata/Snort and Splunk are three such applications, although perhaps you’d also like to consider an application suite like Security Onion.
The second problem is, how do you get the outward facing traffic to analyse it? The easier way to do this is to utilise port-mirroring - mirror the traffic through your WAN-facing port into an analyser to check just what is it that you’re sending out. Note that this will likely require extensive effort and time since everyone has different traffic they would like to check, and coming up with robust checks is entering the field of security professionals.
As you know, most x86 computers have a backdoor installed in hardware. This is either the Intel ME or AMD PSP (if you know what this is and are worried about your privacy, I suggest looking at AMD’s OpenSIL initiative slated to release in 2027).
This is a problem since these backdoors utilise the same hardware NIC of your computer but act as a completely different system (different MAC, encrypted traffic using different keys, and a different style of traffic).
The problem manifests like so: one would reasonably expect to find the traffic from said processes in the traffic that one analyses, however, how would one find them (perhaps through logging their MAC address)? It is possible that Intel already uses dynamic MAC addresses, which makes it harder to find them - although, in theory, one should be able to script this.
Now that you’re enraged about such atrocious behaviour on your network, let me point you towards the fact that people who run mini PCs as routers with x86 processors in them (for OPNSense/PFSense) should also be running into this problem, theoretically. It is a bigger issue for them however, since in their case the network edge itself is reasonably compromised. How are you sure that the ME/PSP processor isn’t going to mask its traffic from the port-mirroring setup you have got running? How can one be sure of the capabilities of such proprietary systems and how they can mask their traffic?
I know people will come up with “but they don’t spy on you! It needs to be explicitly turned on to spy on you!” and “get a thinkpad bro, modify the HAP bit!”, however, both arguments don’t hold much weight considering the hardware readily available to the common user (bit of a fallacy, but we’ll go with it). The point stands; such behaviour shall not be tolerated in a self-aware user’s network, and needs to eradicated the second the user gets a whiff of such mischief playing out. I hope my note has ignited a willingness in you to prevent such rabid deanonymisation attempts to one’s self in this age, and will spur you to fortify your network to prevent such malice from breaking anonymity and trust on hardware.
The disability royal commission made 222 recommendations for change The commissioners were split on key areas like education, work and group homes The government has set up a taskforce, but gave no immediate response to the recommendations
Scientists Offer a New Explanation for Long Covid (www.nytimes.com)
A team of scientists is proposing a new explanation for some cases of long Covid, based on their findings that serotonin levels were lower in people with long Covid. They said that the biological pathway that their research outlines could unite many of the major theories of what causes long Covid: lingering remnants of the...
The number of the beast is 666 by William Blake (~1810) (lemmy.world)
FreeBSD, GhostBSD, OpenBSD, Dragonfly BSD, Firefox Hardening - FOSS - git clone (lemmy.world)
I’m personally motivated in a non-commercial way to supply everyone with as much cybersecurity as possible in the interests of civlization, especially now. I’ve just finished what I wanted to releae as “set” 2 days ago and it’s time to announce them....
more of the annular eclipse. (i.postimg.cc)
I impulse bought a cheap (sub-$100) telescope for viewing the eclipse, and caught this series to and from totality (lemmy.world)
[Image description: a collage of seven photos, showing a view of the increasing eclipse, totality, and decreasing eclipse through the lens of a telescope.]...
Australia rejects proposal to recognise Aboriginal people in constitution (www.theguardian.com)
Australians have resoundingly rejected a proposal to recognise Aboriginal people in its constitution and establish a body to advise parliament on Indigenous issues....
Colombia to spend $4.25 billion to buy land for poor farmers (www.reuters.com)
Blessed (lemmy.ninja)
Republicans pick Jim Jordan as nominee for House speaker, putting job within the Trump ally's reach (apnews.com)
18+ The Apotheosis of Hercules - François Lemoyne (lemmy.world)
Felsküste im Mondschein - Johann Nepomuk Schödlberger (lemmy.world)
The complete guide to building your personal self hosted server for streaming and ad-blocking powered by Plex, Jellyfin, Adguard Home and Docker. (lemmy.dbzer0.com)
cross-posted from: lemmy.dbzer0.com/post/5911320...
Insomnia shittified. Insomnium is the fork (github.com)
Insomnia, an API development/debugging/testing tool, has been thoroughly enshittified. It now requires a cloud account to use, even though most of the use is just sending requests from your local machine (to servers often running on localhost too)....
People who have been through tough timew, how did you keep moving?
I’m a week late on rent due, I only paid half, I had to call all my credit card companies and utilities to tell them what’s going on. And now my check engine light turned on because the bastard is misfiring. My wife lost her dad which fucked us both up due to missing a ton of work, and I don’t know what to do. I’m tired...
How can I spy on myself?
I'm curious to see what information I'm blasting out to the various services I depend on for internet (ISP, DNS, probably Cloudflare, etc.)....
From little things, big things grow (lemmy.ml)
Bronze water pitcher in the shape of a griffon, Germany, 1120-1130 AD (lemmy.world)
Masterfully made miniature sculptures from Gonur Tepe, Turkmenistan, late 3rd millennium BCE-mid 2nd millennium BCE (lemmy.world)
Flowers Are Spreading in Antarctica as Summer Temperatures Soar (www.sciencealert.com)
deleted_by_moderator
German Celestial globe, 1584 AD (lemmy.world)
Disability royal commission hands down final report with 222 recommendations for change (www.abc.net.au)
The disability royal commission made 222 recommendations for change The commissioners were split on key areas like education, work and group homes The government has set up a taskforce, but gave no immediate response to the recommendations
Moon in Clouds (lemmy.world)
Taken on a Nikon Z8 with Sigma 150-600. 600mm f8 1/160 ISO 12,800. Noise removed with lightroom and 2 exposures composited with photoshop.