2023-11-24 07:56 from Nurb432
TOR Question: Do the official entry points change every so often?
Reason i ask is i dont get on often, but did this morning just to get
updates ( using the bundled Firefox thingie, not a service or
anything, and all default settings ) and it refused to connect.
Everything was timing out affording to the log. Wondering if my ISP
was doing something, tried the snowflake bridge, again, timeout.
Tried another bridge set ( obfs ) and it did connect, then updated..
Now it works without bridges.
I would have thought that as long as the project itself was alive,
the main entry points would be stable?
Typically, your client should pick a guard node (entry point) and use it for an extended period of time (say, 3 months).
If you take long between Tor sessions, it can be that yout Tor instance has outdated circuitry information and is trying to figure out the current state of the network.
Normally i do it once a month, but could have easily forgot this summer. So might have hit that 3 month zone. I just assumed that ( much like DHT ) there were a few well known entry nodes that everyone hits first, it and then collect more for next time once 'in'.
Ill have to just be more diligent on doing monthly updates.
Fri Nov 24 2023 08:59:40 EST from darknetuserTypically, your client should pick a guard node (entry point) and use it for an extended period of time (say, 3 months).
If you take long between Tor sessions, it can be that yout Tor instance has outdated circuitry information and is trying to figure out the current state of the network.
I assume that NGINX native could, but im using an 'easy manage' version, unsure if it will do it, but i will look tonight.. But that said, having the little extra in between, makes me feel a little safer. Its just frustrating i have extra hoops to jump thru due to ass-hats. NGINX is taking care of the name routing for me, not just the SSL.
These days, Traefik is the favorite for that sort of thing ... it plays especially nice with containers. MetalLB is also a favorite; I've used it often because it can be automatically installed as part of MicroK8S (which I use heavily).
Do you have any actual web sites on your NginX or are you only using it as a reverse proxy?
The machine that runs www.citadel.org is running NginX. Originally it was just virtualhosting a bunch of its own sites, but now it's also running as a reverse proxy for a few things in containers.
All the sites i have published go thru it. Both for SSL and for incoming name resolution. I only have one IP here at home. All are separate VMs using its reverse proxy / port forward stuff. ( not sure how you would run a site ON nginx i thought it was only pass-thru ) Right now, all have front end passwords via nginx to get past first, THEN the app password. ( paranoia .. )
- AI chat
- AI images
- Nextcloud ( frustrated discussions earlier about that.. issues with DoS floods )
- Guacacmole
- The Village was, and if i get around to putting it back up, it will be again. Normally dont have the 2nd password layer on this.
- OpenSim ( using DivaGrid to give it a web interface ) no 2nd layer auth here either.
- JellyFin
- My service desk was, when i was still doing consulting. its gone now. i dont see that coming back.
- Fossil ( tho normally this server is off, dont need it often. but i keep the SSL cert up to date )
- And of course anything im testing with..
Tue Jan 02 2024 22:20:18 EST from IGnatius T FoobarDo you have any actual web sites on your NginX or are you only using it as a reverse proxy?
sorry its YT but this is an interesting, and not theoretical but real, discussion about AI worms being propagated via AI reading your mail, then getting false commands ( in effect ) to leak your data, and propagate to your friends. All via zero-click actions. ( at least zero click to you.. the AI did the 'click', in effect )
https://www.youtube.com/watch?v=4NZc0rH9gco
2024-03-13 09:19 from Nurb432
sorry its YT but this is an interesting, and not theoretical but
real, discussion about AI worms being propagated via AI reading your
mail, then getting false commands ( in effect ) to leak your data,
and propagate to your friends. All via zero-click actions. ( at
least zero click to you.. the AI did the 'click', in effect )
https://www.youtube.com/watch?v=4NZc0rH9gco
I will check it later.
BTW, when I share a YT link, I do it as an invidious link so YT does not profit. Eternal war to google!
sorry its YT but this is an interesting, and not theoretical but
real, discussion about AI worms being propagated via AI reading your
mail, then getting false commands ( in effect ) to leak your data,
Cool, so the "we have video of you watching pr0n and we're going to send it to all your contacts" spam/scam can now be followed through without any action on the victim's part.