<?xml version="1.0"?><rss version="2.0"><channel><title>Security</title><link>http://uncensored.citadel.org/</link><image><title>Security</title><url>http://uncensored.citadel.org/roompic?room=Security</url><link>http://uncensored.citadel.org/</link></image>
<description>Security</description>
<item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099522102</link><pubDate>Tue, 27 May 2025 19:59:29 -0000</pubDate><title>Message #2099522102</title><guid isPermaLink="false">2099522102@Uncensored</guid><description><![CDATA[<html><body>

<p>Not sure where i originally posted about my speed issues with TOR.</p>
<p>Seems i was connecting via a bridge.. no wonder it was slow.  Donno how that happened. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099500799</link><pubDate>Wed, 11 Dec 2024 04:28:23 -0000</pubDate><title>authenticator keys</title><guid isPermaLink="false">2099500799@Uncensored</guid><description><![CDATA[ >Anyone dealt with these things?   
  
 Yeah, and frankly I'd rather have one than what I've got now, which is a
stupid app on my mobile. 
  
 Especially since the company just decided to stop paying most of us a stipend
for our mobile bills. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099493470</link><pubDate>Thu, 17 Oct 2024 12:17:33 -0000</pubDate><title>Message #2099493470</title><guid isPermaLink="false">2099493470@Uncensored</guid><description><![CDATA[<html><body>

<p>Ouch.</p>
<p> </p>
<h1 style="font-size: var(--font-up-4); margin: 0px; font-family: Arial, sans-serif; width: 979.703px; line-height: var(--line-height-medium); overflow-wrap: break-word; color: #222222;" data-topic-id="30119"><a class="fancy-title" style="background-color: rgba(0, 0, 0, 0); text-decoration-line: none; cursor: pointer;" href="https://discuss.kubernetes.io/t/security-advisory-cve-2024-9486-and-cve-2024-9594-vm-images-built-with-kubernetes-image-builder-use-default-credentials/30119"><span dir="auto">CVE-2024-9486 and CVE-2024-9594: VM images built with Kubernetes Image Builder use default credentials</span></a></h1>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099492449</link><pubDate>Tue, 08 Oct 2024 21:51:34 -0000</pubDate><title>Message #2099492449</title><guid isPermaLink="false">2099492449@Uncensored</guid><description><![CDATA[<html><body>

<p>American water 'security breach' yesterday.  Said no "utility systems" effected but took stuff off line. </p>
<p> </p>
<p>With luck they didnt steal all the stuff from us who have auto debit..  Tho my bank watches for that stuff, and you get a refund, its still a hassle. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099490579</link><pubDate>Wed, 25 Sep 2024 15:16:48 -0000</pubDate><title>Message #2099490579</title><guid isPermaLink="false">2099490579@Uncensored</guid><description><![CDATA[<html><body>

<p>"yes, we use SSO"  "You will have to sign up separately for each of our applications and add them into your phone's authentication app"</p>
<p> </p>
<p>Then how the F is it SSO then?? Might be MFA, but not SSO.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099483437</link><pubDate>Sun, 04 Aug 2024 22:17:34 -0000</pubDate><title>Message #2099483437</title><guid isPermaLink="false">2099483437@Uncensored</guid><description><![CDATA[<html><body>

<p>This could fall in a lot of rooms. but after some talking it turns out its due to a security concern. so here it goes..</p>
<p>Been talking to a guy at work, hes trying to share a usb device between multiple VM guests. ( KVM/QEMU ).  Putting aside the issue of sharing a single device between machine and the natural issues you might get, i suggested he just allocate the device to all the VMs and then only access it one at a time, and even tho no guarantee it would not totally freak out.</p>
<p>I guess his end goal is actually to attach the device to one VM, and share it from there, not from the server. Hes leaning to IP sharing ( which i have seen used between physical servers, but never touched ) Asking why, 'security concerns', about pieces of the underlying GPU management stuff being in user-land. Personally, i don't think its THAT huge of a risk and not sure how that would actually help, but to him it is, so that is where we are starting from.</p>
<p>Since im now in way over my head, thought id see if any of you all might have an idea for him.</p>
<p> </p>
<p>The last bit of discussion went like this ( now that you have some context ):</p>
<p>____</p>
<p><strong><em>Mostly security reasons. VirtIO is not inherently unsafe, but there are discussions online about security boundaries in derivative software. Prime example of that is userspace "slicing" of GPUs - also known as VirGL (Proxmox exposes the option of VirGL integration in its menus when creating a VM).</em></strong></p>
<p><strong><em>The problem is that VirGL runs in userland and its developers have confirmed that it does not include security boundaries by default, and already assumes that other software has mitigations in place to protect it from theoretical privilege escalation attacks.</em></strong></p>
<p><strong><em>The safest solution in this case is to isolate it in a VM which is disconnected from the rest of OpenSwitch (or any other KVM-compatible networking interface) and then strictly use internal RPC mechanisms (for QEMU that's QEMUGuestAgent) to "pass-through" VFIO-like slices of the integrated GPU from the isolated Guest to other VMs.</em></strong></p>
<p><strong><em>There is on-going work to port virt-host-user to QEMU to get such functionality working, but it's alpha and seems to be somewhat hacky at the moment. Unfortunately, outside of enterprise RDMA-esque networks, there's almost no support for VFIO devices other than networking gear to be shared over IP/RPC.</em></strong></p>
<p><strong><em>_______</em></strong></p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099480278</link><pubDate>Mon, 15 Jul 2024 11:38:48 -0000</pubDate><title>Message #2099480278</title><guid isPermaLink="false">2099480278@Uncensored</guid><description><![CDATA[<html><body>

<p>that is encouraging.  Here *everyone* will get them. Some 40k employees.</p>
<p> </p>
<p>The VDI part, not sure if that will be required, but if not, its a way around the rules.  So im willing to bet they will, somehow.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099480273</link><pubDate>Mon, 15 Jul 2024 11:19:26 -0000</pubDate><title>Message #2099480273</title><guid isPermaLink="false">2099480273@Uncensored</guid><description><![CDATA[ >On top of passwords, MFA, they are now going to issue USB pass-key     

 >devices, i guess keyed to your personnel ID.  ( tho i had those old   
  
 >key generator cards to the joke, its the same concept really just no   
  
 >typing)       
 >      
 >Anyone dealt with these things?       
      
 Top tier personal here (myself included) gets one.      
 The ones we have are encased in cheap cases but so far none has broken in
years. This is good because backing credentials up and restoring them is a
bitch with these things - in practice you generate new credentials for the
user.   
  
 So far the ones we have are Linux, FreeBSD and OpenBSD compatible. USB-passthrough
would do the trick. I don't know about remote desktops. Some of these things
need to issue low level instructions. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099479960</link><pubDate>Fri, 12 Jul 2024 12:55:22 -0000</pubDate><title>Message #2099479960</title><guid isPermaLink="false">2099479960@Uncensored</guid><description><![CDATA[<html><body>

<p>What started as a joke at the office, found out i was actually foretelling the future.</p>
<p>On top of passwords, MFA, they are now going to issue USB pass-key devices, i guess keyed to your personnel ID.  ( tho i had those old key generator cards to the joke, its the same concept really just no typing)</p>
<p>Anyone dealt with these things?</p>
<p>If so..</p>
<ul>
<li>How rugged are they? Are we going to end up with lots of things breaking and people being screwed, having to drive in to get a replacement or something all the time? ( some cant.. they are across the country or even out of the country )</li>
<li>I assume they work with windows and OSX just fine, but what about VDI from Linux or ChromeOS or web? ( unsure if VDI wil require it.. just random thoughts )</li>
<li>What about local VMs, ( KVM in my case ) think just doing a USB pass-thru would be enough or will it detect ts not a 'real' port and freak out?</li>
</ul>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099464664</link><pubDate>Wed, 17 Apr 2024 13:08:10 -0000</pubDate><title>Message #2099464664</title><guid isPermaLink="false">2099464664@Uncensored</guid><description><![CDATA[ >sorry its YT but this is an interesting, and not theoretical but  
 >real, discussion about AI worms being propagated via AI reading your  
 >mail, then getting false commands ( in effect ) to leak your data,  
  
 Cool, so the "we have video of you watching pr0n and we're going to send
it to all your contacts" spam/scam can now be followed through without any
action on the victim's part. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099377337</link><pubDate>Wed, 13 Mar 2024 23:02:46 -0000</pubDate><title>Message #2099377337</title><guid isPermaLink="false">2099377337@Uncensored</guid><description><![CDATA[ > 2024-03-13 09:19 from Nurb432     
 >sorry its YT but this is an interesting, and not theoretical but    
 >real, discussion about AI worms being propagated via AI reading your   

 >mail, then getting false commands ( in effect ) to leak your data,    
 >and propagate to your friends.  All via zero-click actions.   ( at  
 
 >least zero click to you.. the AI did the 'click', in effect )     
 >    
 >      
 >    
 >https://www.youtube.com/watch?v=4NZc0rH9gco    
 >    
    
 I will check it later.   
  
 BTW, when I share a YT link, I do it as an invidious link so YT does not
profit. Eternal war to google! 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099377286</link><pubDate>Wed, 13 Mar 2024 13:19:45 -0000</pubDate><title>Message #2099377286</title><guid isPermaLink="false">2099377286@Uncensored</guid><description><![CDATA[<html><body>

<p>sorry its YT but this is an interesting, and not theoretical but real, discussion about AI worms being propagated via AI reading your mail, then getting false commands ( in effect ) to leak your data, and propagate to your friends.  All via zero-click actions.   ( at least zero click to you.. the AI did the 'click', in effect )</p>
<p> </p>
<p>https://www.youtube.com/watch?v=4NZc0rH9gco</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099372335</link><pubDate>Wed, 03 Jan 2024 12:51:56 -0000</pubDate><title>Message #2099372335</title><guid isPermaLink="false">2099372335@Uncensored</guid><description><![CDATA[<html><body>

<p>All the sites i have published go thru it. Both for SSL and for incoming name resolution. I only have one IP here at home.  All are separate VMs using its reverse proxy / port forward stuff.  ( not sure how you would run a site ON nginx i thought it was only pass-thru ) Right now, all have front end passwords via nginx to get past first, THEN the app password. ( paranoia .. )</p>
<ul>
<li>AI chat </li>
<li>AI images </li>
<li>Nextcloud ( frustrated discussions earlier about that.. issues with DoS floods )</li>
<li>Guacacmole </li>
<li>The Village was, and if i get around to putting it back up, it will be again. Normally dont have the 2nd password layer on this.</li>
<li>OpenSim ( using DivaGrid to give it a web interface ) no 2nd layer auth here either.</li>
<li>JellyFin</li>
<li>My service desk was, when i was still doing consulting. its gone now. i dont see that coming back.</li>
<li>Fossil ( tho normally this server is off, dont need it often. but i keep the SSL cert up to date )</li>
<li>And of course anything im testing with.. </li>
</ul>
<div>It does NOT sit in front of my incoming VPN server however.That is a direct port map. I tried to go thru it and things didnt work. Might have been me, but didnt 'need' it anyway. </div>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Jan 02 2024 22:20:18 EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a></span></div>
<div class="message_header"><span style="background-color: transparent; font-size: 12px;"><br /></span></div>
<div class="message_header"><span style="background-color: transparent; font-size: 12px;"><br /></span></div>
<div class="message_header"><span style="background-color: transparent; font-size: 12px;">Do you have any actual web sites on your NginX or are you only using it as a reverse proxy?</span></div>
<div class="message_content"> </div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099372320</link><pubDate>Wed, 03 Jan 2024 03:20:18 -0000</pubDate><title>Message #2099372320</title><guid isPermaLink="false">2099372320@Uncensored</guid><description><![CDATA[<html><body>

<blockquote>
<div class="message_content">
<p>I assume that NGINX native could, but im using an 'easy manage' version, unsure if it will do it, but i will look tonight..   But that said, having the little extra in between, makes me feel a little safer.  Its just frustrating i have extra hoops to  jump thru due to ass-hats.  NGINX is taking care of the name routing for me, not just the SSL.</p>
</div>
</blockquote>
<p>These days, <a href="https://traefik.io/traefik/">Traefik</a> is the favorite for that sort of thing ... it plays especially nice with containers.  <a href="https://metallb.universe.tf/">MetalLB</a> is also a favorite; I've used it often because it can be automatically installed as part of MicroK8S (which I use heavily).</p>
<p>Do you have any actual web sites on your NginX or are you only using it as a reverse proxy?</p>
<p>The machine that runs <a href="https://www.citadel.org/">www.citadel.org</a> is running NginX.  Originally it was just virtualhosting a bunch of its own sites, but now it's also running as a reverse proxy for a few things in containers.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369663</link><pubDate>Fri, 24 Nov 2023 14:07:37 -0000</pubDate><title>Message #2099369663</title><guid isPermaLink="false">2099369663@Uncensored</guid><description><![CDATA[<html><body>

<p>Normally i do it once a month, but could have easily forgot this summer. So might have hit that 3 month zone.  I just assumed that ( much like DHT ) there were a few well known entry nodes that everyone hits first, it and then collect more for next time once 'in'. </p>
<p> </p>
<p>Ill have to just be more diligent on doing monthly updates. </p>
<blockquote>
<div class="message_header"><span>Fri Nov 24 2023 08:59:40 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Typically, your client should pick a guard node (entry point) and use it for an extended period of time (say, 3 months). <br /><br />If you take long between Tor sessions, it can be that yout Tor instance has outdated circuitry information and is trying to figure out the current state of the network. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369662</link><pubDate>Fri, 24 Nov 2023 13:59:40 -0000</pubDate><title>Message #2099369662</title><guid isPermaLink="false">2099369662@Uncensored</guid><description><![CDATA[ > 2023-11-24 07:56 from Nurb432     
 >TOR Question:  Do the official entry points change every so often?   
 
 >    
 >    
 >      
 >    
 >Reason i ask is i dont get on often, but did this morning just to get  
 
 >updates ( using the bundled Firefox thingie, not a service or    
 >anything, and all default settings ) and it refused to connect.     
 >Everything was timing out affording to the log.  Wondering if my ISP  
 
 >was doing something, tried the snowflake bridge, again, timeout.     
 >Tried another bridge set ( obfs ) and it did connect, then updated..   
 
 >    
 >Now it works without bridges.     
 >    
 >I would have thought that as long as the project itself was alive,    
 >the main entry points would be stable?    
 >    
    
 Typically, your client should pick a guard node (entry point) and use it
for an extended period of time (say, 3 months).   
  
 If you
take long between Tor sessions, it can be that yout Tor instance has outdated
circuitry information and is trying to figure out the current state of the
network. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369657</link><pubDate>Fri, 24 Nov 2023 12:56:07 -0000</pubDate><title>Message #2099369657</title><guid isPermaLink="false">2099369657@Uncensored</guid><description><![CDATA[<html><body>

<p>TOR Question:  Do the official entry points change every so often? </p>
<p> </p>
<p>Reason i ask is i dont get on often, but did this morning just to get updates ( using the bundled Firefox thingie, not a service or anything, and all default settings ) and it refused to connect.  Everything was timing out affording to the log.  Wondering if my ISP was doing something, tried the snowflake bridge, again, timeout.  Tried another bridge set ( obfs ) and it did connect, then updated..</p>
<p>Now it works without bridges.</p>
<p>I would have thought that as long as the project itself was alive, the main entry points would be stable?</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369639</link><pubDate>Fri, 24 Nov 2023 00:46:38 -0000</pubDate><title>Message #2099369639</title><guid isPermaLink="false">2099369639@Uncensored</guid><description><![CDATA[<html><body>

<p>my place = my work place, not my house. Lost a rather important word there. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369636</link><pubDate>Fri, 24 Nov 2023 00:23:19 -0000</pubDate><title>Message #2099369636</title><guid isPermaLink="false">2099369636@Uncensored</guid><description><![CDATA[<html><body>

<p>Ok, ill skip F2B then.  I did have it running back when all i did was SSH in.  it was effective then, but i do realize that was a pretty simple use case too. If i end up going 100% vpn, i might look back and see if it has a plugin for that but wont spend much time.  VPN will work, just didnt want to go there and lose a few 'nice' things.</p>
<p>And for what its worth at my place, front end security is someone elses problem :)   And i believe they mandate capcha. We also block non regional IP addresses ( not perfect i know, but gets rid of a lot of the bots ).  But, the system i support, while is available on internet, is for our in-house network accounts only, mandated SSO/MFA so i dont have to f- with the outside world issues other than DoS, and again, not my team's problem. </p>
<blockquote>
<div class="message_header"><span>Thu Nov 23 2023 18:48:45 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />If you think Internet sucks, wait until you need to deploy some crappy lame ecommerce app your boss tells you to, and then watch bots rape the live chat systems, the email contact forms and the registration forms. It is brutal. A trial run for one of these here with a basic captcha managed to get 200 bots register fake customers in 10 minutes or so. <br /><br />Fail2ban has modules developed for use without reverse proxies, for the most part. Some applications have modules that support reverse proxies, but honestly, fail2ban is gonna need a lot of work in order to get adapted the proper way. <br /><br /><br />I have seen people use fail2ban by having the computer that is running fail2ban check the logs (served over NFS or syslog) and then ssh into the firewall to update the blacklists. No need to say this is serviceable but sucks cocks. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369627</link><pubDate>Thu, 23 Nov 2023 23:48:45 -0000</pubDate><title>Message #2099369627</title><guid isPermaLink="false">2099369627@Uncensored</guid><description><![CDATA[ > 2023-11-23 12:54 from Nurb432       
 >I assume that NGINX native could, but im using an 'easy manage'      
 >version, unsure if it will do it, but i will look tonight..   But    
 
 >that said, having the little extra in between, makes me feel a little  
   
 >safer.  Its just frustrating i have extra hoops to  jump thru due    
 
 >to ass-hats.  NGINX is taking care of the name routing for me, not    
 
 >just the SSL.       
 >      
 >If i stick with web only, the double hop keeps me safe. and lets me    
 
 >continue to use things.  I am going to look into adding fail2ban or   
  
 >something to it however. Wont solve the problem but woudl help with   
  
 >the load the flood imposes.       
 >      
 >        
 >      
 >Of course going 100% vpn fixes it too. But back to the 'extra      
 >hoop'.  And i lose the ability to publish to 'friends'. ( like      
 >pictures,
chat )       
 >      
      
 If you think Internet sucks, wait until you need to deploy some crappy lame
ecommerce app your boss tells you to, and then watch bots rape the live chat
systems, the email contact forms and the registration forms. It is brutal.
A trial run for one of these here with a basic captcha managed to get 200
bots register fake customers in 10 minutes or so.     
    
 Fail2ban has modules developed for use without reverse proxies, for the most
part. Some applications have modules that support reverse proxies, but honestly,
fail2ban is gonna need a lot of work in order to get adapted the proper way.
  
  
 I have seen people use fail2ban by having the computer that is running fail2ban
check the logs (served over NFS or syslog) and then ssh into the firewall
to update the blacklists. No need to say this is serviceable but sucks cocks.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369597</link><pubDate>Thu, 23 Nov 2023 17:54:42 -0000</pubDate><title>Message #2099369597</title><guid isPermaLink="false">2099369597@Uncensored</guid><description><![CDATA[<html><body>

<p>I assume that NGINX native could, but im using an 'easy manage' version, unsure if it will do it, but i will look tonight..   But that said, having the little extra in between, makes me feel a little safer.  Its just frustrating i have extra hoops to  jump thru due to ass-hats.  NGINX is taking care of the name routing for me, not just the SSL.</p>
<p>If i stick with web only, the double hop keeps me safe. and lets me continue to use things.  I am going to look into adding fail2ban or something to it however. Wont solve the problem but woudl help with the load the flood imposes.</p>
<p> </p>
<p>Of course going 100% vpn fixes it too. But back to the 'extra hoop'.  And i lose the ability to publish to 'friends'. ( like pictures, chat )</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Thu Nov 23 2023 12:17:56 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Maybe consider switching to a reverse proxy that can work transparently? <br /><br /><br />I am using a bunch of relayds as TLS accelerators. They serve as TLS endpoints. They take care of TLS certificates and renewals and also add HTTP headers to the connections that hit the app servers so the apps know they are behind a reverse proxy. <br /><br />Since the apps know they are behind a reverse proxy and are given the IP address of the actual client that is initiating the connection beyond relayd, they can dentify abusers by IP. If that makes any sense to you. <br /><br />Ah, and since the setup is transparent to the client then there is no breakage with non-web apps. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369592</link><pubDate>Thu, 23 Nov 2023 17:17:56 -0000</pubDate><title>Message #2099369592</title><guid isPermaLink="false">2099369592@Uncensored</guid><description><![CDATA[ > 2023-11-23 12:10 from Nurb432         
 >nginx is acting like a firewall, since i put logins on it ( but that   
    
 >of course kills native apps.. they cant do the double hop ).  But     
  
 >not yet looked into if i can do block lists on its own.  But the      
 
 >problem is that these IPs hitting me rotate, every 10th or so it       

 >changes, so my NC instance still gets hit too many times by the        
 >proxy, even if they were to get auto blocked at the proxy.         
 >        
        
 Maybe consider switching to a reverse proxy that can work transparently?
      
      
 I am using a bunch of relayds as TLS accelerators. They serve as TLS endpoints.
They take care of TLS certificates and renewals and also add HTTP headers
to the connections that hit the app servers so the apps know they are behind
a reverse proxy.     
    
 Since the apps know they are behind a reverse
proxy and are given the IP address of the actual client that is initiating
the connection beyond relayd, they can dentify abusers by IP. If that makes
any sense to you.   
  
 Ah, and since the setup is transparent to the client then there is no breakage
with non-web apps. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369590</link><pubDate>Thu, 23 Nov 2023 17:10:56 -0000</pubDate><title>Message #2099369590</title><guid isPermaLink="false">2099369590@Uncensored</guid><description><![CDATA[<html><body>

<p>nginx is acting like a firewall, since i put logins on it ( but that of course kills native apps.. they cant do the double hop ).  But not yet looked into if i can do block lists on its own.  But the problem is that these IPs hitting me rotate, every 10th or so it changes, so my NC instance still gets hit too many times by the proxy, even if they were to get auto blocked at the proxy. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369586</link><pubDate>Thu, 23 Nov 2023 16:59:53 -0000</pubDate><title>Message #2099369586</title><guid isPermaLink="false">2099369586@Uncensored</guid><description><![CDATA[ > 2023-11-22 18:48 from Nurb432       
 >Well back to my next cloud being flooded to the point i cant use it.   
  
 >100s this evening, one bad login attempt right after another. I guess  
   
 >i have to put a 2nd login in front of it on the proxy. Blows me using  
   
 >native apps with it unless i vpn in ( or am on the wire here, but      
 >sort of defeats the purpose ), but at least i can access the web      
 >client.        
 >      
 >Frustrating.      
 >      
      
 I have a firewall for that.     
    
 When a network application in any of my LANs detect some bruteforce, a syslog
entry is submitted and then the offending address is added to a blacklist*.
Then the IP is added to the firewall list of connections to kill.   
  
 * I use blacklists instead of blocklists or deny lists because black gatekeepers
are just better than puny wokes. That is the reason why the fencer guarding
the entrance to the cool night clubs is always a big badass black. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099369554</link><pubDate>Wed, 22 Nov 2023 23:48:58 -0000</pubDate><title>Message #2099369554</title><guid isPermaLink="false">2099369554@Uncensored</guid><description><![CDATA[<html><body>

<p>Well back to my next cloud being flooded to the point i cant use it. 100s this evening, one bad login attempt right after another. I guess i have to put a 2nd login in front of it on the proxy. Blows me using native apps with it unless i vpn in ( or am on the wire here, but sort of defeats the purpose ), but at least i can access the web client. </p>
<p>Frustrating.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099368212</link><pubDate>Sat, 04 Nov 2023 21:56:31 -0000</pubDate><title>Message #2099368212</title><guid isPermaLink="false">2099368212@Uncensored</guid><description><![CDATA[<html><body>

<p>Punycode URL fake address. Learned something new today.</p>
<p>it looks legit, browsers even tell you the address you think it is, but Unicode underneath it points somewhere else. ( always malicious )</p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352616</link><pubDate>Tue, 08 Aug 2023 18:55:56 -0000</pubDate><title>Message #2099352616</title><guid isPermaLink="false">2099352616@Uncensored</guid><description><![CDATA[<html><body>

<p>ultimately, unless your IT/Security staff are morons or just dont care, that is the eventual outcome.</p>
<blockquote>
<div class="message_header"><span>Tue Aug 08 2023 02:16:28 PM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;"> you are screwed again.</span></blockquote>
</div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352607</link><pubDate>Tue, 08 Aug 2023 18:21:04 -0000</pubDate><title>Message #2099352607</title><guid isPermaLink="false">2099352607@Uncensored</guid><description><![CDATA[ > 2023-08-07 10:07 from IGnatius T Foobar   
 >    
 > I would do all of the following:   
 >    
 > 1. Block all outbound DNS lookups, except through the corporate DNS   
  
 Don't forget to force every DNS query not addressed to the corporate DNS
into the corporate DNS server anyway via MITM. I do this a lot with office
IoT devices that use hardcoded DNS servers. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352605</link><pubDate>Tue, 08 Aug 2023 18:16:28 -0000</pubDate><title>Message #2099352605</title><guid isPermaLink="false">2099352605@Uncensored</guid><description><![CDATA[ > 2023-08-04 23:32 from zelgomer               
 >Let's say, hypothetically, someone was such a workoholic that they     
         
 >wanted to connect to their office PC from their home PC so that they   
           
 >can work late nights and weekends. This person really prefers to use   
           
 >their home PC because it's really good and has a nice big screen and so
             
 >on. Also it's super inconvenient to use the company laptop because it's
             
 >slow, the VPN requires frequent reauthentication, and security policies
             
 >and spyware has gotten so draconian that this person frankly doesn't   
           
 >trust having the device in their home.                 
 >                  
 > So this person devises a back door using ssh tunnelling over stunnel  
            
 >(required to diguise the traffic as https because the company's        
     

 >firewall won't allow ssh to make it out of the office). Which of these 
             
 >two configurations do you think is the least suspicious or likely to   
           
 >result in discovery?                 
 >                  
 > 1. Configure the office PC to open a stunnel client to a controlled   
           
 >host, then use ssh over that to forward a remote port to localhost.    
           
 > 2. Configure the laptop to open a stunnel client to a controlled host,
             
 >then use ssh to forward that to the office PC. The laptop is Windows.  
            
 >The laptop is then kept someplace isolated and connected only by       
       
 >sequestered guest wifi when in use. When not in use, it's shut off and 
             
 >put in a shed outside.               
 >                
 > My thoughts: 1 is simpler and more direct, but it looks like an https 
             

>connection that has constant activity and never dies. 2 is more         
     
 >wasteful since all data comes into the home network and then out again 
             
 >through the vpn, but it has the benefit that traffic does go through   
           
 >the vpn not wrapped in stunnel, so it looks the same as if a person    
          
 >were just using the laptop normally, except for the active https       
       
 >connection, but at least that comes and goes with the work hours, so it
             
 >looks like a human and not like malware.               
 >               
 >              
              
 I am the workaholic.             
            
 I also happen to be the chief sysadmin so I have an VPN link that joins a
network segment in my house with office.           
          
 I dare say most offices that support people working remotely have some VPN
access already set up.
Ask your friendly sysadmin for your entry key.         
        
 If your firm won't let you get legit remote access you should not bother.
RULE #1 of the employee is to never bother with something more than what your
coworkers and direct upper-ups do.       
      
 That said:     
    
 I'd use Wireguard (UDP) to a controlled host using a well known access port
(such as the UDP DNS port), since Wireguard is not a chatty protocol and won't
generate traffic if you are not using it. THen you can Wireguard or ssh forward
to the controlled host. The caveheat is your office sysadmin might be a motherfucker
who smells like a horse who has DNS ports under interception or inspection
and that would raise alarms.   
  
 Stunneling to an https port makes sense for short lived tunnels, since it
will look like an https query unless looked at closely. Then again, your sysadmin
might be a horse smelling
motherfucker who has https traffic under inspection or interception and you
are screwed again. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352582</link><pubDate>Tue, 08 Aug 2023 15:30:58 -0000</pubDate><title>Message #2099352582</title><guid isPermaLink="false">2099352582@Uncensored</guid><description><![CDATA[<html><body>

<p>scuttlebutt P2P. new one for me.</p>
<p>( ran across it on a forum talking about moving a DHT crawler source repository off github and onto a scuttlebutt hosted git.. as the founders are banned or something )</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352493</link><pubDate>Mon, 07 Aug 2023 15:30:09 -0000</pubDate><title>Message #2099352493</title><guid isPermaLink="false">2099352493@Uncensored</guid><description><![CDATA[<html><body>

<p>Our security team is over 40 people now i think</p>
<p>They love logs. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352477</link><pubDate>Mon, 07 Aug 2023 14:07:04 -0000</pubDate><title>Message #2099352477</title><guid isPermaLink="false">2099352477@Uncensored</guid><description><![CDATA[  
 I would do all of the following: 
  
 1. Block all outbound DNS lookups, except through the corporate DNS server

 2. Configure that DNS server to use OpenDNS or some similar service that
scans, logs, blocks, etc. 
 3. Force all outbound HTTP/HTTPS traffic through a proxy 
 4. Configure all workstations to trust a certificate that is installed on
the proxy, permitting it to be a man in the middle for approved traffic 
  
 Now, if you're legitimately performing outbound SSH to external addresses,
that is somewhat more difficult to supervise.  There are firewall logs, of
course, but those would have to be periodically scanned and searched for suspicious
destinations (the "What customer is this?" question).  A connection that is
open "all day, every day" might turn up on a SIEM report as something worth
investigating. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352449</link><pubDate>Sat, 05 Aug 2023 23:20:04 -0000</pubDate><title>Message #2099352449</title><guid isPermaLink="false">2099352449@Uncensored</guid><description><![CDATA[ > 2023-08-05 15:22 from IGnatius T Foobar <ajc@citadel.org>   
 > > So this person devises a back door using ssh tunnelling over stunnel
 
 >  
 > >(required to diguise the traffic as https because the company's     
 >    
 > If the internal network is run by people who love security theater,   
 >they're going to catch and terminate this person eventually, so it   
 >isn't worth it.   
 >    
  
 Yeah, 100% agree. That's what I would say to this hypothetical person, too.

  
 But let's say you wanted to catch people doing this. As an IT/security person,
how would you notice it short of scanning specifically for ssh -R processes?
ssh use is allowed where I work, it has to be. We're all using it pretty much
constantly. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352419</link><pubDate>Sat, 05 Aug 2023 17:38:46 -0000</pubDate><title>Message #2099352419</title><guid isPermaLink="false">2099352419@Uncensored</guid><description><![CDATA[<html><body>

<p>Between that and us moving to a new ITSM platform, i may never need windows or a shop PC again.</p>
<blockquote>
<div class="message_header"><span>Sat Aug 05 2023 11:22:57 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">And then they blow the whole thing by permitting users to log in to Microsoft 365 from any computer. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352405</link><pubDate>Sat, 05 Aug 2023 15:22:57 -0000</pubDate><title>Message #2099352405</title><guid isPermaLink="false">2099352405@Uncensored</guid><description><![CDATA[ > So this person devises a back door using ssh tunnelling over stunnel  

 >(required to diguise the traffic as https because the company's   
  
 If the internal network is run by people who love security theater, they're
going to catch and terminate this person eventually, so it isn't worth it.

  
 Get an A/B switch, plug the company laptop into the big monitor, attach it
to a separate VLAN on the home network, and deal with the slow VPN. 
  
 There's probably something in their company security policy that specifically
prohibits trying to work around the VPN using any sort of trickery.  My employer
definitely has that policy in place, and they actively scan end user workstations
for software that could work around it. 
  
 And then they blow the whole thing by permitting users to log in to Microsoft
365 from any computer. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352399</link><pubDate>Sat, 05 Aug 2023 14:49:02 -0000</pubDate><title>Message #2099352399</title><guid isPermaLink="false">2099352399@Uncensored</guid><description><![CDATA[<html><body>

<p>Then i would go with option 2, or something similar.  Waste the bandwidth or other resources for the sake of stealth. </p>
<p>Once upon a time due to a lot of restrictions, and similar 'performance' annoyances issues, i ended up doing a p2v so i could run the office computer on better/larger hardware, in effect.  I have a ( office bought ) MSDN license, so changing hardware the first time didnt burn me. ( later when we started staying home a day or 2 a week, pre pandemic,  i redid the office laptop as a host. just shuffled the vm back and forth when i had to come into the office ) May not work for everyone tho.. </p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat Aug 05 2023 09:48:19 AM EDT</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Do they pay you for after hours? If not id say f-it and find <br />something else to keep yourself occupied at night. Get a hobby. <br /><br /></blockquote>
<br />Okay, but for the sake of argument only, let's say it was to be used during normal work hours too :) </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352397</link><pubDate>Sat, 05 Aug 2023 13:48:19 -0000</pubDate><title>Message #2099352397</title><guid isPermaLink="false">2099352397@Uncensored</guid><description><![CDATA[ >Do they pay you for after hours? If not id say f-it and find  
 >something else to keep yourself occupied at night. Get a hobby.  
 >  
  
 Okay, but for the sake of argument only, let's say it was to be used during
normal work hours too :) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352391</link><pubDate>Sat, 05 Aug 2023 12:10:45 -0000</pubDate><title>Message #2099352391</title><guid isPermaLink="false">2099352391@Uncensored</guid><description><![CDATA[<html><body>

<p>In our case, they monitor ( and just learned, keep logs for months ) of all traffic. Restrict what you can run. Scan what you can run. Block ports. And you sign papers that if you cheat you get bounced out the door.</p>
<p>Do they pay you for after hours? If not id say f-it and find something else to keep yourself occupied at night. Get a hobby.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099352367</link><pubDate>Sat, 05 Aug 2023 03:32:24 -0000</pubDate><title>Message #2099352367</title><guid isPermaLink="false">2099352367@Uncensored</guid><description><![CDATA[Let's say, hypothetically, someone was such a workoholic that they wanted
to connect to their office PC from their home PC so that they can work late
nights and weekends. This person really prefers to use their home PC because
it's really good and has a nice big screen and so on. Also it's super inconvenient
to use the company laptop because it's slow, the VPN requires frequent reauthentication,
and security policies and spyware has gotten so draconian that this person
frankly doesn't trust having the device in their home.   
    
 So this person devises a back door using ssh tunnelling over stunnel (required
to diguise the traffic as https because the company's firewall won't allow
ssh to make it out of the office). Which of these two configurations do you
think is the least suspicious or likely to result in discovery?   
    
 1. Configure the office PC to open a stunnel client to a controlled
host, then use ssh over that to forward a remote port to localhost.  
 2. Configure the laptop to open a stunnel client to a controlled host, then
use ssh to forward that to the office PC. The laptop is Windows. The laptop
is then kept someplace isolated and connected only by sequestered guest wifi
when in use. When not in use, it's shut off and put in a shed outside. 
  
 My thoughts: 1 is simpler and more direct, but it looks like an https connection
that has constant activity and never dies. 2 is more wasteful since all data
comes into the home network and then out again through the vpn, but it has
the benefit that traffic does go through the vpn not wrapped in stunnel, so
it looks the same as if a person were just using the laptop normally, except
for the active https connection, but at least that comes and goes with the
work hours, so it looks like a human and not like malware. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099349985</link><pubDate>Wed, 12 Jul 2023 20:36:54 -0000</pubDate><title>Message #2099349985</title><guid isPermaLink="false">2099349985@Uncensored</guid><description><![CDATA[<html><body>

<p>So this is a strange one. ( to me anyway )</p>
<p>We have an azure tenant. ( ya i know.. MS.. ick )</p>
<p>Our account people created an AD account for someone not in our forest, to access my stuff.  Attached Azure MFA to it ( required by me to get access to my stuff )</p>
<p>They made the UPN the remote domain ( with email attribute email the same even tho we dont host their domain ) and while it would work on-wire, supposedly that is not workable external as MFA it bitched about the account not being part of our tenant. Even tho the account was in our forest..  Change UPN to one of our domains, leave email alone, it worked ( and screws up my system as i assume UPN = Email but i worked around it )</p>
<p>Seems odd to me, its in our forest, who cares what we call it? I would think just being in our forest = being in the tenant </p>
<p> </p>
<p>( and of course over night the UPN reverted back to pre-change values and broke again.. )</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099342116</link><pubDate>Fri, 12 May 2023 20:45:50 -0000</pubDate><title>Message #2099342116</title><guid isPermaLink="false">2099342116@Uncensored</guid><description><![CDATA[<html><body>

<p>Thought i mentioned it before.  Central Indiana </p>
<blockquote>
<div class="message_header"><span>Fri May 12 2023 04:28:25 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">I don't know where you are. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099342107</link><pubDate>Fri, 12 May 2023 20:28:25 -0000</pubDate><title>Message #2099342107</title><guid isPermaLink="false">2099342107@Uncensored</guid><description><![CDATA[I don't know where you are. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099341732</link><pubDate>Thu, 11 May 2023 23:31:21 -0000</pubDate><title>Message #2099341732</title><guid isPermaLink="false">2099341732@Uncensored</guid><description><![CDATA[<html><body>

<p>If you ever make it near me, yell.. </p>
<blockquote>
<div class="message_header"><span>Thu May 11 2023 07:27:57 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;"> (like right now ... hello from the Atlanta airport) </span></blockquote>
</div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099341730</link><pubDate>Thu, 11 May 2023 23:27:57 -0000</pubDate><title>Message #2099341730</title><guid isPermaLink="false">2099341730@Uncensored</guid><description><![CDATA[ > Poorman's way of accesing internal web services that are behind a   
 >firewall is to have a proxy inside and use ssh forwarding to access   
 >said proxy. ssh has enough tools for blocking bruteforcers as it is and
 
 >should be easy enough to defend. That is my approach for my personal   
 >stuff.   
  
 << raises hand >>   Call me a poor man then   :) 
  
 Actually I have a nice WireGuard mesh between my home network, my hosting
network, and my darknet gateway (three different locations).  I'd like to
have my travel laptop on it too, but WireGuard doesn't play nicely with T-Mobile's
NAT464XLAT gateways.  So when I'm tethered with my phone (like right now ...
hello from the Atlanta airport) I set up a local SOCKS server on SSH and then
connect to my home server over a hidden port number: 
  
 ssh -D 5060 -p <hidden_port_number> ig@home.server.dom 
  
 And the browser is configured to
connect to a SOCKS server on localhost:5060 (I recommend a browser extension
called "Socks5 Configurator" which makes this easy). 
  
 Aaaaaaaand now we're boarding so it's time for me to sign off.  From now
until the next time, see you in the skies! 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099341202</link><pubDate>Wed, 10 May 2023 21:21:20 -0000</pubDate><title>Message #2099341202</title><guid isPermaLink="false">2099341202@Uncensored</guid><description><![CDATA[<html><body>

<p>most of what i saw was IP blocks.  ended up with such a large table of blocks, connections started slowing down</p>
<p> </p>
<p>i think im safe with vpn, and its transparent.  Unless someone comes up with a reason its bad that im not thinking of. </p>
<blockquote>
<div class="message_header"><span>Wed May 10 2023 04:46:38 PM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2023-05-08 19:33 from Nurb432 <br />In the past i did just this.  But, ran into 2 things <br /><br />1 - i was not using key-pairs and just a login, so it was sort of the <br />same risk <br /><br />2 - OpenVPN was transparent to all apps once connected..  and <br />automatically did key-pairs so i didnt have to f with that myself for <br />SSH.  </blockquote>
<br />The advantage with SSH is that even if you are using password auth, there are so many tools for bruteforce prevention for SSH that you can grab any random one with not much effort. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099341199</link><pubDate>Wed, 10 May 2023 20:46:38 -0000</pubDate><title>Message #2099341199</title><guid isPermaLink="false">2099341199@Uncensored</guid><description><![CDATA[ > 2023-05-08 19:33 from Nurb432   
 >In the past i did just this.  But, ran into 2 things   
 >  
 >1 - i was not using key-pairs and just a login, so it was sort of the  
 >same risk   
 >  
 >2 - OpenVPN was transparent to all apps once connected..  and  
 >automatically did key-pairs so i didnt have to f with that myself for  
 >SSH.    
  
 The advantage with SSH is that even if you are using password auth, there
are so many tools for bruteforce prevention for SSH that you can grab any
random one with not much effort. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099340319</link><pubDate>Mon, 08 May 2023 23:33:06 -0000</pubDate><title>Message #2099340319</title><guid isPermaLink="false">2099340319@Uncensored</guid><description><![CDATA[<html><body>

<p>In the past i did just this.  But, ran into 2 things</p>
<p>1 - i was not using key-pairs and just a login, so it was sort of the same risk</p>
<p>2 - OpenVPN was transparent to all apps once connected..  and automatically did key-pairs so i didnt have to f with that myself for SSH. </p>
<blockquote>
<div class="message_header"><span>Mon May 08 2023 04:57:50 PM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Poorman's way of accesing internal web services that are behind a firewall is to have a proxy inside and use ssh forwarding to access said proxy. ssh has enough tools for blocking bruteforcers as it is and should be easy enough to defend. That is my approach for my personal stuff. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099340318</link><pubDate>Mon, 08 May 2023 23:30:01 -0000</pubDate><title>Message #2099340318</title><guid isPermaLink="false">2099340318@Uncensored</guid><description><![CDATA[<html><body>

<p>The office, that would work, but not from my phone.  </p>
<blockquote>
<div class="message_header"><span>Mon May 08 2023 04:57:50 PM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;"> If you connect mostly from one or two offices you may actually whitelist those IPs and set everything else default-deny.</span></blockquote>
<br /><br /></div>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099340312</link><pubDate>Mon, 08 May 2023 22:45:43 -0000</pubDate><title>Message #2099340312</title><guid isPermaLink="false">2099340312@Uncensored</guid><description><![CDATA[ > Poorman's way of accesing internal web services that are behind a   
 >firewall is to have a proxy inside and use ssh forwarding to access   
 >said proxy. ssh has enough tools for blocking bruteforcers as it is and
 
 >should be easy enough to defend. That is my approach for my personal   
 >stuff.   
 >   
  
 This is how I do stuff, so consider me a poor man. I have ssh tunnels in
my configs for accessing all kinds of things. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099340245</link><pubDate>Mon, 08 May 2023 20:57:50 -0000</pubDate><title>Message #2099340245</title><guid isPermaLink="false">2099340245@Uncensored</guid><description><![CDATA[ >In the bigger picture, how safe is this? You need a file to be able    
 >to connect, so its not like you can just randomly send    
 >id/passwords.   Sure, i still run a DoS risk even with nothing    
 >exposed, but what about the basic risk of publishing that way in?     
 >    
    
 It should be safe enough. I'd personally blacklist a good chunk of the internet
from accessing my VPN ports anyway. If you connect mostly from one or two
offices you may actually whitelist those IPs and set everything else default-deny.
  
  
 Poorman's way of accesing internal web services that are behind a firewall
is to have a proxy inside and use ssh forwarding to access said proxy. ssh
has enough tools for blocking bruteforcers as it is and should be easy enough
to defend. That is my approach for my personal stuff. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099339124</link><pubDate>Sat, 06 May 2023 14:21:26 -0000</pubDate><title>Message #2099339124</title><guid isPermaLink="false">2099339124@Uncensored</guid><description><![CDATA[<html><body>

<p>This could be network room material too. but security concerns is prompting this :)   ( even rants or bottom feeders as these scumbags need beat with a bat )</p>
<p>So this week been getting hammered hard from script kiddies. More than normal. One now is hitting my nextcloud url ( i have Ngnix on the outside ) and flooding it with enough bad logins that the NC server is now blocking my proxy IP  ( since it has no way to know where this stuff is really coming from and all it sees is my internal proxy address ). Other ports being hit too as expected, but no effect as they were not open. But due to NC being offline in effect, last night i just shut all port mapping down and threw in the towel.</p>
<p>I'm thinking of just leaving my web services offline except on demand. But i would like to leave my OpenVPN server alive so i can still access my crap from the office or something.  </p>
<p>It is on the standard port, but sniffers could find it on an odd port so i figured why bother.  </p>
<p>In the bigger picture, how safe is this? You need a file to be able to connect, so its not like you can just randomly send id/passwords.   Sure, i still run a DoS risk even with nothing exposed, but what about the basic risk of publishing that way in?</p>
<p>I guess i could add a login on the NGNIX side ( i did that for my AI chat bot when i published it to play with at work ), but it still gives them an active port with a 'real' login to beat on.</p>
<p> </p>
<p> </p>
<p>And unrelated to the actual question, Interesting thing was that it was coming from various ports on their end but was hitting 80 on my end to hit the NC URL.. is that new or have i never noticed?  I have of course seen the random port to port scan, but not in this way where it does not match.  ( but i admit i dont keep up on this stuff. )</p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099330354</link><pubDate>Fri, 17 Mar 2023 14:51:25 -0000</pubDate><title>Message #2099330354</title><guid isPermaLink="false">2099330354@Uncensored</guid><description><![CDATA[<html><body>

<p>And i do wish i had 20 or 30k laying around that i didnt care about, to buy a couple of bigger GPUs..  Make things much faster.   And could load larger datasets. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323499</link><pubDate>Mon, 23 Jan 2023 14:41:49 -0000</pubDate><title>Message #2099323499</title><guid isPermaLink="false">2099323499@Uncensored</guid><description><![CDATA[ >also lets you write down in your CV that you have mastered your   
 >Postfix/OpenSMTPD/Dovecot kung-fu.   
  
 Your what now?  :) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323281</link><pubDate>Fri, 20 Jan 2023 12:12:12 -0000</pubDate><title>Message #2099323281</title><guid isPermaLink="false">2099323281@Uncensored</guid><description><![CDATA[<html><body>

<p>Be sure to buy a bottle of migraine tablets.</p>
<p> </p>
<p>:)</p>
<blockquote>
<div class="message_header"><span>Fri Jan 20 2023 06:48:28 AM EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2023-01-19 19:01 from Nurb432 <br />Ya, not worth the effort or pain you will receive.  </blockquote>
<br />I think it is worth doing, if only for the learning experience. It also lets you write down in your CV that you have mastered your Postfix/OpenSMTPD/Dovecot kung-fu. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323276</link><pubDate>Fri, 20 Jan 2023 11:48:28 -0000</pubDate><title>Message #2099323276</title><guid isPermaLink="false">2099323276@Uncensored</guid><description><![CDATA[ > 2023-01-19 19:01 from Nurb432   
 >Ya, not worth the effort or pain you will receive.    
  
 I think it is worth doing, if only for the learning experience. It also lets
you write down in your CV that you have mastered your Postfix/OpenSMTPD/Dovecot
kung-fu. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323230</link><pubDate>Fri, 20 Jan 2023 00:01:39 -0000</pubDate><title>Message #2099323230</title><guid isPermaLink="false">2099323230@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya, not worth the effort or pain you will receive. </p>
<p>A few bucks to a hosting provider, done.  Yes  i know this was about zero trust... but in this day and age, 90% trust is good enough i think.  Most providers would be destroyed if they got caught doing bad stuff.</p>
<blockquote>
<div class="message_header"><span>Thu Jan 19 2023 06:54:15 PM EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Right. It is very much true, you're not going to be able to reliably run email from a residential Internet connection like the lazy dweeb in the article tried to do. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323229</link><pubDate>Thu, 19 Jan 2023 23:54:15 -0000</pubDate><title>Message #2099323229</title><guid isPermaLink="false">2099323229@Uncensored</guid><description><![CDATA[ > If you can't afford an ISP subscription which allows you to send and  

 >receive traffic from other SMTP servers, there are dedicated providers 
 
  
 Right.  It is very much true, you're not going to be able to reliably run
email from a residential Internet connection like the lazy dweeb in the article
tried to do.  You need to host it at a legit provider, or at least tunnel
through a legit provider.  And your forward & reverse DNS have to match, which
is what gets most people who try it thrown into the spam bin. 
  
 I highly recommend my VPN provider, Ace Innovative [ https://www.aceinnovative.com/internet-access/static-ip-vpn/
] who offers a static VPN service that tunnels a /29 IPv4 and a /64 IPv6 to
any location for USD$15/month.  They even send you the router (I don't use
it). 
  
 Barring that, a cheap virtual machine from a provider like OVH Cloud [ https://us.ovhcloud.com/vps/
] can also work well. 
  
 This year marks 30 years that I have hosted my own email (plus a few more
if you count the days of ...bang!path UUCP links).  It is not a lot of work,
but it is not maintenance-free either.  Once in a while you have to update
something.  For example, last year I had to get my DMARC strategy in order.

  
 Yes, the big tech hitlers would like to have an email oligopoly.  But they
don't.  I will commandeer a meteor and land it on Google before I give up
my email server. 
  
 And remember: not too long ago, the slobbering masses had @aol.com and @hotmail.com
addresses.  Now they have @gmail.com addresses.  Tomorrow they will have something
else.  The guy who wrote that article is probably a moron whose server got
hacked and was used to deliver spam, and he was too lazy and decided to give
up instead of working to get out of the gmail blacklist. 
  
 (For those offended by the word "blacklist" : good, I'm glad you're offended.
 Let me offend you more.) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323225</link><pubDate>Thu, 19 Jan 2023 23:40:57 -0000</pubDate><title>Message #2099323225</title><guid isPermaLink="false">2099323225@Uncensored</guid><description><![CDATA[ > I am sure IG here would provide you with an awesome email service.    
 
  
 True.  If you want I can email-enable your account here.  I'm not lazy like
that guy in the article and I will run this server until the day I die.  I
can even I2P-enable our SMTP/POP/ 
 IMAP servers if that's your thing.  Just don't send *actual* spam.  :) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323187</link><pubDate>Thu, 19 Jan 2023 17:26:27 -0000</pubDate><title>Message #2099323187</title><guid isPermaLink="false">2099323187@Uncensored</guid><description><![CDATA[ > Also, I was thinking about how I would do it. In order to have TLS all
         
 >the way into my house, I think that I would have to run the deamon on  
        
 >my home machine, and then point the domain to a public VPS which simply
         
 >proxies to my home. That's fine, but then what happens when someone    
      
 >tries to send me mail and my power is off or my machine is rebooting   
       
 >for a system upgrade? Does the mail get dropped? Is this when the      
    
 >sender gets back a mailer daemon "could not send" message? Will it     
     
 >retry a few times before it gives up? Like I said before, I'm actually 
         
 >rather ignorant of the details about how email works.           
 >           
 >          
          
 Your email server can afford to be unreachable a couple of days. Most email
services will try to deliver messages to you, and if your site
is down, they will keep trying every now and then until they give up.    
    
        
 If you can't afford an ISP subscription which allows you to send and receive
traffic from other SMTP servers, there are dedicated providers that offer
SMTP relaying services. If you opt for one of these, you need to trust them
they won't be spying on your traffic. If you trust none, you are back at square
one. The same principle applies to VPNs.       
      
 Running the SMTP server on its own IP is also problematic because if it ends
up in a spamlist you are in trouble. Also, in the US, ISP subscriptions that
are good enough to hosting this sort of service are more expensive.     
    
 In practice, I think that the best options are to either self-host and take
the risks, or host your service with some party you really trust. My email
infrastructure is hosted in my job's datacenter because my boss'
trust in me is absolute at this point and the other way around.   
  
 (As for implementation details, you can either build your email service manually
using any tutorial, or use a pre-packaged email system such as iRedmail).

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323170</link><pubDate>Thu, 19 Jan 2023 16:12:26 -0000</pubDate><title>Message #2099323170</title><guid isPermaLink="false">2099323170@Uncensored</guid><description><![CDATA[<html><body>

<p>Seriously, if you're gonna use email, that's the way to fix the problem.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323153</link><pubDate>Thu, 19 Jan 2023 15:21:42 -0000</pubDate><title>Message #2099323153</title><guid isPermaLink="false">2099323153@Uncensored</guid><description><![CDATA[ >https://cfenollosa.com/blog/after-self-hosting-my-email-for-twenty-thr 
  
 >ee-years-i-have-thrown-in-the-towel-the-oligopoly-has-won.html    
    
 This has been my experience in a nutshell.  I ran my own mail server for
many years, until it got to the point that prospective employers were not
receiving my replies.   
 I switched to fastmail.fm, who run quite a large reputable organization and
come highly recommended.  Occasionally my emails to the big-3 ended up in
people's spam folders, but i can live with that.  At least they were delivered.
  
 Starting about a year ago, emails to big-3 destinations stopped being delivered.
 No bounce, no spam folder, just p00f gone.  The problem, as you can probably
guess, was mostly to gmail.  I didn't much care until I became an officer
in an Engineering society where 95% of the other members were on gmail.  It
became extremely painful.   
 2 months
ago I moved my MX to Google.  Every email now goes through fine.  Occasionally
I miss incoming emails from non big-3 providers, including very large corporations
still running their own servers.  That sucks, but I am not sure what to do
about it.   
  
 Email is fucking broken.  I wish I had a stronger word than fucking. 
 I have a friend, der Mouse, who has solved the problem quite elegantly. 
His MX is a local mail server which blocks any incoming emails from big-3
providers.  If you want to communicate with him, you have to find an email
account elsewhere.  Basic accounts on fastmail, protonmail, etc, are free
and work just fine.  If email is delivered to him, he knows that chances are
good he will be able to reply.  I'm close to setting up a second email account
on that principle. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099323031</link><pubDate>Wed, 18 Jan 2023 15:39:46 -0000</pubDate><title>Message #2099323031</title><guid isPermaLink="false">2099323031@Uncensored</guid><description><![CDATA[<html><body>

<p>I recommend you read this first.</p>
<p> </p>
<p>https://cfenollosa.com/blog/after-self-hosting-my-email-for-twenty-three-years-i-have-thrown-in-the-towel-the-oligopoly-has-won.html</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322961</link><pubDate>Tue, 17 Jan 2023 19:13:00 -0000</pubDate><title>Message #2099322961</title><guid isPermaLink="false">2099322961@Uncensored</guid><description><![CDATA[I've been thinking more about this. I should have waited before I made that
first post, it was sort of a knee jerk reaction to something that had blind
sided me in my personal life. 
  
 After reflecting on it for a bit, I recognized a good summary of what's been
happening. Over the past several years, I have taken some peripheral interest
in electronic privacy and opsec. I never had any concious direction or goal
(I'm not doing anything illegal, and I'm not hiding from any specific entity
for any particular reason), but the more I learn, the more what started as
just curious interest (what geek doesn't love spy stuff and trade craft?)
steadily morphs into paranoid obsession. And aside from paranoia, I think
that also part of my motivation is to expose these complacencies in daily
"normie" life, perhaps with the hope that I might identify better practices
to share with others, or perhaps
even to come up with some solution that will make me the next Bill Gates (only
even more sinister). 
  
 So that's how it goes. I'm just going about my daily life, and when I recognize
poor practices, I'm trying to improve them. It's sort of an effort to recondition
my approach to all things to be more security minded. It started with cutting
out all public social media unless I can post anonymously using I2P and Tor,
which then turned into using a Tails-style gateway VM model for I2P/Tor, and
then it turned into full disk encryption, and then replacing all of my logins
with randomized password management, and on and on and on. Now, the email
situation has finally bothered me enough that it's time to harden this area
of my life. 
  
 To approach this more methodically, I think that I can categorize senders
into three classes, and there may be overlap where some senders exist in two
or all
three classes: 
  
 1. Senders who may produce unwanted spam (either intentionally, or their
database may be insecure and they inadvertently leak my address to spammers).
These would be things like online merchants, barbers, forums, and so on. These
are foiled by giving out proxy "throwaway" addresses. 
  
 2. Senders who may use my address irresponsibly and send personal details.
These are things like doctor's offices, government agencies, banks, or utilities.
I think that the only way to truly resolve this is to give them an address
to a domain and service which I control. Anything less forfeits the end-to-end
encryption of TLS to some third party who you must completely trust, and I
don't want to have to completely trust anybody. 
  
 3. Senders with whom I want to obfuscate association. In other words, I don't
want my web mail provider, my ISP, or the FBI to know that I've signed up
for darknetuser's used underwear mailing list, or that I have to order a new
flesh light every month, or that I'm attending the local Family Circus cosplay
convention next Saturday. I think it's enough to use public web services that
I access only anonymously (I2P or Tor), though when I order my flesh lights,
my name and mailing address would provide a deanonymizing vector. 
  
 If I have to run my own mail service to address #2, then I suppose that also
closes #3. 
  
 So is that where I'm at? There's just no way to escape rolling my own, is
there? 
  
 Also, I was thinking about how I would do it. In order to have TLS all the
way into my house, I think that I would have to run the deamon on my home
machine, and then point the domain to a public VPS which simply proxies to
my home. That's fine, but then what happens when someone tries to send me
mail and my power is off or my machine is
rebooting for a system upgrade? Does the mail get dropped? Is this when the
sender gets back a mailer daemon "could not send" message? Will it retry a
few times before it gives up? Like I said before, I'm actually rather ignorant
of the details about how email works. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322769</link><pubDate>Sun, 15 Jan 2023 10:45:18 -0000</pubDate><title>Message #2099322769</title><guid isPermaLink="false">2099322769@Uncensored</guid><description><![CDATA[ >I've been thinking lately: I need to undergo a personal email reform.  
       
 >        
 >            
 > IG has frequently railed about the evils of gmail. What do you        

 >recommend individuals use instead who don't want to buy a domain and   
     
 >setup their own mail service?           
        
 I am sure IG here would provide you with an awesome email service.      

      
 Failing that, some email providers that promise not to sell your data over
and also promise you to add encryption layers upon requests are Tutanota,
Protonmail and Startmail.     
    
 Startmail lets you create throwaway accounts on the fly, so if you are worried
about spammers, worry not. Enter your account, create a throwaway and give
the throwaway address to the site you are registering with. I think Protonmail
also offers the service.   
  
 There are someother cool services such as fastmail, but they use Google infrastructure,
so beware. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322718</link><pubDate>Sat, 14 Jan 2023 17:23:31 -0000</pubDate><title>Message #2099322718</title><guid isPermaLink="false">2099322718@Uncensored</guid><description><![CDATA[ >its too bad end to end encryption of mail never became a thing. then  
  
 Phil Zimmerman wishes to have a word with you. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322662</link><pubDate>Sat, 14 Jan 2023 01:01:03 -0000</pubDate><title>Message #2099322662</title><guid isPermaLink="false">2099322662@Uncensored</guid><description><![CDATA[<html><body>

<p>consolation is its bots, not humans</p>
<blockquote>
<div class="message_header"><span>Fri Jan 13 2023 07:44:42 PM EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;">spy on your emails and serve you targetted ads.</span></blockquote>
</div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322659</link><pubDate>Sat, 14 Jan 2023 00:46:08 -0000</pubDate><title>Message #2099322659</title><guid isPermaLink="false">2099322659@Uncensored</guid><description><![CDATA[ > Yeah, this is my hang up. In an era when HTTPS is expected at a   
 >minimum, I don't understand how everyone is comfortable with   
  
 And now we even have DNS over HTTPS to hide from our ISPs 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322658</link><pubDate>Sat, 14 Jan 2023 00:44:42 -0000</pubDate><title>Message #2099322658</title><guid isPermaLink="false">2099322658@Uncensored</guid><description><![CDATA[ > 2023-01-13 22:39 from Nurb432 <nurb432@uncensored.citadel.org>   
 >its too bad end to end encryption of mail never became a thing. then  
 >if your host DID read it, they would only get garbage.  
 >  
  
 Yeah, this is my hang up. In an era when HTTPS is expected at a minimum,
I don't understand how everyone is comfortable with unencrypted email. Of
course, the Googles and Yahoos or whatever othee public providers there are
out there probably actively derail any end to end initiatives because they
want to be able to spy on your emails and serve you targetted ads. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322642</link><pubDate>Fri, 13 Jan 2023 22:39:10 -0000</pubDate><title>Message #2099322642</title><guid isPermaLink="false">2099322642@Uncensored</guid><description><![CDATA[<html><body>

<p>its too bad end to end encryption of mail never became a thing. then if your host DID read it, they would only get garbage.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322632</link><pubDate>Fri, 13 Jan 2023 21:15:26 -0000</pubDate><title>Message #2099322632</title><guid isPermaLink="false">2099322632@Uncensored</guid><description><![CDATA[If you're that concerned about other people reading your email, then you need
your own email server and a private instance of SpamGourmet (you can download
the software) to create disposable addresses. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322623</link><pubDate>Fri, 13 Jan 2023 19:47:42 -0000</pubDate><title>Message #2099322623</title><guid isPermaLink="false">2099322623@Uncensored</guid><description><![CDATA[That sounds great, except that it introduces yet another party who can read
my emails. 
  
 Am I taking crazy pills, or is consumer grade email one of the least secure
systems in our daily lives? I really wish we would all discourage its use
by organizations for sensitive information! 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322603</link><pubDate>Fri, 13 Jan 2023 14:48:17 -0000</pubDate><title>Message #2099322603</title><guid isPermaLink="false">2099322603@Uncensored</guid><description><![CDATA[  
 My solution for the last two decades has been Spam Gourmet [ https://www.spamgourmet.com
].  Yes, you have to create an account and give them your real email address.
 Yes, I trust them; they've been operating this service since the turn of
the century and they aren't in the spam business. 
  
 Let's say your account name is "zelgomer" and you have it configured to forward
your mail to "zel@mydomain.com".  No one else ever has to see your real mail
address at all anymore.  But here's the fun part: you don't need to go to
spamgourmet.com every time you need a disposable address.  For example, you
sign up for a promotion or something and they want your address, so you could
just go "promotion.zelgomer@spamgourmet.com" and the first time Spam Gourmet
sees that address, it starts a counter.  You get three deliveries to that
address, and then it stops working. 
  
 You can also have addresses
that self-destruct after a different number of messages; for example, promotion.10.zelgomer@spamgourmet.com
would give you ten incoming emails before it stops working.  And no, someone
can't just see that number and change it.   They also have a couple of other
domains, like spamgourmet.net, spamgourmet.org, spamcannon.net, antichef.com,
antichef.net, neverbox.com, recursor.net, dfgh.net, spameater.org, and xoxy.net,
which are attached to the same system. 
  
 Check it out.  It's free, it's run by people who aren't going to distribute
your address or send spam, and I've been enjoying it hassle-free for 20 years.
 And although you never have to actually visit the site again, it's satisfying
to go in once in a while and see which of your disposable addresses ended
up getting hundreds or even thousands of spams after they self-destructed.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322564</link><pubDate>Thu, 12 Jan 2023 23:45:10 -0000</pubDate><title>Message #2099322564</title><guid isPermaLink="false">2099322564@Uncensored</guid><description><![CDATA[<html><body>

<p>If you want to operate under zero trust, yes. that is your only option, self hosted domain.</p>
<p> </p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Thu Jan 12 2023 06:36:05 PM EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2023-01-12 22:24 from Nurb432 &lt;nurb432@uncensored.citadel.org&gt; <br />If you want anonymous and dont want to setup a domain.  how about <br />proton mail? Basic use is free ..  <br /><br /></blockquote>
<br />Still requires me to trust that Proton isn't going to steal personal information that morons send me. <br /><br />In fact, after giving it a few minutes of thought, I think that alone means I need to setup my own. <br /><br />And I probably should do this, anyway, just for the experience (I still have only a vague idea of how email works) and for the vanity address. I never liked my public email username, anyway. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322562</link><pubDate>Thu, 12 Jan 2023 23:36:05 -0000</pubDate><title>Message #2099322562</title><guid isPermaLink="false">2099322562@Uncensored</guid><description><![CDATA[ > 2023-01-12 22:24 from Nurb432 <nurb432@uncensored.citadel.org>   
 >If you want anonymous and dont want to setup a domain.  how about  
 >proton mail? Basic use is free ..   
 >  
  
 Still requires me to trust that Proton isn't going to steal personal information
that morons send me. 
  
 In fact, after giving it a few minutes of thought, I think that alone means
I need to setup my own. 
  
 And I probably should do this, anyway, just for the experience (I still have
only a vague idea of how email works) and for the vanity address. I never
liked my public email username, anyway. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322556</link><pubDate>Thu, 12 Jan 2023 22:24:59 -0000</pubDate><title>Message #2099322556</title><guid isPermaLink="false">2099322556@Uncensored</guid><description><![CDATA[<html><body>

<p>If you want anonymous and dont want to setup a domain.  how about proton mail? Basic use is free .. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322551</link><pubDate>Thu, 12 Jan 2023 22:03:37 -0000</pubDate><title>Message #2099322551</title><guid isPermaLink="false">2099322551@Uncensored</guid><description><![CDATA[I've been thinking lately: I need to undergo a personal email reform.   
    
 IG has frequently railed about the evils of gmail. What do you recommend
individuals use instead who don't want to buy a domain and setup their own
mail service?   
    
 This wouldn't need to be anonymous mail. Here are the two issues I want to
address. One, I hate that everything asks for your email now. I can hardly
buy a sandwich anymore without having to provide an email address, which they
no doubt will inundate with spam to buy more sandwiches, and/or sell it to
other spammers on the side who will try to sell me Viagra. Second, I'm growing
increasingly uncomfortable with my email provider knowing about everything
I do. They know where I shop and what I buy, when it's delivered, where it's
delivered to, how much I paid for it, when my credit card statements are ready,
who I work for, whether I got a tax refund
or owed, how much LNG I use each month, and on and on and on.  
 So I want to foil this linkage. I don't want the spammers to reliably connect
an address to me, and I don't want my provider to reliably build such a complete
profile on me. 
  
 I've thought about handing out yopmail addresses, but the problem there is
that a lot of these companies send me very personal, private things via email,
and I can't get them to stop. I've seen a state government office email me
confirmation before that included my name, address, and SSN!! 
  
 I've lost trust on both ends. I don't trust companies or the government to
treat my email responsibly, and I don't trust my email provider to not spy
on it. 
  
 What do I do now? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322532</link><pubDate>Thu, 12 Jan 2023 17:41:29 -0000</pubDate><title>Message #2099322532</title><guid isPermaLink="false">2099322532@Uncensored</guid><description><![CDATA[ > Like I said, I'm still wearing it!   
 >    
 > Honestly I wouldn't have ever expected a site like that to ever deal  

 >with women. I figured it would all be counterfeit.   
 >   
 >  
  
 This was as legit as one can get in this market. The problem is many girls
would sign an agreement to upload their pictures in the advertisement for
the used panties and give the site permission to use the pictures for X months
for promotional purposes, and a lot of them would make a whole lot of money
THEN threaten to sue the site because they were using the pictures. It would
have been discarded in court but the admin was rich already and it was not
worth it to get burnt dealing with fatherfuckers. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322522</link><pubDate>Thu, 12 Jan 2023 15:10:19 -0000</pubDate><title>Message #2099322522</title><guid isPermaLink="false">2099322522@Uncensored</guid><description><![CDATA[ > 2023-01-11 15:21 from fandarel   
 >Added IRC2P to my list to investigate.  I played around with i2p in   
  
 Not helpful -- you're already here  :) 
  
 I want to figure out how to make Uncensored a more popular "destination"
for people exploring the I2P network.  I figure anyone who is exploring a
darknet would feel at home on a site that has a technolibertarian vibe to
it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322521</link><pubDate>Thu, 12 Jan 2023 15:08:22 -0000</pubDate><title>Message #2099322521</title><guid isPermaLink="false">2099322521@Uncensored</guid><description><![CDATA[ >If you set a shop subservice in which people may sell their used   
 >underwear over UNcensored you will have this place full in no time.   
  
 Yeah.  We're not that kind of site.  There's plenty of underwear in the laundry
basket already. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322471</link><pubDate>Thu, 12 Jan 2023 00:28:04 -0000</pubDate><title>Message #2099322471</title><guid isPermaLink="false">2099322471@Uncensored</guid><description><![CDATA[<html><body>

<p>There are a few directories and bots out there.  Start with this perhaps.   -&gt; http://paavlaytlfsqyvkg3yqj7hflfg5jw2jdg2fgkza5ruf6lplwseeqtvyd.onion/</p>
<p>I actually started with freenet, but saw a use for all 3...</p>
<blockquote>
<div class="message_header"><span>Wed Jan 11 2023 06:12:46 PM EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Maybe it's because I was exposed to I2P before I was to Tor, but for me it's the opposite experience. I use Tor to browse the clearnet anonymously, but I have no clue how to find hidden services on Tor. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322468</link><pubDate>Wed, 11 Jan 2023 23:12:46 -0000</pubDate><title>Message #2099322468</title><guid isPermaLink="false">2099322468@Uncensored</guid><description><![CDATA[Maybe it's because I was exposed to I2P before I was to Tor, but for me it's
the opposite experience. I use Tor to browse the clearnet anonymously, but
I have no clue how to find hidden services on Tor. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322461</link><pubDate>Wed, 11 Jan 2023 21:32:26 -0000</pubDate><title>Message #2099322461</title><guid isPermaLink="false">2099322461@Uncensored</guid><description><![CDATA[<html><body>

<p>I think its still of value, but it seems to me like TOR is also slowing down.  Unsure if its due to infrastructure reasons, or DoS attacks.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322455</link><pubDate>Wed, 11 Jan 2023 20:21:40 -0000</pubDate><title>Message #2099322455</title><guid isPermaLink="false">2099322455@Uncensored</guid><description><![CDATA[Added IRC2P to my list to investigate.  I played around with i2p in general
awhile back, but didn't find it particularly compelling.  At that time there
was more interesting stuff on TOR.  As I now find TOR to be a bit of a graveyard,
I'll give i2p another look. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322423</link><pubDate>Wed, 11 Jan 2023 13:15:49 -0000</pubDate><title>Message #2099322423</title><guid isPermaLink="false">2099322423@Uncensored</guid><description><![CDATA[<html><body>

<p>Reminds me of a sign at a junkyard i used to go to:  "Everyone uses used parts. You just drove in on them"</p>
<blockquote>
<div class="message_header"><span>Tue Jan 10 2023 05:41:58 PM EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>If you set a shop subservice in which people may sell their used <br />underwear over UNcensored you will have this place full in no time. <br /><br /></blockquote>
<br />Sell it?? Never! I'm still wearing it! </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322393</link><pubDate>Wed, 11 Jan 2023 01:33:09 -0000</pubDate><title>Message #2099322393</title><guid isPermaLink="false">2099322393@Uncensored</guid><description><![CDATA[ > 2023-01-10 22:51 from darknetuser <darknetuser@uncensored.citadel.org>
  
 > >        
 > > Sell it?? Never! I'm still wearing it!       
 > >       
 > >      
 >      
 > You are supposed to sell your mom's.     
 >    
 > I knew the operator of such website. He made lots of kilobucks, but   
 >ended up selling the site because he was fed up of having to deal with 
 
 >women to run it.   
 >   
  
 Like I said, I'm still wearing it! 
  
 Honestly I wouldn't have ever expected a site like that to ever deal with
women. I figured it would all be counterfeit. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322382</link><pubDate>Tue, 10 Jan 2023 22:51:19 -0000</pubDate><title>Message #2099322382</title><guid isPermaLink="false">2099322382@Uncensored</guid><description><![CDATA[ >      
 > Sell it?? Never! I'm still wearing it!     
 >     
 >    
    
 You are supposed to sell your mom's.   
  
 I knew the operator of such website. He made lots of kilobucks, but ended
up selling the site because he was fed up of having to deal with women to
run it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322381</link><pubDate>Tue, 10 Jan 2023 22:41:58 -0000</pubDate><title>Message #2099322381</title><guid isPermaLink="false">2099322381@Uncensored</guid><description><![CDATA[ >If you set a shop subservice in which people may sell their used   
 >underwear over UNcensored you will have this place full in no time.   
 >   
  
 Sell it?? Never! I'm still wearing it! 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322376</link><pubDate>Tue, 10 Jan 2023 20:52:29 -0000</pubDate><title>Message #2099322376</title><guid isPermaLink="false">2099322376@Uncensored</guid><description><![CDATA[ > I want to figure out a way to get more I2P people to join us here.    
 
 >Even the two of you are worth the investment in the router, but I'd    

 >love to have a few more friends from there.     
 >     
 >    
    
 I'd love to give you advice on how to make some service popular, but I am
the wrong person for such a thing.   
  
 The trend seems to be that vice-relate services get popular quickly. If you
set a shop subservice in which people may sell their used underwear over UNcensored
you will have this place full in no time. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322308</link><pubDate>Tue, 10 Jan 2023 00:01:25 -0000</pubDate><title>Message #2099322308</title><guid isPermaLink="false">2099322308@Uncensored</guid><description><![CDATA[Nothing like that.  Everything else worked; it was only IRC2P that was not
working, and even then, it began working when I deleted and re-created the
client tunnel.  Just out of nowhere, the default configuration had stopped
working.  I figured the IRC2P operators didn't like my charming personality
or something.  :)  But I'm back now, and my /nick still works, so whatever
happened was likely not intentional -- or if it was, I was probably collateral
damage rather than the actual target. 
  
 I want to figure out a way to get more I2P people to join us here.  Even
the two of you are worth the investment in the router, but I'd love to have
a few more friends from there. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322294</link><pubDate>Mon, 09 Jan 2023 21:19:18 -0000</pubDate><title>Message #2099322294</title><guid isPermaLink="false">2099322294@Uncensored</guid><description><![CDATA[ > 2023-01-07 10:56 from zelgomer   
 > > 2023-01-07 14:54 from IGnatius T Foobar <ajc@citadel.org>     
 > >Still not working for me, not at either node.  I even upgraded my    

 > >router code.    
 > > I wonder if they banned my router or something.     
 > >     
 > >    
 >    
 > I actually don't think they can, because you get a new b32 each time  

 >the tunnel is established. Can you get to eepsites? Can you get to   
 >http://hq.postman.i2p? What does the tunnel status say from the hidden 
 
 >service manager?   
 >   
 >  
  
 If they catch your IP sending bad traffic or acting suspicious (such as hosting
50 nodes from the same IP) you have a good chance of the big floodfill operators
to throtle you down. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322218</link><pubDate>Sun, 08 Jan 2023 23:53:29 -0000</pubDate><title>Message #2099322218</title><guid isPermaLink="false">2099322218@Uncensored</guid><description><![CDATA[hq worked fine, and my other client tunnels were fine too.  I also usually
keep a tab open to Uncensored via I2P with the "who is online" list automatically
refreshing, just to demonstrate that both of my routers are still up. 
  
 So I deleted the IRC2P client tunnel and created a new one.  Now it works.
 I don't know why.   <<shrug>> 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322208</link><pubDate>Sun, 08 Jan 2023 21:12:04 -0000</pubDate><title>Message #2099322208</title><guid isPermaLink="false">2099322208@Uncensored</guid><description><![CDATA[<html><body>

<p>Not really looked at it for a long time, but seems onionshare now has chat and static page web-hosting....</p>
<p>Last time i messed with it, just provided a file drop/share. </p>
<p>And, its all python, so for me that is a plus :)  And has both text and some sort of graphical management thing ( tho looks simple, not looked closely yet )   i thought it was some other language last time, and needed nodeJS or something installed. i cant remember now, but python is good. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322129</link><pubDate>Sat, 07 Jan 2023 17:08:59 -0000</pubDate><title>Message #2099322129</title><guid isPermaLink="false">2099322129@Uncensored</guid><description><![CDATA[<html><body>

<p>That was my thinking too, unless they did and he's never restarted. And as i'm no expert, so this may be a dumb question: Is blocking even supported in the base code? That seems sort of counter-intent of the project.</p>
<blockquote>
<div class="message_header"><span>Sat Jan 07 2023 10:56:31 AM EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;">I actually don't think they can, because you get a new b32 each time the tunnel is established.</span></blockquote>
</div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322125</link><pubDate>Sat, 07 Jan 2023 15:56:31 -0000</pubDate><title>Message #2099322125</title><guid isPermaLink="false">2099322125@Uncensored</guid><description><![CDATA[ > 2023-01-07 14:54 from IGnatius T Foobar <ajc@citadel.org>   
 >Still not working for me, not at either node.  I even upgraded my   
 >router code.  
 > I wonder if they banned my router or something.   
 >   
 >  
  
 I actually don't think they can, because you get a new b32 each time the
tunnel is established. Can you get to eepsites? Can you get to http://hq.postman.i2p?
What does the tunnel status say from the hidden service manager? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099322118</link><pubDate>Sat, 07 Jan 2023 14:54:55 -0000</pubDate><title>Message #2099322118</title><guid isPermaLink="false">2099322118@Uncensored</guid><description><![CDATA[Still not working for me, not at either node.  I even upgraded my router code.
 I wonder if they banned my router or something. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099321543</link><pubDate>Mon, 02 Jan 2023 20:35:38 -0000</pubDate><title>Message #2099321543</title><guid isPermaLink="false">2099321543@Uncensored</guid><description><![CDATA[<html><body>

<p>its just the NSA inserting nodes "for your protection". Nothing to be concerned about, citizen.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099321541</link><pubDate>Mon, 02 Jan 2023 20:04:05 -0000</pubDate><title>Message #2099321541</title><guid isPermaLink="false">2099321541@Uncensored</guid><description><![CDATA[ > 2023-01-02 16:17 from IGnatius T Foobar <ajc@citadel.org>   
 >    
 > Is anyone else having trouble connecting to IRC2P?  I haven't been   
 >able to connect in days.  No response from the server at all.   
 >   
 >  
  
 What darknetuser said, but also I'll add that a few of us have been seeing
more frequent drops and netsplits than usual over the past week or so. Not
sure if it's i2p at large or just some connectivity with one of the two servers.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099321525</link><pubDate>Mon, 02 Jan 2023 18:03:50 -0000</pubDate><title>Message #2099321525</title><guid isPermaLink="false">2099321525@Uncensored</guid><description><![CDATA[ > 2023-01-02 11:17 from IGnatius T Foobar   
 >    
 > Is anyone else having trouble connecting to IRC2P?  I haven't been   
 >able to connect in days.  No response from the server at all.   
 >   
 >  
  
 So far IRC2P is working fine for me. Maybe try using a different server at
the end of your destination tunnel. irc.echelon.i2p works fine. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099321519</link><pubDate>Mon, 02 Jan 2023 16:23:25 -0000</pubDate><title>Message #2099321519</title><guid isPermaLink="false">2099321519@Uncensored</guid><description><![CDATA[<html><body>

<p>Hmm didn't even know that was such a thing.  Makes sense i guess.</p>
<blockquote>
<div class="message_header"><span>Mon Jan 02 2023 11:17:41 AM EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Is anyone else having trouble connecting to IRC2P? I haven't been able to connect in days. No response from the server at all. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099321515</link><pubDate>Mon, 02 Jan 2023 16:17:41 -0000</pubDate><title>Message #2099321515</title><guid isPermaLink="false">2099321515@Uncensored</guid><description><![CDATA[  
 Is anyone else having trouble connecting to IRC2P?  I haven't been able to
connect in days.  No response from the server at all. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315174</link><pubDate>Thu, 27 Oct 2022 21:18:04 -0000</pubDate><title>Message #2099315174</title><guid isPermaLink="false">2099315174@Uncensored</guid><description><![CDATA[<html><body>

<p>Not sure it truly wastes their time, they enjoy the battle and is entertainment for them. </p>
<p>Now, for people who truly want to make a difference, i agree.</p>
<blockquote>
<div class="message_header"><span>Thu Oct 27 2022 04:17:59 PM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Too many activists waste their time trying to pick people who is not and will never be one of them. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315164</link><pubDate>Thu, 27 Oct 2022 20:17:59 -0000</pubDate><title>Message #2099315164</title><guid isPermaLink="false">2099315164@Uncensored</guid><description><![CDATA[ > 2022-10-26 22:17 from zelgomer         
 > > 2022-10-26 13:17 from IGnatius T Foobar <ajc@citadel.org>           
 > >Ah yes, "if you have nothing to hide, you have nothing to worry      
  
 >about."        
 >         
 > >Until you do, of course.  Information security experts recommend     
     
 > >encrypting everything, regardless of sensitivity.           
 > >           
 >          
 > This is even one step further imo. "I have nothing to hide and I'm    
    
 >afraid the gestapo might think that I do. And by the way I think you're
       
 >being a little hyperbolic to suggest the FBI is our enemy."         
 >         
 >        
        
 That is just the sort of person you stop wasting effort on. I am talking
from experience.       
      
 Trying to teach a pig how to sing wastes your time and annoys the pig. It
is an old proverb. Just don't do it.     
    
 Too many activists
waste their time trying to pick people who is not and will never be one of
them. YOu need to find people who is receptive and discard the others.   
  
 I know it may sound discouraging, but it is better in the long run. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315154</link><pubDate>Thu, 27 Oct 2022 17:07:18 -0000</pubDate><title>Message #2099315154</title><guid isPermaLink="false">2099315154@Uncensored</guid><description><![CDATA[Or perhaps it was always that way. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315146</link><pubDate>Thu, 27 Oct 2022 16:04:29 -0000</pubDate><title>Message #2099315146</title><guid isPermaLink="false">2099315146@Uncensored</guid><description><![CDATA[<html><body>

<p>it was long before that. Just not as overtly </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315098</link><pubDate>Thu, 27 Oct 2022 06:25:03 -0000</pubDate><title>Message #2099315098</title><guid isPermaLink="false">2099315098@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Wed Oct 26 2022 22:17:14 EDT</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;">This is even one step further imo. "I have nothing to hide and I'm afraid the gestapo might think that I do. And by the way I think you're being a little hyperbolic to suggest the FBI is our enemy."</span></blockquote>
</div>
</div>
</blockquote>
<p>How long has it been since the FBI became the enemy of the people?  When did Waco happen?  When did Ruby Ridge happen?</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315087</link><pubDate>Thu, 27 Oct 2022 02:19:39 -0000</pubDate><title>Message #2099315087</title><guid isPermaLink="false">2099315087@Uncensored</guid><description><![CDATA[ > 2022-10-26 22:01 from Nurb432 <nurb432@uncensored.citadel.org>   
 >"we see you purchased a package of meat 10 years ago.. we need to  
 >talk"  
 >  
  
 Yes, exactly. I always bring that angle up, and they do tend to act sympathetic
toward it. They just seem to be incapable of remembering it, because I have
to bring it up again every time. This is exactly the reason I want this. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315086</link><pubDate>Thu, 27 Oct 2022 02:17:14 -0000</pubDate><title>Message #2099315086</title><guid isPermaLink="false">2099315086@Uncensored</guid><description><![CDATA[ > 2022-10-26 13:17 from IGnatius T Foobar <ajc@citadel.org>   
 >Ah yes, "if you have nothing to hide, you have nothing to worry about."
 
 >Until you do, of course.  Information security experts recommend   
 >encrypting everything, regardless of sensitivity.   
 >   
  
 This is even one step further imo. "I have nothing to hide and I'm afraid
the gestapo might think that I do. And by the way I think you're being a little
hyperbolic to suggest the FBI is our enemy." 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099315068</link><pubDate>Wed, 26 Oct 2022 22:01:05 -0000</pubDate><title>Message #2099315068</title><guid isPermaLink="false">2099315068@Uncensored</guid><description><![CDATA[<html><body>

<p>"we see you purchased a package of meat 10 years ago.. we need to talk"</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099314984</link><pubDate>Wed, 26 Oct 2022 13:17:52 -0000</pubDate><title>Message #2099314984</title><guid isPermaLink="false">2099314984@Uncensored</guid><description><![CDATA[Ah yes, "if you have nothing to hide, you have nothing to worry about."  Until
you do, of course.  Information security experts recommend encrypting everything,
regardless of sensitivity. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099314944</link><pubDate>Wed, 26 Oct 2022 02:23:31 -0000</pubDate><title>Message #2099314944</title><guid isPermaLink="false">2099314944@Uncensored</guid><description><![CDATA[I'm losing my shit over this: one of the parties I wanted to convince to start
using an encrypted medium is hesitant because "it makes you look suspicious
and draws the wrong attention." This same person, I frequently have disagreements
with because they DON'T think we live under an authoritarian police state.
Holy fucking shit how can people allow themselves to be so whipped? 
  
 And why do I still talk to this useless moron? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099313879</link><pubDate>Fri, 14 Oct 2022 20:34:04 -0000</pubDate><title>Message #2099313879</title><guid isPermaLink="false">2099313879@Uncensored</guid><description><![CDATA[<html><body>

<p>Right, i wast meaning the federation of some sort, just that it still supports it inside the system, even if its walled off, is good.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099313797</link><pubDate>Thu, 13 Oct 2022 23:19:36 -0000</pubDate><title>Message #2099313797</title><guid isPermaLink="false">2099313797@Uncensored</guid><description><![CDATA[Citadel doesn't support server-to-server because we never got around to implementing
it.  I kind of lost interest in that when it was clear that there'd be no
one else to do server-to-server *with*. 
  
 Someday, maybe. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099313775</link><pubDate>Thu, 13 Oct 2022 21:04:17 -0000</pubDate><title>Message #2099313775</title><guid isPermaLink="false">2099313775@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya, cant have holes in those walls, gotta contain your subjects and feed off them.  I took advantage of the openness between platforms, while it was still there. It was a great thing.  </p>
<p>PS, thanks for still supporting it.. </p>
<blockquote>
<div class="message_header"><span>Thu Oct 13 2022 09:57:03 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>I tried connecting xmpp clients to citadel but found that a lot of <br />clients would not work unless the server offered TLS so I setup a </blockquote>
<br />Needless to say, Citadel handles that just fine now :) <br /><br />XMPP had so much promise when it was going to be *the* instant messenger and you'd be able to reach anyone on any service because they were all going to talk to each other. <br /><br />But then the big services decided not to implement server-to-server, or to drop it if they had it. Eventually, Goolag and Fecesbook dropped XMPP entirely, preferring to restrict users to their walled gardens, because interop is bad for their business. <br /><br />*sigh* </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099313771</link><pubDate>Thu, 13 Oct 2022 20:46:56 -0000</pubDate><title>Message #2099313771</title><guid isPermaLink="false">2099313771@Uncensored</guid><description><![CDATA[ > But then the big services decided not to implement server-to-server,  

 >or to drop it if they had it.  Eventually, Goolag and Fecesbook dropped
 
 >XMPP entirely, preferring to restrict users to their walled gardens,   
 >because interop is bad for their business.   
 >    
 > *sigh*   
 >   
  
 Ah-ha, so that's what happened? I was wondering. I was only vaguely aware
when Jabber started getting somewhat of a following in my social sphere. At
the time I wasn't techno-enlightened enough to see it as anything other than
Yet Another AIM, and since then I've never given it a second look. Thanks
to this thread I started researching it a bit more and only just realized
that I should have been more interested in this all along. I was wondering
why it never took over. Now it makes sense. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099313734</link><pubDate>Thu, 13 Oct 2022 13:57:03 -0000</pubDate><title>Message #2099313734</title><guid isPermaLink="false">2099313734@Uncensored</guid><description><![CDATA[ >I tried connecting xmpp clients to citadel but found that a lot of  
 >clients would not work unless the server offered TLS so I setup a  
  
 Needless to say, Citadel handles that just fine now  :) 
  
 XMPP had so much promise when it was going to be *the* instant messenger
and you'd be able to reach anyone on any service because they were all going
to talk to each other. 
  
 But then the big services decided not to implement server-to-server, or to
drop it if they had it.  Eventually, Goolag and Fecesbook dropped XMPP entirely,
preferring to restrict users to their walled gardens, because interop is bad
for their business. 
  
 *sigh* 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311259</link><pubDate>Wed, 21 Sep 2022 22:31:51 -0000</pubDate><title>Message #2099311259</title><guid isPermaLink="false">2099311259@Uncensored</guid><description><![CDATA[ > 2022-09-20 21:32 from zelgomer         
 >And thanks for all of the responses, by the way. I don't really know   
     
 >quite what I'm looking for, so this is exactly what I wanted - to start
       
 >a discussion and see you guys debate the pros and cons. I got a lot of 
       
 >good tips to consider from this.         
 >         
 >        
        
 Glad to be of help.       
      
 For the record, most people who asks for software solutions like this are
looking for a WhatsApp or Liner replacement. I find both Signal and Telegram
do the trick.     
    
 That said, I am more confident sharing sensitive materials such as ephemeral
passwords over Signal than over Telegram.   
  
 WhatsAPP E2E was based on Signal. They even had the same people do it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311185</link><pubDate>Wed, 21 Sep 2022 01:32:20 -0000</pubDate><title>Message #2099311185</title><guid isPermaLink="false">2099311185@Uncensored</guid><description><![CDATA[And thanks for all of the responses, by the way. I don't really know quite
what I'm looking for, so this is exactly what I wanted - to start a discussion
and see you guys debate the pros and cons. I got a lot of good tips to consider
from this. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311183</link><pubDate>Wed, 21 Sep 2022 01:27:24 -0000</pubDate><title>Message #2099311183</title><guid isPermaLink="false">2099311183@Uncensored</guid><description><![CDATA[ >And from above i dont think he cares about 'market penetration' its  
 >only for family, not finding new friends.  ( at least that is how i  
 >interpreted it )   
  
 I don't know, actually. I think I do care, because I think it'll be easier
to sell if I can convince them it's popular and they can use it to talk to
more than just me. But when I really think about it, I think I'm wrong to
care. 
  
 Whatever my response may have seemed, I really appreciate all of the suggestions
and I've taken them all to heart. I am looking closer at xmpp now as a serious
option. I think this would be the ideal for me. On the other hand, this Silence
thing is really compelling, and more like what I had in mind to start with.
"It's a thing to encrypts our text messages" is a pretty easy pitch. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311164</link><pubDate>Tue, 20 Sep 2022 20:32:04 -0000</pubDate><title>Message #2099311164</title><guid isPermaLink="false">2099311164@Uncensored</guid><description><![CDATA[<html><body>

<p>That is why i suggested he set it up for them.  After that, its zero effort.  ( hell i dont even know my login/pass on most things anymore. id have go to find it in my records )</p>
<p>And from above i dont think he cares about 'market penetration' its only for family, not finding new friends.  ( at least that is how i interpreted it )</p>
<blockquote>
<div class="message_header"><span>Tue Sep 20 2022 01:33:58 PM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />Jabber/XMPP require the users to know their acess credentials. MOst modern users cannot do that anymore. <br /><br />I am not joking. I tried deploying a test Jabber service and it was a massive failure. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311149</link><pubDate>Tue, 20 Sep 2022 17:35:18 -0000</pubDate><title>Message #2099311149</title><guid isPermaLink="false">2099311149@Uncensored</guid><description><![CDATA[ > No, I want to return to my original ask. I have friends who, despite  

 >my protests, use discord, even though they fully acknowledge that it's 
 
 >Big Brother. Now some of them are finally coming around to accepting   
 >that it actually matters, but their answer is to start using SMS more  

 >instead of Discord. I just want to get us on something with encryption.
 
 >Baby steps.   
  
 Fun fact: there is a Signal implementation hich runs on SMS instead of data.
It is called Silence and it is available on F-Droid 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311148</link><pubDate>Tue, 20 Sep 2022 17:33:58 -0000</pubDate><title>Message #2099311148</title><guid isPermaLink="false">2099311148@Uncensored</guid><description><![CDATA[ > 2022-09-15 16:29 from Nurb432     
 >Why not run your own jabber protocol server? If they have to change    
 >anyway and learn new stuff, at least its under your control.     
 >    
 >Or go all out and something like jitsi.       
 >    
    
 Jabber/XMPP require the users to know their acess credentials. MOst modern
users cannot do that anymore.   
  
 I am not joking. I tried deploying a test Jabber service and it was a massive
failure. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311147</link><pubDate>Tue, 20 Sep 2022 17:32:12 -0000</pubDate><title>Message #2099311147</title><guid isPermaLink="false">2099311147@Uncensored</guid><description><![CDATA[ > Anyway, separate topic: I have friends and family who I stay in touch 
     
 >with mostly by SMS. I've been thinking about checking out Signal or    
  
 >Telegram for the E2E encryption.       
 > 1) Have any of you used any of these things? Do you have any       
 >preference, and why?       
 > 2) Also, between these two (or some other option I haven't heard of), 
     
 >do you think I have a high chance of convincing non-technical people to
     
 >adopt?       
 >       
 >      
      
 In short:     
    
 Telegram has a lot more market penetration, and chances are you will find
more of the people you want to talk to in Telegram. People who gets kicked
out of mainstream platforms use Telegram for communicating. Activists use
it, including activist groups I am involved with. The drawback is that their
security model is not great. E2E encryption must be enabled explicitly by
the
user and everything you don't set manually to be secure is only client2server
encrypted. Also their crypto primitives et all are not known for being free
of issues.   
  
 Signal Messenger has close to zero market penetration. The upside is that
developers are more security conscious: the security model is way saner than
Telegrams and compromises are openly talked about - ie. it is known that the
hash space used to conceal which people you talk to from the server has issues,
but it is an openly discussed fact. It is probably less user-friendly and
less flexible than Telegram, but it is still aimed at the digital illiterate
market and I successfully use it to deal with dumb people no issues. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311066</link><pubDate>Mon, 19 Sep 2022 20:27:54 -0000</pubDate><title>Message #2099311066</title><guid isPermaLink="false">2099311066@Uncensored</guid><description><![CDATA[<html><body>

<p>Id think that would be a feature.  Reduce risk if your network is breached.</p>
<blockquote>
<div class="message_header"><span>Mon Sep 19 2022 03:47:34 PM EDT</span> <span>from <a href="do_template?template=user_show?who=nristen">nristen</a> </span></div>
<div class="message_content">
<p><span style="background-color: transparent;"> </span></p>
<p>One of the new areas being worked on with XMPP is authentication including 2FA which concerns me especially around self hosted solutions because this can require connections to 3rd parties.</p>
<p> </p>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311062</link><pubDate>Mon, 19 Sep 2022 19:47:34 -0000</pubDate><title>Message #2099311062</title><guid isPermaLink="false">2099311062@Uncensored</guid><description><![CDATA[<html><body>

<p>About 15 years ago I was first introduced to XMPP/Jabber when my former employer was using it to facilitate communication between SMS and 911 operators.</p>
<p> </p>
<p>Not that long ago, I was looking for the best option for self-hosted im and was very interested to find all of the features being added to XMPP such as OMEMO encryption and voice/video calls.</p>
<p>I tried connecting xmpp clients to citadel but found that a lot of clients would not work unless the server offered TLS so I setup a Prosody server which works really well with low resource utilization.</p>
<p> </p>
<p>One of the new areas being worked on with XMPP is authentication including 2FA which concerns me especially around self hosted solutions because this can require connections to 3rd parties.</p>
<p>Karl</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311039</link><pubDate>Mon, 19 Sep 2022 14:37:02 -0000</pubDate><title>Message #2099311039</title><guid isPermaLink="false">2099311039@Uncensored</guid><description><![CDATA[<html><body>

<p>dammit. keyboard is acting up worse today..  losing characters.  Whomever is capturing my keystrokes, dont keep them too!</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311038</link><pubDate>Mon, 19 Sep 2022 14:35:39 -0000</pubDate><title>Message #2099311038</title><guid isPermaLink="false">2099311038@Uncensored</guid><description><![CDATA[<html><body>

<p>User acceptance is one reason i suggested jiti . if he installs the client for them its brain dead easy to use. It stores your 'rooms' in history on the start screen so after the first time its just a click to get back to famiy.  And it has video chat, which so many people seem to like these days. ( and in my case, i like that i can self-host..)</p>
<p> </p>
<p>but xmpp could be the same, regardless of self-host or not " here, let me set it up.. "</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099311029</link><pubDate>Mon, 19 Sep 2022 13:11:12 -0000</pubDate><title>Message #2099311029</title><guid isPermaLink="false">2099311029@Uncensored</guid><description><![CDATA[The problem is the end users.  They aren't sufficiently motivated to do anything
"difficult".  That's why Discord is the new IRC. 
  
 I can even tell you, unless you can really motivate your group to distrust
authority and to distrust mainstream tech, don't even bother with Citadel.
 Or with Jitsi, or with anything else.  Your problem isn't the software. 
It's the users. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310754</link><pubDate>Fri, 16 Sep 2022 14:45:31 -0000</pubDate><title>Message #2099310754</title><guid isPermaLink="false">2099310754@Uncensored</guid><description><![CDATA[<html><body>

<p>if i didnt want to run it myself, id still go with jabber.   some clients do support end to end..   and i trust those servers more ( like jabber.org ) than the 'social' providers  </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310710</link><pubDate>Fri, 16 Sep 2022 00:15:05 -0000</pubDate><title>Message #2099310710</title><guid isPermaLink="false">2099310710@Uncensored</guid><description><![CDATA[ > 2022-09-15 23:55 from Nurb432 <nurb432@uncensored.citadel.org>   
 >And if you didnt catch the hint. citadel does that :)   
 >  
  
 No, I didn't, and I came back to say after thinking about it, I don't need
to be doing this. After I just said writing software is more of an unhealthy
obsession than a hobby, I need to be reducing my private sysadmin overhead,
not expanding it! 
  
 The whole IM situation sucks. This is why I cling so hard to irc, it's just
become a familiar default. We've had this discussion on irc2p a few times.
Once I start reading about jabber, then I read about how all the cool kids
have moved on to Matrix, and then the next cool thing will be Tox, and it
becomes this endless spiral of reading about different chat protocols and
they all sound great but none of them have good implementations and there's
no chance in hell I'm ever going to get non-tech friends to adopt,
so what's tbe point? 
  
 No, I want to return to my original ask. I have friends who, despite my protests,
use discord, even though they fully acknowledge that it's Big Brother. Now
some of them are finally coming around to accepting that it actually matters,
but their answer is to start using SMS more instead of Discord. I just want
to get us on something with encryption. Baby steps. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310709</link><pubDate>Thu, 15 Sep 2022 23:55:53 -0000</pubDate><title>Message #2099310709</title><guid isPermaLink="false">2099310709@Uncensored</guid><description><![CDATA[<html><body>

<p>And if you didnt catch the hint. citadel does that :) </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310701</link><pubDate>Thu, 15 Sep 2022 22:39:06 -0000</pubDate><title>Message #2099310701</title><guid isPermaLink="false">2099310701@Uncensored</guid><description><![CDATA[ > 2022-09-15 20:29 from Nurb432 <nurb432@uncensored.citadel.org>   
 >Why not run your own jabber protocol server? If they have to change  
 >anyway and learn new stuff, at least its under your control.   
 >  
 >Or go all out and something like jitsi.     
 >  
  
 Hmm..........xmpp has been on my radar of things i should know. Tempting.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310681</link><pubDate>Thu, 15 Sep 2022 20:29:16 -0000</pubDate><title>Message #2099310681</title><guid isPermaLink="false">2099310681@Uncensored</guid><description><![CDATA[<html><body>

<p>Why not run your own jabber protocol server? If they have to change anyway and learn new stuff, at least its under your control.</p>
<p>Or go all out and something like jitsi.   </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310670</link><pubDate>Thu, 15 Sep 2022 19:21:41 -0000</pubDate><title>Message #2099310670</title><guid isPermaLink="false">2099310670@Uncensored</guid><description><![CDATA[ >Lies.  I lost my hobby and hate my job.  
 >  
  
 Man, I can relate to that. I still spend way too much of my free time writing
software, but I don't know if I still enjoy it the same way. I tend to view
it as an unhealthy obsession rather than as a hobby. I really need to get
outside... 
  
 Anyway, separate topic: I have friends and family who I stay in touch with
mostly by SMS. I've been thinking about checking out Signal or Telegram for
the E2E encryption. 
 1) Have any of you used any of these things? Do you have any preference,
and why? 
 2) Also, between these two (or some other option I haven't heard of), do
you think I have a high chance of convincing non-technical people to adopt?

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310276</link><pubDate>Sat, 10 Sep 2022 17:32:36 -0000</pubDate><title>Message #2099310276</title><guid isPermaLink="false">2099310276@Uncensored</guid><description><![CDATA[<html><body>

<p>Only if its FAR away from people.</p>
<p>People drive like idiots.</p>
<blockquote>
<div class="message_header"><span>Sat Sep 10 2022 01:20:44 PM EDT</span> <span>from <a href="do_template?template=user_show?who=LadySerenaKitty">LadySerenaKitty</a> </span></div>
<div class="message_content">
<p><span style="background-color: transparent;"> </span></p>
<p>I also find driving to be relaxing.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310275</link><pubDate>Sat, 10 Sep 2022 17:20:44 -0000</pubDate><title>Message #2099310275</title><guid isPermaLink="false">2099310275@Uncensored</guid><description><![CDATA[<html><body>

<p>Writing software can be relaxing.  It can also make one feel like a dumbass.  To quote myself from FreeBSD Discord:</p>
<p>"I am, despite some brain damage, still managing to be smart and intelligent. I only feel stupid because I am a software developer, and we teach a hunk of metal with literally no brains how to do somewhat intelligent things"</p>
<p>Source: https://discord.com/channels/727023752348434432/727023752348434436/1008935413790036028</p>
<p> </p>
<p>I also find driving to be relaxing.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310268</link><pubDate>Sat, 10 Sep 2022 15:42:51 -0000</pubDate><title>Message #2099310268</title><guid isPermaLink="false">2099310268@Uncensored</guid><description><![CDATA[<html><body>

<p>My problem is i got burnt out some 20 years ago.  "Make your hobby your job and you wont work a day in your life" </p>
<p>Lies.  I lost my hobby and hate my job.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099310263</link><pubDate>Sat, 10 Sep 2022 15:21:55 -0000</pubDate><title>Message #2099310263</title><guid isPermaLink="false">2099310263@Uncensored</guid><description><![CDATA[I don't know about that.  I still love to work on my own software on my own
time (as is obvious, since you're connected to it right now).  I get to do
what I want with it and I don't have anyone telling me to solve the wrong
problems or solve them in the wrong way. 
  
 On occasion I've received comments about "working" when I should be relaxing.
 But all of those times it was just when I brought a laptop along on a trip
or something and was tinkering on my own stuff.  Because sometimes playing
looks exactly like working to someone who doesn't recognize either. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304737</link><pubDate>Mon, 27 Jun 2022 17:24:03 -0000</pubDate><title>Message #2099304737</title><guid isPermaLink="false">2099304737@Uncensored</guid><description><![CDATA[<html><body>

<p>It was more than that for me. i'm an EE by schooling and electronics in general was a hobby. It was fun.</p>
<p>Somewhere around 25 years ago after i hit the wall, i realized that making your hobby you job was a farce. No, its not "you will never work again a day in your life" It was "you will lose your hobby and hate every minute of work"</p>
<p>Sure ill do what is needed, but its not fun anymore. None of it.</p>
<p>The first sign was the "great purge" of all my retro stuff. Then came some 40 years of books and magazines heading out the door...  </p>
<p>Tried so many times to get interested again, just doesn't happen and i end up with a dust collector. Its one reason i got rid of mostly everything. Funny, this week i just asked the guy i gave all my "components" to ( and scope, breadboards, bla bla )  if i could borrow a 1.5k resistor. Need to test a sensor on the jeep. Never dreamed id say those words "borrow a resistor"... </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304733</link><pubDate>Mon, 27 Jun 2022 16:52:35 -0000</pubDate><title>Message #2099304733</title><guid isPermaLink="false">2099304733@Uncensored</guid><description><![CDATA[<html><body>

<blockquote>
<div class="message_content">
<p>I reached that point a long time ago. ( burnout induced ).</p>
</div>
</blockquote>
<p>It usually is, and often it comes on very suddenly, even for people who were previously loving the complexity of their "home data center".</p>
<p>For me it was one late night in 2011 when I ran some update or another and a bunch of stuff broke.  And then my patience ran out all at once.  I deleted Asterisk and went through the house replacing IP phones with regular ones.  I deleted the iptables script on my main server and switched to the firewall built into my home router.  I deleted all of the complex X-10 integration and only used the remotes.</p>
<p>That's another thing.  Smart homes are for chumps.  Just turn the damn light on if you want it on.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304725</link><pubDate>Mon, 27 Jun 2022 16:19:50 -0000</pubDate><title>Message #2099304725</title><guid isPermaLink="false">2099304725@Uncensored</guid><description><![CDATA[<html><body>

<p>I did notice yesterday that PI hole is blocking access to the DHT..  Magnets wont ever return anything, unless i swap out my DNS. ( my external vpn provider swaps in their own dns on the fly )</p>
<p>Must be a rule in there somewhere. But not sure i want to bother finding it since i dont run a DHT search bot anymore. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304724</link><pubDate>Mon, 27 Jun 2022 16:17:08 -0000</pubDate><title>Message #2099304724</title><guid isPermaLink="false">2099304724@Uncensored</guid><description><![CDATA[<html><body>

<p>I reached that point a long time ago. ( burnout induced ).</p>
<p>"sure, i could, but this is good enough"</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304719</link><pubDate>Mon, 27 Jun 2022 15:39:47 -0000</pubDate><title>Message #2099304719</title><guid isPermaLink="false">2099304719@Uncensored</guid><description><![CDATA[<html><body>

<blockquote>
<div class="message_content">
<div class="fmout-JUSTIFY">You disappoint me. As a real datacenter architect you should be using CARP or relayd or HAproxy or whatever and use your second DNS cluster as a failover in case the first one bits the dust XD </div>
</div>
</blockquote>
<p><em></em>I am among the best of them.  But as is so often the case with high level IT people, eventually you get to the point where you just don't want to spend a lot of time being a system administrator at home.  The time I'd have to spend putting together a world-class access network just to serve a family of four just isn't worth the time, the money, or the aggravation.  When I'm not at work I'd rather be spending the time <em>with</em> the family, not fixing their computer problems.</p>
<p>Besides, what's the point of locking it all down when my wife is on Facebook and my son is all over YouTube and my daughter is who-knows-where collecting the dankest memes of the day?</p>
<p>To make things easy <em>and</em> secure for me, I've moved the security perimeter downstream.  My main computer treats the home LAN as an untrusted network.  It has its own access controls and it runs its own DNS server (straight to the root servers, no forwarders).   And finally, I don't need a "home lab" because I have a development region in my data center.</p>
<p>All together, it lets me spend more time in the swimming pool and less time maintaining address pools.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304406</link><pubDate>Tue, 21 Jun 2022 23:27:44 -0000</pubDate><title>Message #2099304406</title><guid isPermaLink="false">2099304406@Uncensored</guid><description><![CDATA[<html><body>

<p>in our shop they will just ignore  you. They are the worst team of people i have ever seen.   They ignore everything asked of them, even request for info on break-ins by our customers..  crickets. "we dont have to tell you what happened, or even that it did, now go away".   They even make secret changes to systems and dont run it thru the CMR process...  A few times its broken things "oh, we rolled back the change" "what change? wtf?"</p>
<p>Hell i have had a ticket in for nearly a week now, i lost Ethernet last week..  Figured they black listed me again. Not even looked at the ticket.</p>
<p>( today it started working again.. but i haven't told them this.. i want to see how long it takes them to get back with me )</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304403</link><pubDate>Tue, 21 Jun 2022 22:34:18 -0000</pubDate><title>Message #2099304403</title><guid isPermaLink="false">2099304403@Uncensored</guid><description><![CDATA[Start reporting that shit as malware. It IS malware. I've reported emails
from IT as phishing before. I knew they were legit, but they broke every rule
in the book - came out of the blue, from someone I've never heard before,
referencing a third part company, and wanted me to click an external link
and enter personal information that HR already has. I report it and they reply
"No this one is legitimate, but thank you, it is always good to be safe!"
like I'm the fucking idiot and not them. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099304400</link><pubDate>Tue, 21 Jun 2022 21:20:36 -0000</pubDate><title>Message #2099304400</title><guid isPermaLink="false">2099304400@Uncensored</guid><description><![CDATA[<html><body>

<p>I guess they are starting to roll out a 'service' on windows boxes that only lets you run whitelisted executables..   And its a long painful process to get one approved that isn't what they consider 'stock'. And i guess they are going to pull admin rights on the desktops too. it *has* to go thru this new thing.</p>
<p>I bet i lose access to fossil rcs</p>
<p> </p>
<p> </p>
<p>Aside from the chaos this will cause, their scanning crap takes 30% CPU ALL DAY LONG ( if you are lucky.. sometimes it more, and sometimes it eats SSDs .. )</p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099303559</link><pubDate>Tue, 14 Jun 2022 06:42:05 -0000</pubDate><title>Message #2099303559</title><guid isPermaLink="false">2099303559@Uncensored</guid><description><![CDATA[ > 2022-06-05 19:08 from Nurb432   
 >in theory 1.1.1.1 is my secondary here, so if my pihole dies, it  
 >should ( should ) go there instead.   
 >  
 >I have not tested that theory, tho i guess it would not be hard.   
 >just turn it off :)  
 >  
  
 In my networks I prefer to set local DNS servers and have things break if
they all go down ratehr than switch to external DNS. It is not like keeping
a good DNS uptime is hard for small networks. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099303558</link><pubDate>Tue, 14 Jun 2022 06:40:06 -0000</pubDate><title>Message #2099303558</title><guid isPermaLink="false">2099303558@Uncensored</guid><description><![CDATA[ > 2022-06-05 19:05 from IGnatius T Foobar   
 > > In the case of DNS you may also run an iterative server and access  

 >the  
 >   
 > >Root DNS services directly with no middle man.       
 >    
 > I did this for a while, and I'll probably do it again.  For added   
 >bonusfest, run your DNS server on a remote network and access that with
 
 >a VPN so that your ISP and any nearby meddlers can't even see your   
 >lookups if they're monitoring the wire.   
 >    
 > The only reason I stopped is because I wasn't comfortable with my   
 >whole household having an outage if my DNS failed.  I did have it set  

 >up so that my DNS server's address was 1.1.1.1 and if it failed it   
 >would revoke the route and use Cloudflare, but the first time it   
 >actually failed the route didn't revoke, so I took it down.   
 >    
 > I suppose I could just only put it on my own computer.  My wife seldom
 
 >makes lookups of any sites other than gmail.com, facebook.com etc. and 
 
 >my kids don't hang out in seedy neighborhoods either.  I on the other  

 >hand am a person of interest.   
 >   
 >  
  
 You disappoint me. As a real datacenter architect you should be using CARP
or relayd or HAproxy or whatever and use your second DNS cluster as a failover
in case the first one bits the dust XD 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099303541</link><pubDate>Tue, 14 Jun 2022 03:12:50 -0000</pubDate><title>Re: Red Chineese Security</title><guid isPermaLink="false">2099303541@Uncensored</guid><description><![CDATA[<html><body>

<p>it seems the WYSE system might be better, it has a wireless base station that hard wires into your network. not sure how its wireless signal is setup or if it has a local hard drive.  i'll have to look into it a bit more.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099303540</link><pubDate>Tue, 14 Jun 2022 03:10:09 -0000</pubDate><title>Re: Red Chineese Security</title><guid isPermaLink="false">2099303540@Uncensored</guid><description><![CDATA[<html><body>

<p>it wanted the email to send a confirmation.  the account on their system is also my email account (different password specific to cloudedge).</p>
<p> </p>
<p>The system works pretty well. it gets whiney about the 50% wifi signal and sends me messages to fix it.  so far no red's out front surveilling me, unless you count the local cops.</p>
<p> </p>
<p>daughter was in and out all day, the battery dropped to 96%.  at that rate i'll recharge in 25 days.</p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099303467</link><pubDate>Mon, 13 Jun 2022 12:47:17 -0000</pubDate><title>Re: Red Chineese Security</title><guid isPermaLink="false">2099303467@Uncensored</guid><description><![CDATA[You didn't login to the app with your email? Maybe the app already knows your
email because of your account on the phone? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099303349</link><pubDate>Sun, 12 Jun 2022 21:37:33 -0000</pubDate><title>Red Chineese Security</title><guid isPermaLink="false">2099303349@Uncensored</guid><description><![CDATA[<html><body>

<p>The chinese army is watching over you to protect you.</p>
<p>I picked up this camera for fun... you know, for experiments.  it's battery powered for $29.</p>
<p>I uses CloudEdge software (chinese army) and syncs up with the camera really fast.</p>
<p>Here is what you provide</p>
<p>email address, gps location of your camera (house), wifi network and password.</p>
<p>The camera detects events, stores images on a sd card.  but notifications come through the app, not your email.</p>
<p>so, im pondering how this system sends me alerts with images and video clips when im 50 miles from home (which it does thru the app)</p>
<p>maybe there is vpn established between a chinese server and the app and the camera posts the events.</p>
<p>no other network setting were needed pairing the camera with the app. </p>
<p> </p>
<p>https://www.amazon.com/dp/B08L3RBF6P</p>
<p><img class="fullscreen" style="margin-top: 10px; margin-left: 63.4267px; height: 488px; width: 496.147px;" src="https://m.media-amazon.com/images/I/61MvUw9Tu6L._AC_SL1500_.jpg" alt="" /></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099302564</link><pubDate>Sun, 05 Jun 2022 23:08:08 -0000</pubDate><title>Message #2099302564</title><guid isPermaLink="false">2099302564@Uncensored</guid><description><![CDATA[<html><body>

<p>in theory 1.1.1.1 is my secondary here, so if my pihole dies, it should ( should ) go there instead.</p>
<p>I have not tested that theory, tho i guess it would not be hard.  just turn it off :)</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099302563</link><pubDate>Sun, 05 Jun 2022 23:05:09 -0000</pubDate><title>Message #2099302563</title><guid isPermaLink="false">2099302563@Uncensored</guid><description><![CDATA[ > In the case of DNS you may also run an iterative server and access the
 
 >Root DNS services directly with no middle man.     
  
 I did this for a while, and I'll probably do it again.  For added bonusfest,
run your DNS server on a remote network and access that with a VPN so that
your ISP and any nearby meddlers can't even see your lookups if they're monitoring
the wire. 
  
 The only reason I stopped is because I wasn't comfortable with my whole household
having an outage if my DNS failed.  I did have it set up so that my DNS server's
address was 1.1.1.1 and if it failed it would revoke the route and use Cloudflare,
but the first time it actually failed the route didn't revoke, so I took it
down. 
  
 I suppose I could just only put it on my own computer.  My wife seldom makes
lookups of any sites other than gmail.com, facebook.com etc. and my kids don't
hang out in seedy neighborhoods either.  I on the other hand am a person of
interest. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099298799</link><pubDate>Mon, 18 Apr 2022 16:17:30 -0000</pubDate><title>Message #2099298799</title><guid isPermaLink="false">2099298799@Uncensored</guid><description><![CDATA[<html><body>

<p>We are OK for DoS attacks and have enough stuff in place to mitigate that ourselves. This move is mostly for authentication reasons. This started when the that java log4j vulnerability came out.  They yanked it off the outside that weekend, and made it only available to internal network, and 'we need to make this use SSO before we put it back online" "but we some how have to support people without accounts too" . Why a current product in 2022 cant support SSO native, i dont understand.    A mix of on/off network, well that is hard to do, safely. i will give them that.  I assume the log4j problem was updated, donno, im not in that group and security team, well they are not forthcoming with information, even to people in their same org..</p>
<p>I guess there were around 10k employees that didnt have network accounts, as they dont need them. Complicating matters with the last minute change to mandate on-network access only. A side from other things, its used for timekeeping, benefits, general HR stuff, including contractor access as it also includes financial modules.. So we will have a 'mix' of users. But from what i hear, they are going to move the 'public' access pieces to a 3rd party system completely and will never go back on the sso requirement.</p>
<p>Rumor too is that if this goes well, ALL internet facing apps will have to use CF..  Even if you already do SSO..</p>
<p> </p>
<p> </p>
<p>And i guess its not a secret of what we use, its SAP's PeopleSoft..  So not some fly night thing that is 30 years old.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099298791</link><pubDate>Mon, 18 Apr 2022 15:52:43 -0000</pubDate><title>Message #2099298791</title><guid isPermaLink="false">2099298791@Uncensored</guid><description><![CDATA[  
 compliance compliance compliance, don't let this become all I do 
  
 BLEEP BLOOP BLEEP I'm going CRAZY!!1 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099298381</link><pubDate>Thu, 14 Apr 2022 23:54:08 -0000</pubDate><title>Message #2099298381</title><guid isPermaLink="false">2099298381@Uncensored</guid><description><![CDATA[ > 2022-04-14 18:30 from Nurb432       
 >I cant give you details ( and even if i could, i probably should not   
  
 >say too much ), but i guess CF offers some sort of service to      
 >'secure' external facing web apps. We are migrating one of our      
 >largest.  I guess once the switch is flipped you access it thru      
 >their 'stuff' which tunnels back to our internal network, i assume     

 >via VPN.       
 >      
 >ya, pretty vague, but i'm not part of the teams involved, nor in      
 >testing..   BUT it seems like a bad plan to me.        
 >      
      
 Yes, I know the drill.     
    
 The have offers for small business in which they set themselves in front
of your websites and services and act as the user facing point, tunneling
the connections of your users into your infrastructure. It is popular with
medium-sized webmasters because they filter most bots, serve
as DDoS mitigators, and make it very difficul for your users to know where
your servers actually are. They also offer TLS acceleration in which they
offer a TLS facing port to the users and then strip the connection and send
you the cleartext, which SUCKS from them and makes them deserving of an horrible
death.   
  
 IRC Masters also use this sort of provider from time to time because they
are a cushion against DDoS. If you have a popular network you either have
a good network in which you can null-route attacks or you hire somebody who
does :( 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099298358</link><pubDate>Thu, 14 Apr 2022 22:30:37 -0000</pubDate><title>Message #2099298358</title><guid isPermaLink="false">2099298358@Uncensored</guid><description><![CDATA[<html><body>

<p>I cant give you details ( and even if i could, i probably should not say too much ), but i guess CF offers some sort of service to 'secure' external facing web apps. We are migrating one of our largest.  I guess once the switch is flipped you access it thru their 'stuff' which tunnels back to our internal network, i assume via VPN.</p>
<p>ya, pretty vague, but i'm not part of the teams involved, nor in testing..   BUT it seems like a bad plan to me. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Thu Apr 14 2022 06:25:59 PM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Cloudflare is a Google-grade threat to privacy at this point. If your ISP is not a very, VERY big one, Cloudflare is more dangerous. <br /><br />They get to see more traffic than anybody else with few exceptions. <br /><br />I personally tunnel my DNS queries to a server I actually own. If you are concerned you can use an encrypted tunnel to an Opennic server, so neither Cloudflare nor your ISP can see what you are doing. Reaching that point you may as well be using Tor, but for the regular Internet it may suffice. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099298354</link><pubDate>Thu, 14 Apr 2022 22:28:10 -0000</pubDate><title>Message #2099298354</title><guid isPermaLink="false">2099298354@Uncensored</guid><description><![CDATA[ > 2022-04-08 11:19 from Nurb432     
 >My personal opinion is that its a wash. Unless you are running on a    
 >semi-anonymous vpn, someone knows, somewhere.     
 >    
 >BUT, i suppose cloud-flare is more disconnected from you than your    
 >local isp.     
 >> Fri Apr 08 2022 09:37:37 AM EDT from zelgomer     
 >>    
 >>  Updated Firefox recently and noticed they now enable    
 >>DNS-over-HTTPS by default. Do I want to leave this enabled? Could you 
  
 >>please share your opinions of it? I'm on the fence. On the one hand,  
 
 >>my ISP can spy on my DNS queries. On the other hand, now Cloudflare   

 >>can spy on my DNS queries. Who is the lesser of the two evils here?   

 >>Is this a further move toward total web centralization?     
 >>    
 >>    
 >>I need to read some good conversation on the subject, preferably    
 >>both sides. I haven't been able to turn up anything helpful
yet in my    
 >>own searches.     
 >>    
 >>     
 >>    
 >>     
    
 In the case of DNS you may also run an iterative server and access the Root
DNS services directly with no middle man.   
  
 You know, what bothers me in all of this is that Firefox is cooperating so
much with the tracking crap. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099298352</link><pubDate>Thu, 14 Apr 2022 22:25:59 -0000</pubDate><title>Message #2099298352</title><guid isPermaLink="false">2099298352@Uncensored</guid><description><![CDATA[ > 2022-04-08 09:37 from zelgomer       
 >Updated Firefox recently and noticed they now enable DNS-over-HTTPS by 
     
 >default. Do I want to leave this enabled? Could you please share your  
    
 >opinions of it? I'm on the fence. On the one hand, my ISP can spy on my
     
 >DNS queries. On the other hand, now Cloudflare can spy on my DNS       
 >queries. Who is the lesser of the two evils here? Is this a further    
  
 >move toward total web centralization?      
 >        
 >        
 > I need to read some good conversation on the subject, preferably both 
     
 >sides. I haven't been able to turn up anything helpful yet in my own   
   
 >searches.       
 >       
 >      
      
 Cloudflare is a Google-grade threat to privacy at this point. If your ISP
is not a very, VERY big one, Cloudflare is more dangerous.     
    
 They get to see more traffic than anybody else with few
exceptions.   
  
 I personally tunnel my DNS queries to a server I actually own. If you are
concerned you can use an encrypted tunnel to an Opennic server, so neither
Cloudflare nor your ISP can see what you are doing. Reaching that point you
may as well be using Tor, but for the regular Internet it may suffice. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099297587</link><pubDate>Fri, 08 Apr 2022 15:19:55 -0000</pubDate><title>Message #2099297587</title><guid isPermaLink="false">2099297587@Uncensored</guid><description><![CDATA[<html><body>

<p>My personal opinion is that its a wash. Unless you are running on a semi-anonymous vpn, someone knows, somewhere.</p>
<p>BUT, i suppose cloud-flare is more disconnected from you than your local isp.</p>
<blockquote>
<div class="message_header"><span>Fri Apr 08 2022 09:37:37 AM EDT</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Updated Firefox recently and noticed they now enable DNS-over-HTTPS by default. Do I want to leave this enabled? Could you please share your opinions of it? I'm on the fence. On the one hand, my ISP can spy on my DNS queries. On the other hand, now Cloudflare can spy on my DNS queries. Who is the lesser of the two evils here? Is this a further move toward total web centralization? <br /><br /><br />I need to read some good conversation on the subject, preferably both sides. I haven't been able to turn up anything helpful yet in my own searches. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099297580</link><pubDate>Fri, 08 Apr 2022 13:37:37 -0000</pubDate><title>Message #2099297580</title><guid isPermaLink="false">2099297580@Uncensored</guid><description><![CDATA[Updated Firefox recently and noticed they now enable DNS-over-HTTPS by default.
Do I want to leave this enabled? Could you please share your opinions of it?
I'm on the fence. On the one hand, my ISP can spy on my DNS queries. On the
other hand, now Cloudflare can spy on my DNS queries. Who is the lesser of
the two evils here? Is this a further move toward total web centralization?
  
  
 I need to read some good conversation on the subject, preferably both sides.
I haven't been able to turn up anything helpful yet in my own searches. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099290143</link><pubDate>Wed, 26 Jan 2022 23:16:51 -0000</pubDate><title>Message #2099290143</title><guid isPermaLink="false">2099290143@Uncensored</guid><description><![CDATA[<html><body>

<p>One drive auto sync is trying to do the same thing. Cant comment much about it yet however. We just started doing that at the office.</p>
<blockquote>
<div class="message_header"><span>Wed Jan 26 2022 02:57:32 PM EST</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">PD is wrong about Exchange. 5.5 is the worst of them all. The one after that was also the worst. After that it went into a bit of a decline. <br /><br />Roaming Profiles was a good idea but they never quite got it right. On a real computer you just remotely mount /home and everything just sort of works the way you expect on every computer involved. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099290105</link><pubDate>Wed, 26 Jan 2022 19:57:32 -0000</pubDate><title>Message #2099290105</title><guid isPermaLink="false">2099290105@Uncensored</guid><description><![CDATA[PD is wrong about Exchange.  5.5 is the worst of them all.  The one after
that was also the worst.  After that it went into a bit of a decline. 
  
 Roaming Profiles was a good idea but they never quite got it right.  On a
real computer you just remotely mount /home and everything just sort of works
the way you expect on every computer involved. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099289903</link><pubDate>Mon, 24 Jan 2022 21:03:36 -0000</pubDate><title>Message #2099289903</title><guid isPermaLink="false">2099289903@Uncensored</guid><description><![CDATA[<html><body>

<p>In principle Roaming Profiles is a good idea.  In practice, not so much.</p>
<blockquote>
<div class="message_header"><span>Mon Jan 24 2022 11:31:49 AM EST</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>Ig is wrong about Exchange. 5.5 was an awesome platform... <br /><br />But Microsoft's print services have sucked all the way back to NT 4. Roaming profiles and remote printers has always been an absolute disaster, and the Spooler causes probably 85% of Desktop support problems industry wide. </p>
<p> </p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099289856</link><pubDate>Mon, 24 Jan 2022 16:31:49 -0000</pubDate><title>Message #2099289856</title><guid isPermaLink="false">2099289856@Uncensored</guid><description><![CDATA[<html><body>

<p>Ig is wrong about Exchange. 5.5 was an awesome platform... <br /><br />But Microsoft's print services have sucked all the way back to NT 4. Roaming profiles and remote printers has always been an absolute disaster, and the Spooler causes probably 85% of Desktop support problems industry wide. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Fri Jan 14 2022 17:59:53 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>oh and the print spooler thing, we took care of that the day it was known. ( it was rather painful.  You had to call a field tech out to add a printer.. )</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099288903</link><pubDate>Fri, 14 Jan 2022 22:59:53 -0000</pubDate><title>Message #2099288903</title><guid isPermaLink="false">2099288903@Uncensored</guid><description><![CDATA[<html><body>

<p>oh and the print spooler thing, we took care of that the day it was known. ( it was rather painful.  You had to call a field tech out to add a printer.. )</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099288882</link><pubDate>Fri, 14 Jan 2022 18:06:31 -0000</pubDate><title>Message #2099288882</title><guid isPermaLink="false">2099288882@Uncensored</guid><description><![CDATA[<html><body>

<p>Interesting. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Jan 11 2022 18:47:43 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>No, not even close. </p>
<p>What i can say it was vulnerabilities built into an application several entities like us were using.  It was inserted by the developing company, they had an insider from china who did it, so it wasn't 'planned' by the company.</p>
<p>It used several general exploits to spread, which were patched by everyone else that got hit. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Jan 11 2022 06:15:52 PM EST</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>You got hit by that ransomware - and if you're a Windows shop, it came in through a print spooler exploit. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Tue Jan 11 2022 14:48:12 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>So that network compromise i talked about a month ago. I guess our security team has just announced " no, we will not be answering any questions and you must cancel the requests from our customers for explanations. " </p>
<p>WTF. we are a freaking public entity. </p>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099288533</link><pubDate>Tue, 11 Jan 2022 23:47:43 -0000</pubDate><title>Message #2099288533</title><guid isPermaLink="false">2099288533@Uncensored</guid><description><![CDATA[<html><body>

<p>No, not even close. </p>
<p>What i can say it was vulnerabilities built into an application several entities like us were using.  It was inserted by the developing company, they had an insider from china who did it, so it wasn't 'planned' by the company.</p>
<p>It used several general exploits to spread, which were patched by everyone else that got hit. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Jan 11 2022 06:15:52 PM EST</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>You got hit by that ransomware - and if you're a Windows shop, it came in through a print spooler exploit. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Tue Jan 11 2022 14:48:12 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>So that network compromise i talked about a month ago. I guess our security team has just announced " no, we will not be answering any questions and you must cancel the requests from our customers for explanations. " </p>
<p>WTF. we are a freaking public entity. </p>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099288529</link><pubDate>Tue, 11 Jan 2022 23:15:52 -0000</pubDate><title>Message #2099288529</title><guid isPermaLink="false">2099288529@Uncensored</guid><description><![CDATA[<html><body>

<p>You got hit by that ransomware - and if you're a Windows shop, it came in through a print spooler exploit. <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Tue Jan 11 2022 14:48:12 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>So that network compromise i talked about a month ago. I guess our security team has just announced " no, we will not be answering any questions and you must cancel the requests from our customers for explanations. " </p>
<p>WTF. we are a freaking public entity. </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099288507</link><pubDate>Tue, 11 Jan 2022 19:48:12 -0000</pubDate><title>Message #2099288507</title><guid isPermaLink="false">2099288507@Uncensored</guid><description><![CDATA[<html><body>

<p>So that network compromise i talked about a month ago. I guess our security team has just announced " no, we will not be answering any questions and you must cancel the requests from our customers for explanations. " </p>
<p>WTF. we are a freaking public entity. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099287562</link><pubDate>Sun, 02 Jan 2022 22:30:44 -0000</pubDate><title>Message #2099287562</title><guid isPermaLink="false">2099287562@Uncensored</guid><description><![CDATA[<html><body>

<p>Several of my bookmarks gave me errors ( i dont get on often so it might have been a while, or last night.. who knows ) but a couple i 're-found' ( like proton mail ) and they were different links, but now worked. </p>
<p>I know that was on the horizon, so i figured that is what happened.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099287560</link><pubDate>Sun, 02 Jan 2022 22:16:17 -0000</pubDate><title>Message #2099287560</title><guid isPermaLink="false">2099287560@Uncensored</guid><description><![CDATA[ > 2022-01-02 07:35 from Nurb432   
 >I have not been keeping up, i assume that tor v2 addresses are now  
 >dead?   
 >  
  
 I don't follow Tor closely, but so do I think. Now you have to use these
monster URLs if you want to access .onion services :) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099287531</link><pubDate>Sun, 02 Jan 2022 12:35:23 -0000</pubDate><title>Message #2099287531</title><guid isPermaLink="false">2099287531@Uncensored</guid><description><![CDATA[<html><body>

<p>I have not been keeping up, i assume that tor v2 addresses are now dead? </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099286358</link><pubDate>Thu, 23 Dec 2021 17:48:56 -0000</pubDate><title>Message #2099286358</title><guid isPermaLink="false">2099286358@Uncensored</guid><description><![CDATA[<html><body>

<p>its sort of a trade-off.  Noting comes free..  </p>
<p>So far, the trade-off to be a google captive works out, for me at least.  Next month, next year? Who knows. But today, its ok.  And i do have that netxcloud install out on my farm ( even got SSL to work so it can do video chat ) and it works well, its tempting, to switch. But, ya, you lose some things that are convenient. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099286351</link><pubDate>Thu, 23 Dec 2021 16:48:16 -0000</pubDate><title>Message #2099286351</title><guid isPermaLink="false">2099286351@Uncensored</guid><description><![CDATA[ >Im sure ill have stones tossed at me, but i would imagine that  
 >google's is 'good enough' if you are going that route.   
  
 It *is* good enough for someone who doesn't care about de-googleing their
computers.  I actually wish I had a password manager right now, because I'm
doing my bookmark syncing with a third party program (xBrowserSync) which
is *really* nice because it works across not only multiple devices but multiple
browsers -- but it doesn't sync passwords. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099286350</link><pubDate>Thu, 23 Dec 2021 16:42:50 -0000</pubDate><title>Re: Log4j</title><guid isPermaLink="false">2099286350@Uncensored</guid><description><![CDATA[ >Subject: Log4j  
 >Great. Another long weekend for a lot of people.   
  
 As is tradition, we have to point out that a logging program being so complex
that it could even be capable of getting exploited like this is ridiculous
-- and it's another example of what we call ... "progress". 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099286333</link><pubDate>Thu, 23 Dec 2021 14:15:51 -0000</pubDate><title>Message #2099286333</title><guid isPermaLink="false">2099286333@Uncensored</guid><description><![CDATA[ > 2021-12-23 00:39 from Nurb432 <nurb432@uncensored.citadel.org>     
 >"There is a vulnerability and we need to force everyone to use VPN to  
 
 >access this server, not the internet"     
 >    
 >"great, lets drop the external DNS record, that will do it"     
 >    
 >      
 >    
 >Really? How stupid can you be?  Some of us had cached DNS and could   

 >still hit it externally.. bit of research and that was ALL they    
 >did.      
 >    
    
 Hold on, you mean to tell me that you can still connect to my server even
if I don't advertise a human readable alias for it? What are you some kind
of hacker??   
  
 Reminds me of the morons who run services with open sockets to the world
but think that they need to firewall ICMP for security. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099286296</link><pubDate>Thu, 23 Dec 2021 00:39:41 -0000</pubDate><title>Message #2099286296</title><guid isPermaLink="false">2099286296@Uncensored</guid><description><![CDATA[<html><body>

<p>"There is a vulnerability and we need to force everyone to use VPN to access this server, not the internet"</p>
<p>"great, lets drop the external DNS record, that will do it"</p>
<p> </p>
<p>Really? How stupid can you be?  Some of us had cached DNS and could still hit it externally.. bit of research and that was ALL they did.  </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285855</link><pubDate>Sat, 18 Dec 2021 12:06:44 -0000</pubDate><title>Message #2099285855</title><guid isPermaLink="false">2099285855@Uncensored</guid><description><![CDATA[ > 2021-12-17 19:03 from zelgomer       
 >Yeah, not a big fan of biometrics. I've also heard it claimed before   
   
 >that in the US you can't be compelled to divulge passwords or PINs     
 
 >because it violates the 5th, but you can be forced to provide       
 >biometrics. Don't know how true that is.       
 >       
 >      
      
 It depends. If they are after information with the intention of incriminating
a third party (which is more usual than people thinks) then you are not covered
by the 5th anyway.     
    
 I had something similar happen to me. The equivalent of the Feds sent me
a non-refusable order to disclose some of my accountability docs because they
suspected it incriminated one of my vendors in a fraud scheme. I happened
to hate that particular vendor with all my guts so I helped them destroy the
motherfucker with a wide smile upon my face.   
  
 However, the only
way not to disclose such docs if you don't want to is to declare they are
incriminating YOU, in which case they can t ask them for you but you turn
yourself into a target. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285854</link><pubDate>Sat, 18 Dec 2021 12:00:49 -0000</pubDate><title>Message #2099285854</title><guid isPermaLink="false">2099285854@Uncensored</guid><description><![CDATA[ > 2021-12-16 19:30 from zelgomer     
 >Anyone have a good password manager recommendation for...less technical
   
 >family members? I have my own way of doing things and never trusted    

 >those things, so I don't have any experience with them. But some recent
   
 >happenings made me realize they have their place.     
 >     
 >    
    
 KeepassX works well. It is what I told my boss to use and so far he is fine
and not complaining.   
  
 For a small number of passwords you could spend 20 bucks and get a hardware
password holder such as a NitroKey. People is usually very good at knowing
their passwords are stored in that USB with a lock logo, but those same users
may fail to understand where their software managed passwords reside. Silly,
heh? But it is how it works. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285826</link><pubDate>Sat, 18 Dec 2021 00:51:52 -0000</pubDate><title>Message #2099285826</title><guid isPermaLink="false">2099285826@Uncensored</guid><description><![CDATA[<html><body>

<p>I believe that is true, but i dont think its been tested at the SCOTUS yet.</p>
<p>And the court can compel you. Once they demand it, you sit in jail in contempt until you do. </p>
<blockquote>
<div class="message_header"><span>Fri Dec 17 2021 07:03:01 PM EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Yeah, not a big fan of biometrics. I've also heard it claimed before that in the US you can't be compelled to divulge passwords or PINs because it violates the 5th, but you can be forced to provide biometrics. Don't know how true that is. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285819</link><pubDate>Sat, 18 Dec 2021 00:03:01 -0000</pubDate><title>Message #2099285819</title><guid isPermaLink="false">2099285819@Uncensored</guid><description><![CDATA[Yeah, not a big fan of biometrics. I've also heard it claimed before that
in the US you can't be compelled to divulge passwords or PINs because it violates
the 5th, but you can be forced to provide biometrics. Don't know how true
that is. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285811</link><pubDate>Fri, 17 Dec 2021 22:40:20 -0000</pubDate><title>Message #2099285811</title><guid isPermaLink="false">2099285811@Uncensored</guid><description><![CDATA[<html><body>

<p>Guy at work got his hand worked on.  They put it in a cast.  The hand he used for finger print scan.  No phone for him now. </p>
<blockquote>
<div class="message_header"><span>Fri Dec 17 2021 12:04:40 AM EST</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>and it will use biometrics - </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285740</link><pubDate>Fri, 17 Dec 2021 05:04:40 -0000</pubDate><title>Message #2099285740</title><guid isPermaLink="false">2099285740@Uncensored</guid><description><![CDATA[<html><body>

<p>Google's is good enough. <br /><br />But, Keypass is also a solid choice, if you want to manage something local. There is an Android version, and it will use biometrics - which makes it far less likely that you'll lose or forget your master password. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Thu Dec 16 2021 19:49:05 EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Im sure ill have stones tossed at me, but i would imagine that google's is 'good enough' if you are going that route. </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285725</link><pubDate>Fri, 17 Dec 2021 00:49:05 -0000</pubDate><title>Message #2099285725</title><guid isPermaLink="false">2099285725@Uncensored</guid><description><![CDATA[<html><body>

<p>Im sure ill have stones tossed at me, but i would imagine that google's is 'good enough' if you are going that route. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285723</link><pubDate>Fri, 17 Dec 2021 00:30:09 -0000</pubDate><title>Message #2099285723</title><guid isPermaLink="false">2099285723@Uncensored</guid><description><![CDATA[Anyone have a good password manager recommendation for...less technical family
members? I have my own way of doing things and never trusted those things,
so I don't have any experience with them. But some recent happenings made
me realize they have their place. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285502</link><pubDate>Wed, 15 Dec 2021 03:55:24 -0000</pubDate><title>Message #2099285502</title><guid isPermaLink="false">2099285502@Uncensored</guid><description><![CDATA[<html><body>

<p>Responding to this shit as an emergency response consultant is awesome. <br /><br />Doing it for the company you work for is misery. <br /><br />It is so strange how that works. It isn't the work I mind, it is being compelled to fix something of MINE that someone else broke that I think makes it bother me. <br /><br /><br /></p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285466</link><pubDate>Tue, 14 Dec 2021 23:10:36 -0000</pubDate><title>Message #2099285466</title><guid isPermaLink="false">2099285466@Uncensored</guid><description><![CDATA[<html><body>

<p>until you shut down several perfectly fine critical servers that effect citizen facing applications and we end up on the news. </p>
<p>The CVE said 2.x  logically, even without reading, 1.x was ok.  </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285406</link><pubDate>Tue, 14 Dec 2021 17:46:05 -0000</pubDate><title>Message #2099285406</title><guid isPermaLink="false">2099285406@Uncensored</guid><description><![CDATA[    
 Yeah, my previous employer is a Java shop, I sent a Facebook message to a
former coworker on Saturday morning saying "seriously, stop what you're doing
right now and patch this, it's that bad."   
  
  
 Under the circumstances, you have to expect some performative security and
knee-jerking and whatnot. Because that's the way people roll when they have
to deal with shit quickly. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285202</link><pubDate>Sun, 12 Dec 2021 15:47:06 -0000</pubDate><title>Re: Log4j</title><guid isPermaLink="false">2099285202@Uncensored</guid><description><![CDATA[<html><body>

<p>Well, seems since our security team does not do research and just knee jerk reaction, they quarantined my PC.  </p>
<p>Took me almost no time at all to determine what was really going on as i read the damned CVE   All they did is search PCs for file with a name of log4j, and didnt bother with what it really was, or what version it was....  No consideration that the real issue was on servers... </p>
<p> </p>
<p>( and course mine is NOT vulnerable. being a desktop, and a 'good' version..   it didnt effect 1.x versions at all.. )</p>
<p> </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099285157</link><pubDate>Sat, 11 Dec 2021 22:30:01 -0000</pubDate><title>Log4j</title><guid isPermaLink="false">2099285157@Uncensored</guid><description><![CDATA[<html><body>

<p>Great. Another long weekend for a lot of people.</p>
<p>Seems its part of crystal reports designer, so im getting bitched at by security. </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099284836</link><pubDate>Thu, 09 Dec 2021 00:00:39 -0000</pubDate><title>Message #2099284836</title><guid isPermaLink="false">2099284836@Uncensored</guid><description><![CDATA[<html><body>

<p>Cant go into much detail until its fully remediated and made public, but got hacked at the office again this weekend.  Several servers had to be unplugged  ( virtually. they were not physical servers )</p>
<p>Today they pulled our PDC out of commission..  all day to rebuild the damage.  i have never unexpectedly lost a PDC on a network i ran and it was always planned, but i thought in the old days this was less painful, but i guess with how security has this setup its not as painless as it was.. ( even involves secret rooms and air-gaping.. things even i had not heard about until today )  And it didnt save it from happening either. so the extra pain was pointless.. </p>
<p>"Contractors working with/for the Chinese government" is the last rumor i heard. So same as last time we got hit. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099284176</link><pubDate>Thu, 02 Dec 2021 15:21:49 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099284176@Uncensored</guid><description><![CDATA[ >Ran across this by random.   Seems interesting. But its not well  
 >known. Any opinions?  https://www.mysterium.network/   
  
 After looking through their glossy website, I'm having trouble understanding
why one wouldn't simply choose to use I2P and/or Tor instead of getting involved
in something new.  This seems like another I2P except with someone trying
to make money on it. 
  
 And of course there' 
 s the usual problem with decentralized networks -- although they are, in
every way, technologically and organizationally superior -- they aren't worth
much until people start using them.  As long as Joe Sixpack remains satisfied
with TikTok and YouTube, the problem remains. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099284175</link><pubDate>Thu, 02 Dec 2021 15:14:35 -0000</pubDate><title>Message #2099284175</title><guid isPermaLink="false">2099284175@Uncensored</guid><description><![CDATA[ > Well, to be fair, I think it is pretty easy today. Everything about my
 
 >experience that wasn't easy was self-inflicted because of my own   
 >neuroticism.   
  
 That's because you used the .deb package, which will eventually go away because
we're not maintaining it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283823</link><pubDate>Mon, 29 Nov 2021 17:07:28 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283823@Uncensored</guid><description><![CDATA[<html><body>

<p>Freenet, tho it seems they have gotten 'pretty' too, at least does explain why they are there upfront. </p>
<blockquote>
<div class="message_header"><span>Mon Nov 29 2021 10:35:00 AM EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span> <span class="message_subject">Subject: Re: mysterium</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">The Tor website used to be much better. Back then the logo was an actual onion, instead of an abstrabt representation of an onion, they explained the core ideas and why it was sueful pretty much in the homepage. <br /><br />The i2pd website at least tries to explain what i2pd and i2p are. It is not super helpful but at least they don't hide behind a shitload of corporate marketing. <br /><br />Same thing with the official java I2P implementation, really. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283821</link><pubDate>Mon, 29 Nov 2021 17:05:57 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283821@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya that is why i came back a few mins later myself and said to ignore it :)</p>
<p>It started out ok, but got bad , quick as i kept reading.  No, i'm not going to be running a *mandatory* out-proxy, or *have* to pay to use another person's proxy.   </p>
<p> </p>
<p>IPFS is still a better idea.</p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Nov 28 2021 08:54:05 AM EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span> <span class="message_subject">Subject: Re: mysterium</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>As soon as I notice the website of a project has been designed by one </blockquote>
<br />
<blockquote>of those UX masturbation morons, I send the project to /dev/null. </blockquote>
<br /><br />Thanks. I did the same thing but I didn't want to come across as rude or stupid. I gave it an honest five minutes trying to figure out what it was. All I learned was that it was an "ecosystem," so I guess it's a bundle of several technologies that they're trying to sell (maybe figuratively or maybe not, I'm not sure) as a package. <br /><br />Five minutes isn't very much time, but it seems like after five minutes I should at least know what I'm getting into. Imagine taking five minutes to read the abstract of a paper and still not knowing what topic the paper is going to cover. <br /><br />Slight tangent, but I got the same sense from Matrix. It looks interesting to me, but it's way too hard to get to the meat. And once I did get to the meat, it looked a little too "webbish" for me. I don't get why everything has to be so over-built. What ever happened to KISS? </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283807</link><pubDate>Mon, 29 Nov 2021 15:35:00 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283807@Uncensored</guid><description><![CDATA[ > 2021-11-28 08:58 from zelgomer       
 >Subject: Re: mysterium      
 > > Five minutes isn't very much time, but it seems like after five     
   
 > >minutes I should at least know what I'm getting into. Imagine taking 
     
 >      
 > >five minutes to read the abstract of a paper and still not knowing   
   
 >what      
 >       
 > >topic the paper is going to cover.           
 >        
 > Also I2P and TOR aren't innocent of this, either. I've revisited both 
     
 >websites recently and thought, if I didn't already know what these     
 
 >things were, how in the hell would I learn about them from these       
 >websites?? I get that they don't want to be intimidating to       
 >non-technical people, but there has to be some middle-ground. These are
     
 >highly-tecnical subjects. It shouldn't be so hard for me to get past   
   
 >the sock puppet explanation.       
 >  
    
 >      
      
 The Tor website used to be much better. Back then the logo was an actual
onion, instead of an abstrabt representation of an onion, they explained the
core ideas and why it was sueful pretty much in the homepage.     
    
 The i2pd website at least tries to explain what i2pd and i2p are. It is not
super helpful but at least they don't hide behind a shitload of corporate
marketing.   
  
 Same thing with the official java I2P implementation, really. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283806</link><pubDate>Mon, 29 Nov 2021 15:30:06 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283806@Uncensored</guid><description><![CDATA[ > Slight tangent, but I got the same sense from Matrix. It looks     
 >interesting to me, but it's way too hard to get to the meat. And once I
   
 >did get to the meat, it looked a little too "webbish" for me. I don't  
  
 >get why everything has to be so over-built. What ever happened to KISS?
   
 >    
    
 KISS turned into a Linux distribution called KISS Linux. Try it out, and
you will either love it or fall down to your knees, tearing your clothes appart
and crying at so much nerdiness crammed within the same tarball.   
  
 As for Matrix, as far as I know it is just a fancy way of bridging communitation
protocols which are unrelated together, so you can have all your IRC, XMPP
and the like in the same place. I am not a big fan of the idea, and it is
web centric, but you could do much worse :) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283711</link><pubDate>Sun, 28 Nov 2021 13:58:31 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283711@Uncensored</guid><description><![CDATA[ > Five minutes isn't very much time, but it seems like after five   
 >minutes I should at least know what I'm getting into. Imagine taking   
 >five minutes to read the abstract of a paper and still not knowing what
 
 >topic the paper is going to cover.     
  
 Also I2P and TOR aren't innocent of this, either. I've revisited both websites
recently and thought, if I didn't already know what these things were, how
in the hell would I learn about them from these websites?? I get that they
don't want to be intimidating to non-technical people, but there has to be
some middle-ground. These are highly-tecnical subjects. It shouldn't be so
hard for me to get past the sock puppet explanation. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283709</link><pubDate>Sun, 28 Nov 2021 13:54:05 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283709@Uncensored</guid><description><![CDATA[ > As soon as I notice the website of a project has been designed by one 
     
 >of those UX masturbation morons, I send the project to /dev/null.      
    
      
 Thanks. I did the same thing but I didn't want to come across as rude or
stupid. I gave it an honest five minutes trying to figure out what it was.
All I learned was that it was an "ecosystem," so I guess it's a bundle of
several technologies that they're trying to sell (maybe figuratively or maybe
not, I'm not sure) as a package.     
    
 Five minutes isn't very much time, but it seems like after five minutes I
should at least know what I'm getting into. Imagine taking five minutes to
read the abstract of a paper and still not knowing what topic the paper is
going to cover.   
  
 Slight tangent, but I got the same sense from Matrix. It looks interesting
to me, but it's way too hard to get to the meat. And once I did get
to the meat, it looked a little too "webbish" for me. I don't get why everything
has to be so over-built. What ever happened to KISS? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283690</link><pubDate>Sun, 28 Nov 2021 10:42:30 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283690@Uncensored</guid><description><![CDATA[ > 2021-11-27 11:33 from Nurb432       
 >Subject: Re: mysterium      
 >Actually, reading more, not a fan. Just ignore this :)       
 >> Sat Nov 27 2021 08:27:55 AM EST from Nurb432  Subject: mysterium     

 >>      
 >>        
 >>      
 >>Ran across this by random.   Seems interesting. But its not well    
 
 >>known. Any opinions?  https://www.mysterium.network/       
 >>      
      
 As soon as I notice the website of a project has been designed by one of
those UX masturbation morons, I send the project to /dev/null.     
    
 It is fine if the site is fancy, but if it is so fancy you have to wade through
10 TB of graphics to find a description of  1) what the product is 2) how
the product works, then it is not worth my time.   
  
 This is specially bad with some security products whose website is aimed
at managers. "SecurityNetOfDeath will make your network secure! Engage
more customers! Comply with GDPR! Buy now!" But you are not given a single
explanation of how they do all those things. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283651</link><pubDate>Sat, 27 Nov 2021 16:33:36 -0000</pubDate><title>Re: mysterium</title><guid isPermaLink="false">2099283651@Uncensored</guid><description><![CDATA[<html><body>

<p>Actually, reading more, not a fan. Just ignore this :)</p>
<blockquote>
<div class="message_header"><span>Sat Nov 27 2021 08:27:55 AM EST</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span> <span class="message_subject">Subject: mysterium</span></div>
<div class="message_content">
<p>Ran across this by random.   Seems interesting. But its not well known. Any opinions?  <a href="https://www.mysterium.network/" target="webcit01">https://www.mysterium.network/</a></p>
<p> </p>
<p>Seems a bit like the interplanetary file system project, but on a blockchain instead of DHT.</p>
<p> </p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283644</link><pubDate>Sat, 27 Nov 2021 13:27:55 -0000</pubDate><title>mysterium</title><guid isPermaLink="false">2099283644@Uncensored</guid><description><![CDATA[<html><body>

<p>Ran across this by random.   Seems interesting. But its not well known. Any opinions?  https://www.mysterium.network/</p>
<p> </p>
<p>Seems a bit like the interplanetary file system project, but on a blockchain instead of DHT.</p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099283155</link><pubDate>Tue, 23 Nov 2021 02:31:51 -0000</pubDate><title>Message #2099283155</title><guid isPermaLink="false">2099283155@Uncensored</guid><description><![CDATA[<html><body>

<p>Agreed. The Citadel *is* the easy part - and it has improved since I forced it to run on a Pi 3B+. Tremendously. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Fri Nov 19 2021 14:42:38 EST</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>The next thing we have to figure out is how to make this kind of thing </blockquote>
<br />
<blockquote>*easy*. </blockquote>
<br />Well, to be fair, I think it is pretty easy today. Everything about my experience that wasn't easy was self-inflicted because of my own neuroticism. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099282897</link><pubDate>Fri, 19 Nov 2021 19:42:38 -0000</pubDate><title>Message #2099282897</title><guid isPermaLink="false">2099282897@Uncensored</guid><description><![CDATA[ > The next thing we have to figure out is how to make this kind of thing
 
 >*easy*.   
  
 Well, to be fair, I think it is pretty easy today. Everything about my experience
that wasn't easy was self-inflicted because of my own neuroticism. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099282847</link><pubDate>Fri, 19 Nov 2021 13:45:32 -0000</pubDate><title>Message #2099282847</title><guid isPermaLink="false">2099282847@Uncensored</guid><description><![CDATA[You don't have to worry about the Citadel client.  What's published is what
you're running.  If I tried any funny business it would be outed pretty quickly.
 The next thing we have to figure out is how to make this kind of thing *easy*.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099282442</link><pubDate>Mon, 15 Nov 2021 15:51:19 -0000</pubDate><title>Message #2099282442</title><guid isPermaLink="false">2099282442@Uncensored</guid><description><![CDATA[ > 2021-11-13 18:07 from zelgomer     
 >And don't try sneaking any crazy connections into the client, because  
  
 >it's also running in a network namespace where any other traffic is    

 >routed through tor.     
 > I should have put it in a container but I already have too many OSes  
  
 >to keep up with. So I guess you could spy on my filesystem. Please     
 >don't do that.     
 >     
 >    
    
 Add pledged() and unveil() support to the client (wehich is trivial to do),
then run the client in OpenBSD - and the client will be magically sandboxed.
  
  
 YOu won't see SELinuxes and AppArmors the same way after trying this. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099282441</link><pubDate>Mon, 15 Nov 2021 15:49:23 -0000</pubDate><title>Message #2099282441</title><guid isPermaLink="false">2099282441@Uncensored</guid><description><![CDATA[ > 2021-11-13 17:22 from zelgomer     
 >Finally took a day to make my i2p connection to uncensored a little    

 >more convenient. Now my gateway VM has its own bbs@ user which launches
   
 >the citadel client, so I can ssh to it from any machine and it acts as 
   
 >an i2p bouncer. I think I am happy with this for now.     
 >     
 >    
    
 That sounds awesome.   
  
 I should move my lazy ass and do the same, but my hobby servers are a bit
low priority at this point. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099282309</link><pubDate>Sat, 13 Nov 2021 23:07:06 -0000</pubDate><title>Message #2099282309</title><guid isPermaLink="false">2099282309@Uncensored</guid><description><![CDATA[And don't try sneaking any crazy connections into the client, because it's
also running in a network namespace where any other traffic is routed through
tor. 
 I should have put it in a container but I already have too many OSes to keep
up with. So I guess you could spy on my filesystem. Please don't do that.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099282304</link><pubDate>Sat, 13 Nov 2021 22:22:58 -0000</pubDate><title>Message #2099282304</title><guid isPermaLink="false">2099282304@Uncensored</guid><description><![CDATA[Finally took a day to make my i2p connection to uncensored a little more convenient.
Now my gateway VM has its own bbs@ user which launches the citadel client,
so I can ssh to it from any machine and it acts as an i2p bouncer. I think
I am happy with this for now. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099281573</link><pubDate>Thu, 04 Nov 2021 23:30:52 -0000</pubDate><title>Message #2099281573</title><guid isPermaLink="false">2099281573@Uncensored</guid><description><![CDATA[No worries, and I hope you come out the other side in better shape.   
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099281314</link><pubDate>Tue, 02 Nov 2021 09:07:49 -0000</pubDate><title>Message #2099281314</title><guid isPermaLink="false">2099281314@Uncensored</guid><description><![CDATA[ > 2021-10-25 11:36 from IGnatius T Foobar     
 > > The best way of beating latency in this case would be for people to 
   
 >    
 > >download the already existing Citadel client tunnel its connection   
   
 > >through a tunnel to              
 > >        
 > > Uncensored, but that may be a bit too cumbersome.       
 >      
 >      
 > And that's exactly what we've settled on.     
 >      
 > Telnet tunnel:      
 >d77ompkdxbd6fq6mfxba2ulx46r37jlncvyy5fmvbmhqf4hlmgjq.b32.i2p     
 > Client tunnel:      
 >czesg4qmyrkbybkngoldpcv2ndem4lwo5y2f4paf6e377es43oga.b32.i2p     
 >      
 > zelgomer said that using a dedicated Citadel client is working well.  
   
 >darknetuser, you should try it too.  If there is continued success then
   
 >perhaps I will see about publishing some sort of standalone trustworthy
   
 >build of the client for this purpose.     
 >     
 >    
    
 I will
give it a try when I can.   
  
 Right now I am pretty pushed up against it for personal reasons and I don't
even have a personal computer with which to test your awesome stuff. This,
incidentally, it si the reason why you are hearing so little from me as of
late. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280866</link><pubDate>Wed, 27 Oct 2021 17:22:26 -0000</pubDate><title>Message #2099280866</title><guid isPermaLink="false">2099280866@Uncensored</guid><description><![CDATA[I'm not even comfortable with our IT department having admin-level access
to my laptop, but I have to deal with it.  I really wish they'd go full VDI
so we wouldn't have to deal with it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280863</link><pubDate>Wed, 27 Oct 2021 16:16:39 -0000</pubDate><title>Message #2099280863</title><guid isPermaLink="false">2099280863@Uncensored</guid><description><![CDATA[ >The US vendor used Chinese contractors, and yes, they added backdoors  
 >it turns out.   
 >  
 >You would think in this day and age, we would be smarter than this.   
  
 This is why at my office we're increasingly careful about approving dependencies.

  
 But then somebody in HR wants to use an HRaaS package (like Rippling) that
wants admin-level access to all our employee laptops, in the name of automation
and security. No thanks. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280810</link><pubDate>Wed, 27 Oct 2021 00:34:24 -0000</pubDate><title>Message #2099280810</title><guid isPermaLink="false">2099280810@Uncensored</guid><description><![CDATA[<html><body>

<p>Cant go into a lot of detail ( partially i dont know, and what i do know i cant say much beyond that it happened, which is public info.. )  But apparently our health agency got one of their major DBs hacked last week with a huge data leak. Turns out its a commercial package that most, it not all state health department uses across the country.  Several other states got hacked about the same time or just before us.</p>
<p>The US vendor used Chinese contractors, and yes, they added backdoors it turns out.</p>
<p>You would think in this day and age, we would be smarter than this.</p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280679</link><pubDate>Mon, 25 Oct 2021 16:59:27 -0000</pubDate><title>Message #2099280679</title><guid isPermaLink="false">2099280679@Uncensored</guid><description><![CDATA[<html><body>

<p>I know its a bit OT, but that is how my Jetsons run.  They boot off SD then flip root over to whatever huge device i have attached to them ( be it usb, m.2, sata, whatever, all depends on what the carrier board supports )</p>
<p>Gives me more/faster storage, saves the SD from all those writes, and its a real pain in the neck to change booting on these things since they are all 'dev' SOMs and not 'production' SOMs that have built in eMMC.</p>
<blockquote>
<div class="message_header"><span>Mon Oct 25 2021 11:32:01 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">This is like something I did about six years ago when I needed a quick NAS to store offsite backups. I built it on a Raspberry Pi 1B+ and then moved the root partition to a USB-attached hard disk, leaving only /boot on the SD card. It ran that way for about three years before I got a bigger machine and didn't need it anymore. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280675</link><pubDate>Mon, 25 Oct 2021 15:36:47 -0000</pubDate><title>Message #2099280675</title><guid isPermaLink="false">2099280675@Uncensored</guid><description><![CDATA[ > The best way of beating latency in this case would be for people to   
 >download the already existing Citadel client tunnel its connection   
 >through a tunnel to          
 >    
 > Uncensored, but that may be a bit too cumbersome.   
  
  
 And that's exactly what we've settled on. 
  
 Telnet tunnel:  d77ompkdxbd6fq6mfxba2ulx46r37jlncvyy5fmvbmhqf4hlmgjq.b32.i2p

 Client tunnel:  czesg4qmyrkbybkngoldpcv2ndem4lwo5y2f4paf6e377es43oga.b32.i2p

  
 zelgomer said that using a dedicated Citadel client is working well.  darknetuser,
you should try it too.  If there is continued success then perhaps I will
see about publishing some sort of standalone trustworthy build of the client
for this purpose. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280674</link><pubDate>Mon, 25 Oct 2021 15:32:01 -0000</pubDate><title>Message #2099280674</title><guid isPermaLink="false">2099280674@Uncensored</guid><description><![CDATA[ > I recommend PiCore for raspberries. They operate without commiting   
 >data to the SD card so you can have them running for ages without   
 >wasting the card. Just ensure you commit the data to either the card or
 
  
  I considered redeploying with a layered filesystem for just that reason.
 In the end I simply ditched the SD Card completely and I'm running it on
an old 2.5" laptop HDD connected to the USB port.  Even at USB 2.0 speed it's
faster than an SD Card, and I don't have to worry about destroying it with
too many writes. 
  
  This is like something I did about six years ago when I needed a quick NAS
to store offsite backups.  I built it on a Raspberry Pi 1B+ and then moved
the root partition to a USB-attached hard disk, leaving only /boot on the
SD card.  It ran that way for about three years before I got a bigger machine
and didn't need it anymore. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280659</link><pubDate>Mon, 25 Oct 2021 12:32:11 -0000</pubDate><title>Message #2099280659</title><guid isPermaLink="false">2099280659@Uncensored</guid><description><![CDATA[<html><body>

<p>I guess like everything. Once the 'unwashed masses' get in, it all goes to hell and stoops to a new level of "stoopid".</p>
<blockquote>
<div class="message_header"><span>Mon Oct 25 2021 06:11:26 AM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Your average i2p user is more savvy than your average end user. Back in the days when there were popular XMPP servers inside I2P, people just configured their tunnels and joined up. Now everybody seems to be in IRC. Or torrenting movies. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280645</link><pubDate>Mon, 25 Oct 2021 10:24:54 -0000</pubDate><title>Message #2099280645</title><guid isPermaLink="false">2099280645@Uncensored</guid><description><![CDATA[ > 2021-10-19 18:14 from IGnatius T Foobar   
 >Right.  The client really is designed to help mitigate that, by sending
 
 >and receiving blocks of data at a time instead of individual   
 >characters.  When I get my router up and running again I'll open a   
 >second server tunnel that goes directly to the server port.  Then   
 >anyone who is willing to trust the client (or compile it themselves)   
 >can point at it.  I'll also see if we can make use of the router's   
 >built-in SOCKS proxy -- maybe that will eliminate the need for users to
 
 >manually configure a client tunnel.   
 >   
 >  
  
 The SOCKS proxy is a bit of a last ditch ressource and the devs don't recommend
it. It is very easy for users to leak information using it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280644</link><pubDate>Mon, 25 Oct 2021 10:23:21 -0000</pubDate><title>Message #2099280644</title><guid isPermaLink="false">2099280644@Uncensored</guid><description><![CDATA[ > 2021-10-19 15:23 from zelgomer         
 >Okay, that explains why I'm not able to connect via I2P anymore. I     
   
 >thought it was something on my end because I had rejiggered my tunnel  
      
 >so that I could connect to it a little differently.         
 > I will say that--as you might expect--it was painfully slow. Worse    
    
 >than connecting with ssh over TOR. I don't think that I2P is really    
    
 >designed for real-time interactive protocols like this. Not sure if the
       
 >user experience can be made to be any more tolerable without a client  
      
 >of some kind.         
 >         
 >        
        
 There are ways of playing around latency.       
      
 Standard tunnels can be configured to serve interactive applications (in
fact they have a quick option for that somewhere). I have done a lot of SSHing
to i2p servers, and it is usable (not pleasant,
but usable).     
    
 The best way of beating latency in this case would be for people to download
the already existing Citadel client tunnel its connection through a tunnel
to    
  
 Uncensored, but that may be a bit too cumbersome. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280643</link><pubDate>Mon, 25 Oct 2021 10:17:57 -0000</pubDate><title>Message #2099280643</title><guid isPermaLink="false">2099280643@Uncensored</guid><description><![CDATA[ > 2021-10-19 10:01 from IGnatius T Foobar   
 >    
 >   
 >FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU-----
 
 >--------------   
 >    
 > After a good solid week of operation and my I2P router getting well   
 >established enough to carry over 1000 tunnels during normal   
 >operation...   
 >    
 > MY FUCKING SD CARD SHIT THE BED.   
 >    
 > It's only been in operation for a week so I don't even have the keys  

 >backed up yet.   
 >   
 >  
  
 I recommend PiCore for raspberries. They operate without commiting data to
the SD card so you can have them running for ages without wasting the card.
Just ensure you commit the data to either the card or somewhere else every
now and then so you don't have to restart from zero if there is a blackout.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280642</link><pubDate>Mon, 25 Oct 2021 10:16:15 -0000</pubDate><title>Message #2099280642</title><guid isPermaLink="false">2099280642@Uncensored</guid><description><![CDATA[ > 2021-10-18 23:16 from IGnatius T Foobar       
 >Ah, ok ... I was wondering how there could be sites featured in the    
  
 >router's main page if there's no DNS.  It appears that my address book 
     
 >is "subscribed" to http://i2p-projekt.i2p/hosts.txt       
 >        
 > I wonder how hard it is to get into that list.  I'd like to be on it  
     
 >:)       
      
    
 It is not trivial to get in the official list.   
  
 The way you get a service started is by registering to a jump service. Try
zzz's, since zzz is a core dev of the whole thing. If the service proves itself
stable and makes a strong commitment to provide darknet services it will be
eventually included in the host list distributed with the i2p router, and
probably featured as a service worth visitting in the routerE starting page.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280641</link><pubDate>Mon, 25 Oct 2021 10:11:26 -0000</pubDate><title>Message #2099280641</title><guid isPermaLink="false">2099280641@Uncensored</guid><description><![CDATA[ > Text based interface makes a lot of sense.  My concern there is that  

 >people will have to manually configure client tunnels in their I2P   
 >routers to use it.  "Build a client tunnel on your router with these   
 >parameters, then telnet to it" sounds like something high-maintenance, 
 
 >unless I2P users can be counted upon to be savvy enough to do that?   
 >    
  
 Your average i2p user is more savvy than your average end user. Back in the
days when there were popular XMPP servers inside I2P, people just configured
their tunnels and joined up. Now everybody seems to be in IRC. Or torrenting
movies. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280566</link><pubDate>Sat, 23 Oct 2021 19:49:23 -0000</pubDate><title>Message #2099280566</title><guid isPermaLink="false">2099280566@Uncensored</guid><description><![CDATA[I use Debian. I didn't realize citadel was in the apt repos. I'm now connected
using the citadel client over I2P. It appears to work fine! And since the
delay isn't every keypress, it is so much more tolerable. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280442</link><pubDate>Fri, 22 Oct 2021 03:15:30 -0000</pubDate><title>Message #2099280442</title><guid isPermaLink="false">2099280442@Uncensored</guid><description><![CDATA[Feh.  Didn't work, and I don't know how it ever worked since there's no provision
for having name lookups performed on the socks server side. 
  
 I've opened up another server tunnel: 
 [ czesg4qmyrkbybkngoldpcv2ndem4lwo5y2f4paf6e377es43oga.b32.i2p ] 
  
 This one will take you to port 504 on Uncensored's citadel server.  So if
you have Citadel client software installed on your machine, you can create
a client tunnel on your I2P router, and point your client at it.  Give it
a try. 
  
 If there's enough interest I can eventually build I2CP directly into the
protocol so you don't have to configure a client tunnel, but there would need
to be an audience larger than just the two people I know about now  :) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280395</link><pubDate>Thu, 21 Oct 2021 19:51:46 -0000</pubDate><title>Message #2099280395</title><guid isPermaLink="false">2099280395@Uncensored</guid><description><![CDATA[What operating system are you using?  I might be able to offer some suggestions
about using the I2P SOCKS proxy instead of explicitly requiring a client tunnel
configured on your router.  I'll be trying that out myself to see if we can
document some good options for people who are just getting started. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280394</link><pubDate>Thu, 21 Oct 2021 19:11:00 -0000</pubDate><title>Message #2099280394</title><guid isPermaLink="false">2099280394@Uncensored</guid><description><![CDATA[It works again. On the other hand, my setup for connecting to it is not so
good. I need to rethink how I'm doing some things here... and probably my
whole life, in general. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280368</link><pubDate>Thu, 21 Oct 2021 13:39:19 -0000</pubDate><title>Message #2099280368</title><guid isPermaLink="false">2099280368@Uncensored</guid><description><![CDATA[Ok, the router is up again, this time using a real spinning disk instead of
an SD card as its root volume.  My config backup held, so everything should
be as it was before.  Give it a try. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280227</link><pubDate>Tue, 19 Oct 2021 22:14:09 -0000</pubDate><title>Message #2099280227</title><guid isPermaLink="false">2099280227@Uncensored</guid><description><![CDATA[Right.  The client really is designed to help mitigate that, by sending and
receiving blocks of data at a time instead of individual characters.  When
I get my router up and running again I'll open a second server tunnel that
goes directly to the server port.  Then anyone who is willing to trust the
client (or compile it themselves) can point at it.  I'll also see if we can
make use of the router's built-in SOCKS proxy -- maybe that will eliminate
the need for users to manually configure a client tunnel. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280213</link><pubDate>Tue, 19 Oct 2021 19:23:04 -0000</pubDate><title>Message #2099280213</title><guid isPermaLink="false">2099280213@Uncensored</guid><description><![CDATA[Okay, that explains why I'm not able to connect via I2P anymore. I thought
it was something on my end because I had rejiggered my tunnel so that I could
connect to it a little differently. 
 I will say that--as you might expect--it was painfully slow. Worse than connecting
with ssh over TOR. I don't think that I2P is really designed for real-time
interactive protocols like this. Not sure if the user experience can be made
to be any more tolerable without a client of some kind. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280203</link><pubDate>Tue, 19 Oct 2021 16:22:35 -0000</pubDate><title>Message #2099280203</title><guid isPermaLink="false">2099280203@Uncensored</guid><description><![CDATA[<html><body>

<p>That sucks, man. Sorry. I ran a Citadel on a Pi for over a year and never had a problem - but... solid state data usually doesn't just *slowly* die... <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Tue Oct 19 2021 10:59:19 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />*exhale* <br /><br />Ok, I managed to save /var/lib/i2p/i2p-config from the SD card. This rescues the keys and configurations while I get the machine rebuilt. Pi 3 can boot from USB so I'm going to use a real hard disk this time. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280199</link><pubDate>Tue, 19 Oct 2021 14:59:19 -0000</pubDate><title>Message #2099280199</title><guid isPermaLink="false">2099280199@Uncensored</guid><description><![CDATA[  
 *exhale* 
  
 Ok, I managed to save /var/lib/i2p/i2p-config from the SD card.  This rescues
the keys and configurations while I get the machine rebuilt.  Pi 3 can boot
from USB so I'm going to use a real hard disk this time. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280189</link><pubDate>Tue, 19 Oct 2021 14:01:13 -0000</pubDate><title>Message #2099280189</title><guid isPermaLink="false">2099280189@Uncensored</guid><description><![CDATA[  
 FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU-------------------

  
 After a good solid week of operation and my I2P router getting well established
enough to carry over 1000 tunnels during normal operation... 
  
 MY FUCKING SD CARD SHIT THE BED. 
  
 It's only been in operation for a week so I don't even have the keys backed
up yet. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280154</link><pubDate>Tue, 19 Oct 2021 03:28:34 -0000</pubDate><title>Message #2099280154</title><guid isPermaLink="false">2099280154@Uncensored</guid><description><![CDATA[<html><body>

<p>I stopped playing around with I2P... can't even remember how I had it set up now. Think it was on the Rpi 400. I'll look into it. It sounds like it is complicated to get connected to Uncensored via I2P, though - I mean, beyond the normal level of complication? </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Oct 18 2021 23:16:01 EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Ah, ok ... I was wondering how there could be sites featured in the router's main page if there's no DNS. It appears that my address book is "subscribed" to <a href="http://i2p-projekt.i2p/hosts.txt" target="webcit01">http://i2p-projekt.i2p/hosts.txt</a> <br /><br />I wonder how hard it is to get into that list. I'd like to be on it :) <br /><br />In the mean time, please keep using Uncensored via the I2P connection if you can. I'm relying on you guys to supply me with information on how well it's working. I don <br />'t consider my own experience to be valid since I'm on the same router that's providing the service. <br /><br />We have to make a determination about how much testing is required before we can feel confident making big announcements to the I2P community. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280153</link><pubDate>Tue, 19 Oct 2021 03:16:01 -0000</pubDate><title>Message #2099280153</title><guid isPermaLink="false">2099280153@Uncensored</guid><description><![CDATA[Ah, ok ... I was wondering how there could be sites featured in the router's
main page if there's no DNS.  It appears that my address book is "subscribed"
to http://i2p-projekt.i2p/hosts.txt 
  
 I wonder how hard it is to get into that list.  I'd like to be on it  :)

  
 In the mean time, please keep using Uncensored via the I2P connection if
you can.  I'm relying on you guys to supply me with information on how well
it's working.  I don 
 't consider my own experience to be valid since I'm on the same router that's
providing the service. 
  
 We have to make a determination about how much testing is required before
we can feel confident making big announcements to the I2P community. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280051</link><pubDate>Sun, 17 Oct 2021 23:24:00 -0000</pubDate><title>Message #2099280051</title><guid isPermaLink="false">2099280051@Uncensored</guid><description><![CDATA[ > Excellent.  Now if I am able to get this service into the address     
 >book, will the     
 >"d77ompkdxbd6fq6mfxba2ulx46r37jlncvyy5fmvbmhqf4hlmgjq.b32.i2p" name    

 >still work, or do I have to re-key it or something?  That will decide  
  
 >whether we can start socializing it or if I have to get everything into
   
 >its final state first.     
    
 Disclaimer: I've never operated an I2P service, so someone else may have
more and better details or tips, but this is how I understand it.   
 There is no "the" address book, rather every I2P router has its own address
book. Imagine if there were no DNS, and everybody managed their own /etc/hosts.
I think the reason for this is because the I2P developers view a centralized
DNS-like system as a juicy target for potentially compromising the whole thing,
so instead the address book is sort of a more a distributed solution.   
 So what you
do is share your b32 address with people who you think may be interested in
the service, and then your users can add it to their own address books.  

 For eepsites, there are jump services available. I think the Java router
comes with a few configured by default. These are eepsites where you register
your b32 and a name with it, and then if the router fails an address lookup,
it defers the request to one of the jump services. If that succeeds, then
it prompts you to add the address to your own address book so that next time
it doesn't have to go to the jump service. It's sort of a roundabout DNS specifically
for eepsites, but I guess it's slightly more secure because it's only used
the first time you access an address that's not already in your address book.
But anyway, I don't think that helps you much if you're not serving an eepsite.
  
 Honestly, I tend not to add anything to my address
book simply because I haven't settled on a setup yet and so I keep reinstalling
the OS and the router periodically, and it all gets blown away, anyway.  

  
 So in conclusion, no, I don't think you should re-key or anything. In fact,
once you start distributing your b32 and have users connecting to it, you
should probably take care to be sure it never changes. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280046</link><pubDate>Sun, 17 Oct 2021 22:05:32 -0000</pubDate><title>Message #2099280046</title><guid isPermaLink="false">2099280046@Uncensored</guid><description><![CDATA[<html><body>

<p>A lot of us are patiently waiting for that :) </p>
<blockquote>
<div class="message_header"><span>Sun Oct 17 2021 05:55:44 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">And I can't afford another side quest -- webcit-ng has waited too long :) </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280044</link><pubDate>Sun, 17 Oct 2021 21:55:44 -0000</pubDate><title>Message #2099280044</title><guid isPermaLink="false">2099280044@Uncensored</guid><description><![CDATA[ > Hello, coming to you via i2p!   
  
 Excellent.  Now if I am able to get this service into the address book, will
the "d77ompkdxbd6fq6mfxba2ulx46r37jlncvyy5fmvbmhqf4hlmgjq.b32.i2p" name still
work, or do I have to re-key it or something?  That will decide whether we
can start socializing it or if I have to get everything into its final state
first. 
  
 I want it to be *easy* but not at the expense of doing things that would
turn off people in the community.  For example, I could build native I2CP
into the client and server, but I suspect people would not trust a pre-built
client. 
  
 And I can't afford another side quest -- webcit-ng has waited too long :)

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280027</link><pubDate>Sun, 17 Oct 2021 15:57:51 -0000</pubDate><title>Message #2099280027</title><guid isPermaLink="false">2099280027@Uncensored</guid><description><![CDATA[<html><body>

<p>Cool, saves me the trouble. i was about ready to start setting I2P up again. Been busy cleaning all morning. </p>
<blockquote>
<div class="message_header"><span>Sun Oct 17 2021 11:55:56 AM EDT</span> <span>from <a href="do_template?template=user_show?who=zelgomer">zelgomer</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Hello, coming to you via i2p! <br />Yes, setup was exactly as you described. I created a new tunnel, pointed it to that address, and then connected with telnet, worked on first attempt. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099280026</link><pubDate>Sun, 17 Oct 2021 15:55:56 -0000</pubDate><title>Message #2099280026</title><guid isPermaLink="false">2099280026@Uncensored</guid><description><![CDATA[ > 2021-10-16 19:04 from IGnatius T Foobar   
 >    
 > Ok, if you have I2P then try this:   
 >    
 > d77ompkdxbd6fq6mfxba2ulx46r37jlncvyy5fmvbmhqf4hlmgjq.b32.i2p   
 >    
 > That's the text-based interface, so I guess you have to build a client
 
 >tunnel to that, and then telnet to the client tunnel port on your   
 >router?   
 >   
 >  
  
 Hello, coming to you via i2p! 
 Yes, setup was exactly as you described. I created a new tunnel, pointed
it to that address, and then connected with telnet, worked on first attempt.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279988</link><pubDate>Sat, 16 Oct 2021 23:53:39 -0000</pubDate><title>Message #2099279988</title><guid isPermaLink="false">2099279988@Uncensored</guid><description><![CDATA[<html><body>

<p>that would be my understanding ( only used web on it before, that is mostly magic, just proxy settings in the browser ).</p>
<p>Ill give it a try myself tomorow. Tho im sure someone else will beat me to iit</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279984</link><pubDate>Sat, 16 Oct 2021 23:04:04 -0000</pubDate><title>Message #2099279984</title><guid isPermaLink="false">2099279984@Uncensored</guid><description><![CDATA[  
 Ok, if you have I2P then try this: 
  
 d77ompkdxbd6fq6mfxba2ulx46r37jlncvyy5fmvbmhqf4hlmgjq.b32.i2p 
  
 That's the text-based interface, so I guess you have to build a client tunnel
to that, and then telnet to the client tunnel port on your router? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279971</link><pubDate>Sat, 16 Oct 2021 18:26:26 -0000</pubDate><title>Message #2099279971</title><guid isPermaLink="false">2099279971@Uncensored</guid><description><![CDATA[<html><body>

<p>Didn't realize it was using JS ( not paying attention enough i guess )</p>
<p>So, ya, its a non-starter for darknet.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279970</link><pubDate>Sat, 16 Oct 2021 18:25:09 -0000</pubDate><title>Message #2099279970</title><guid isPermaLink="false">2099279970@Uncensored</guid><description><![CDATA[ >Agreed on JS being frowned upon on any dark-network, but i do think  
 >most ( not all, just most ) people these days prefer HTML over TTY.   
  
 Yeah, that's my concern.  WebCit requires JavaScript, and that's not going
to change unless Uncensored and Citadel become so amazingly popular on the
darknet that it makes sense to write a dedicated version. 
  
 Text based interface makes a lot of sense.  My concern there is that people
will have to manually configure client tunnels in their I2P routers to use
it.  "Build a client tunnel on your router with these parameters, then telnet
to it" sounds like something high-maintenance, unless I2P users can be counted
upon to be savvy enough to do that? 
  
 I think what we have to offer here would be very attractive to the I2P community.
 I just want to present it in the most sensible way. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279855</link><pubDate>Fri, 15 Oct 2021 13:02:39 -0000</pubDate><title>Message #2099279855</title><guid isPermaLink="false">2099279855@Uncensored</guid><description><![CDATA[<html><body>

<p>Ah Gopher.  And Archie.. and UUCP, and usenet... The good old days before the net was ruined by too much commercialism and communism ( not that kind, the kind where 'commoners' flood the gates ). Back when <span style="color: #181818; font-family: Merriweather, Georgia, serif; font-size: 14px;">men were real men, women were real women and small furry creatures from Alpha Centauri were real small furry creatures from Alpha Centauri.</span></p>
<p>And i still used my AtariST</p>
<p>.</p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279851</link><pubDate>Fri, 15 Oct 2021 12:33:55 -0000</pubDate><title>Message #2099279851</title><guid isPermaLink="false">2099279851@Uncensored</guid><description><![CDATA[ > In order to use gopher in I2P you'd first need to write a gopher   
 >client which is i2p aware. You can't get a transparent gopher   
 >experience using standard tunnels.   
  
 Ah, that's right. I recall seeing a conversation about that now in #i2p once.
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279834</link><pubDate>Fri, 15 Oct 2021 08:27:41 -0000</pubDate><title>Message #2099279834</title><guid isPermaLink="false">2099279834@Uncensored</guid><description><![CDATA[ > 2021-10-14 17:25 from zelgomer   
 >I would generally prefer TTY except for a) I'd be hesitant to install a
 
 >new client that isn't something already widely in use (e.g., ssh, irc  

 >clients, etc.), and b) I simply haven't come across many TTY-based   
 >services on the darknet, so I'm just used to connecting with a browser.
 
 >At risk of exposing myself as a young'n, I only just recently   
 >discovered gopher. I'm not sure if there are any gopher-based eepsites 
 
 >out there, but if there were, I would support it.   
 >   
 >  
  
 In order to use gopher in I2P you'd first need to write a gopher client which
is i2p aware. You can't get a transparent gopher experience using standard
tunnels. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279794</link><pubDate>Thu, 14 Oct 2021 21:25:32 -0000</pubDate><title>Message #2099279794</title><guid isPermaLink="false">2099279794@Uncensored</guid><description><![CDATA[I would generally prefer TTY except for a) I'd be hesitant to install a new
client that isn't something already widely in use (e.g., ssh, irc clients,
etc.), and b) I simply haven't come across many TTY-based services on the
darknet, so I'm just used to connecting with a browser. 
At risk of exposing myself as a young'n, I only just recently discovered gopher.
I'm not sure if there are any gopher-based eepsites out there, but if there
were, I would support it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279783</link><pubDate>Thu, 14 Oct 2021 18:55:57 -0000</pubDate><title>Message #2099279783</title><guid isPermaLink="false">2099279783@Uncensored</guid><description><![CDATA[<html><body>

<p>Agreed on JS being frowned upon on any dark-network, but i do think most ( not all, just most ) people these days prefer HTML over TTY. </p>
<blockquote>
<div class="message_header"><span>Thu Oct 14 2021 11:38:04 AM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="background-color: transparent; color: navy;">Eepsites are ok as long as they don't require javascript. If they require javascript they will shunned and mocked and distristed and pissed on.</span></blockquote>
<br />IMO a text based interface is a better fit. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279766</link><pubDate>Thu, 14 Oct 2021 15:39:25 -0000</pubDate><title>Message #2099279766</title><guid isPermaLink="false">2099279766@Uncensored</guid><description><![CDATA[ > 2021-10-13 18:06 from IGnatius T Foobar   
 >I intend to offer both ... the problem seems to be that a service name 
 
 >(such as uncensored.i2p if it is available) can only point to a single 
 
 >port, if I understand correctly?   
 >   
 >  
  
 Yes, but you can register uncensored.i2p and ssh.uncensored.i2p (for example)
each pointing to a different port. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279765</link><pubDate>Thu, 14 Oct 2021 15:38:04 -0000</pubDate><title>Message #2099279765</title><guid isPermaLink="false">2099279765@Uncensored</guid><description><![CDATA[ > 2021-10-12 17:41 from IGnatius T Foobar     
 >Good.  I'm playing around as a user for a little while before I attempt
   
 >to deploy services again.  The router will continue to run at home     
 >because the nature of I2P means it can run pretty much anywhere, and I 
   
 >can just send the connections to the server's actual location over an  
  
 >encrypted tunnel.     
 >      
 > Would the typical I2P user be more attracted to a text-based service, 
   
 >or to webcit running as an eepsite?     
 >     
 >    
    
 Eepsites are ok as long as they don't require javascript. If they require
javascript they will shunned and mocked and distristed and pissed on.   
  
 IMO a text based interface is a better fit. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279763</link><pubDate>Thu, 14 Oct 2021 15:36:12 -0000</pubDate><title>Message #2099279763</title><guid isPermaLink="false">2099279763@Uncensored</guid><description><![CDATA[ > For starters I'll describe my setup and you can tell me if it's     
 >acceptable.     
 >      
    
 So far it sounds right to me.   
  
 I used to run a setup like that but instead of a secude VLAN etc etc I used
either IPSEC or SSH with port redirections (depending on the case). The original
I2P implementation was intended to run as you are doing, with an I2P node
somewhere in the network and the clients connecting to it as needed. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279718</link><pubDate>Wed, 13 Oct 2021 23:14:22 -0000</pubDate><title>Message #2099279718</title><guid isPermaLink="false">2099279718@Uncensored</guid><description><![CDATA[<html><body>

<p>Ya. 1:1, just like TOR.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279713</link><pubDate>Wed, 13 Oct 2021 22:06:38 -0000</pubDate><title>Message #2099279713</title><guid isPermaLink="false">2099279713@Uncensored</guid><description><![CDATA[I intend to offer both ... the problem seems to be that a service name (such
as uncensored.i2p if it is available) can only point to a single port, if
I understand correctly? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279646</link><pubDate>Tue, 12 Oct 2021 22:36:34 -0000</pubDate><title>Message #2099279646</title><guid isPermaLink="false">2099279646@Uncensored</guid><description><![CDATA[<html><body>

<p>I think it would be a mix.  Most people are used to web interface, but if you are REALLY hard core paranoid, text removes the browser leakage from the equation.</p>
<p>I guess if you had to choose, id go with web.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279641</link><pubDate>Tue, 12 Oct 2021 21:41:39 -0000</pubDate><title>Message #2099279641</title><guid isPermaLink="false">2099279641@Uncensored</guid><description><![CDATA[Good.  I'm playing around as a user for a little while before I attempt to
deploy services again.  The router will continue to run at home because the
nature of I2P means it can run pretty much anywhere, and I can just send the
connections to the server's actual location over an encrypted tunnel. 
  
 Would the typical I2P user be more attracted to a text-based service, or
to webcit running as an eepsite? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279625</link><pubDate>Tue, 12 Oct 2021 15:46:57 -0000</pubDate><title>Message #2099279625</title><guid isPermaLink="false">2099279625@Uncensored</guid><description><![CDATA[<html><body>

<p>This isn't too different from how I run I2P.  Just for the fun/learning experience of it, my setup is sort of a home-grown whonix.  I have a VM where I run I2P and TOR with two NICs: one faces the rest of my LAN and has WAN access, and the other one is connected to a virtual bridge.  Then I launch a second VM whose only NIC is connected to the virtual bridge, and he is served DHCP from the first VM which acts as his gateway.  I've exposed a select few I2P services to the "workstation" VM, and then any other traffic from that VM is routed through TOR.</p>
<p>Effectively the same situation, except no Raspberry Pis or VLANs.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279514</link><pubDate>Sun, 10 Oct 2021 22:14:49 -0000</pubDate><title>Message #2099279514</title><guid isPermaLink="false">2099279514@Uncensored</guid><description><![CDATA[<html><body>

<p>I always ran my apps on the same machine, but no reason that wont work.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099279513</link><pubDate>Sun, 10 Oct 2021 22:08:59 -0000</pubDate><title>Message #2099279513</title><guid isPermaLink="false">2099279513@Uncensored</guid><description><![CDATA[  
 This weekend I am making another attempt at installing I2P on my network.
 This time I'm going to try to live with it as a user for a while before I
publish Uncensored as an I2P "destination".  I know we have several I2P users
on here so I'd like to solicit your opinions and tap into your knowledge if
you'd care to indulge me. 
  
 For starters I'll describe my setup and you can tell me if it's acceptable.

  
 This time around I am not running the I2P router on my desktop, and I am
not running "purple" I2P.  I have the mainline Java router installed on a
Raspberry Pi 3B+ running 64-bit Ubuntu on a dedicated services VLAN in my
network (i.e. NOT the one the home wireless network hands out).  I've exposed
the main I2P tunnel service port to the outside world on TCP and UDP just
like the instructions say to do. 
  
 Since the router is not running on the same computer as the one I will
use to access it, I went into the service configuration files and changed
each service (router console, proxy service, mail/irc/etc. service) to listen
on all interfaces instead of just the loopback.  Yes, I know that this means
anyone who can hit those ports can access the services, but as I said above,
it is on a dedicated secure VLAN. 
  
 On my desktop -- which I want to be able to reboot from time to time without
disrupting the tunnels -- I will configure all of my client software to point
to the address of the machine running the router. 
  
 So far so good? 
  
 At this point the Pi seems to have enough gusto to do this job.  I was only
using it to test ARM builds of Citadel, and it's still going to do that, but
that's hardly a 24/7 job  :) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099276062</link><pubDate>Tue, 31 Aug 2021 12:45:37 -0000</pubDate><title>Message #2099276062</title><guid isPermaLink="false">2099276062@Uncensored</guid><description><![CDATA[ > A former user of this BBS, Ford II, worked in finance for a while.    

 >This job (not sure if there was more than one, in the financial sector,
   
 >for him; I haven't been in touch lately) went rather badly for him.    

    
 If I go back far enough in my email history, I might still have this long
and email saved where he sounded rather upset... ugh.   
  
  
 Not fun. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099276060</link><pubDate>Tue, 31 Aug 2021 12:44:29 -0000</pubDate><title>Message #2099276060</title><guid isPermaLink="false">2099276060@Uncensored</guid><description><![CDATA[  
 I wanted no part of the financial-sector rat race. Was very much aware of
the "work you to the bone" part; that and they cannot accept failure because
financial software is so mission critical. 
  
 So I chose to work in slightly less stressful sectors, get a paycheck that
allowed me to pursue my interests, and still made an OK amount of money. Not
looking back. 
  
 A former user of this BBS, Ford II, worked in finance for a while. This job
(not sure if there was more than one, in the financial sector, for him; I
haven't been in touch lately) went rather badly for him. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275951</link><pubDate>Mon, 30 Aug 2021 00:07:42 -0000</pubDate><title>Message #2099275951</title><guid isPermaLink="false">2099275951@Uncensored</guid><description><![CDATA[<html><body>

<p>if i had not made mistake #2 in my life and stayed with EDS back in 1990, id have been in that sort of boat. I would have a a butt-ton of money, and retired at 40.</p>
<p>But nooooooo i was a freaking dumbass kid and couldn't see that far down the road.  </p>
<blockquote>
<div class="message_header"><span>Sun Aug 29 2021 07:31:34 PM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Here in New York if you are young and uncommitted and have decent IT talent, the thing to do is work IT for a financial firm. Big, small, or in between, doesn't matter. They work you to the bone and pay you stupidly good money. <br />Most people who go this route burn out in about ten years. So if you're smart enough, you do the ten years and invest the money properly, then you can settle down and get married and have a really good financial base while working a more sustainable career. <br /><br />It wasn't my path, as I already had a fiancee and a job offer waiting for me when I graduated. But it would have been interesting. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275949</link><pubDate>Sun, 29 Aug 2021 23:31:34 -0000</pubDate><title>Message #2099275949</title><guid isPermaLink="false">2099275949@Uncensored</guid><description><![CDATA[Here in New York if you are young and uncommitted and have decent IT talent,
the thing to do is work IT for a financial firm.  Big, small, or in between,
doesn't matter.  They work you to the bone and pay you stupidly good money.
 Most people who go this route burn out in about ten years.  So if you're
smart enough, you do the ten years and invest the money properly, then you
can settle down and get married and have a really good financial base while
working a more sustainable career. 
  
 It wasn't my path, as I already had a fiancee and a job offer waiting for
me when I graduated.  But it would have been interesting. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275762</link><pubDate>Fri, 27 Aug 2021 15:17:49 -0000</pubDate><title>Message #2099275762</title><guid isPermaLink="false">2099275762@Uncensored</guid><description><![CDATA[<html><body>

<p>I mean, there was significant risk in our movie to Ohio - and we ultimately lost $100k on that move. But in the long run, because of that choice, we came out far ahead. For now. <br /><br />It doesn't mean to just rush in way over your head and start swinging blindly hoping to get lucky, though. You use some strategy and planning and carefully put it all on the line.<br /><br />I don't think you risk "losing it all" - either. You risk "ending up where you started." <br /><br />Like most adages or idioms - people twist it to justify *bad* decisions. The corollary to "The bigger the risk, the bigger the reward is," <br /><br />The more you put on the table, the more likely you are to lose it. </p>
<p><br /><br /></p>
<blockquote>
<div class="message_header"><span>Thu Aug 26 2021 16:51:01 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>I have heard it more than once, if you dont take chances of losing it all, with no safety net you will never really make it big. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Thu Aug 26 2021 12:18:42 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p><br />No balls, no glory. </p>
<p> </p>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275697</link><pubDate>Thu, 26 Aug 2021 20:51:01 -0000</pubDate><title>Message #2099275697</title><guid isPermaLink="false">2099275697@Uncensored</guid><description><![CDATA[<html><body>

<p>I have heard it more than once, if you dont take chances of losing it all, with no safety net you will never really make it big. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Thu Aug 26 2021 12:18:42 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p><br />No balls, no glory. </p>
<p> </p>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275668</link><pubDate>Thu, 26 Aug 2021 16:18:42 -0000</pubDate><title>Message #2099275668</title><guid isPermaLink="false">2099275668@Uncensored</guid><description><![CDATA[<html><body>

<p>On the other hand, I could have launched a successful business on the coat-tails of a guy who ended up owning a Hilton property, among a lot of other things. <br /><br />No balls, no glory. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Wed Aug 25 2021 19:29:26 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>Yes, this has burnt me more than once, and not just career. And yes, i also did not learn and would be doomed to repeat.</p>
<p>I did some really stupid things when i was young, and i got lucky.  Since then the 'safe' path has been my choice.</p>
<blockquote>
<div class="message_header"><span>Wed Aug 25 2021 07:06:20 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p> I went for a more conservative career path with less risk and less reward. I'd probably do the same again, if I were back in the exact same situation today. </p>
<blockquote>
<div class="message_content"> </div>
</blockquote>
</div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275587</link><pubDate>Wed, 25 Aug 2021 23:29:26 -0000</pubDate><title>Message #2099275587</title><guid isPermaLink="false">2099275587@Uncensored</guid><description><![CDATA[<html><body>

<p>Yes, this has burnt me more than once, and not just career. And yes, i also did not learn and would be doomed to repeat.</p>
<p>I did some really stupid things when i was young, and i got lucky.  Since then the 'safe' path has been my choice.</p>
<blockquote>
<div class="message_header"><span>Wed Aug 25 2021 07:06:20 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p> I went for a more conservative career path with less risk and less reward. I'd probably do the same again, if I were back in the exact same situation today. </p>
<blockquote>
<div class="message_content"> </div>
</blockquote>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275585</link><pubDate>Wed, 25 Aug 2021 23:06:20 -0000</pubDate><title>Message #2099275585</title><guid isPermaLink="false">2099275585@Uncensored</guid><description><![CDATA[<html><body>

<p>Sacramento Restauranteur "Randy Paragary" recently passed away at 71. <br /><br />In my early 20s, he was just starting his restaurant empire. He had Paragary's, Cafe Bernardo, and was opening up a Mexican themed place called El Centro. He was the first wave of San Francisco cuisine putting Sacramento on the Foody map as a city with world class city night life. <br /><br />And he came to me to get him cheap computers for his places. Anyhow, I ended this trip in his downtown Hilton hotel property. <br /><br />But back then, on opening night of El Centro, things went WAY off the rails and their system ended up fucked. His manager threatened to ruin me. He was pissed at me. <br /><br />I backed out on doing business with him. After he cooled off, he came back to me and said that he over-reacted - his manager over-reacted - they wanted to keep doing business with me. I told him, "You're a big fish in a real rough ocean, and I'm a guppy in a bowl on a shelf. It isn't safe for me to do business with you." 
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Aug 24 2021 17:40:02 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>I passed up a Linux/security gig once out in Colorado   3x my current salary.   The 'it guy' was a good friend of mine and they were branching out into Linux and away from windows, for cost/security/performance. This was late 90s.</p>
<p>I didnt want to move, and liked where i was at.  The move, after it was all done, i didnt even need to be there often. Short sighted on my part.  Remote in for management, hire a monkey to rack new servers.  Fly in when things dont work right, and to check in on things.</p>
<p>They were making so much money they could not spend it all.  They were a streaming service, that did on-site filming of their product.    I guess he had to go on-set often while they were filming, and help with tech issues with cameras and stuff.  Took a toll on him, and couple of years later he 'found god' and left. Would have left me as IT director with endless budget.  Would not have bothered me in the slightest, i kick myself for not taking him up on the offer.</p>
<p>No, it was not Netflix, and you can can guess what industry it was. Not for everone, but it was legal.</p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275446</link><pubDate>Tue, 24 Aug 2021 21:40:02 -0000</pubDate><title>Message #2099275446</title><guid isPermaLink="false">2099275446@Uncensored</guid><description><![CDATA[<html><body>

<p>I passed up a Linux/security gig once out in Colorado   3x my current salary.   The 'it guy' was a good friend of mine and they were branching out into Linux and away from windows, for cost/security/performance. This was late 90s.</p>
<p>I didnt want to move, and liked where i was at.  The move, after it was all done, i didnt even need to be there often. Short sighted on my part.  Remote in for management, hire a monkey to rack new servers.  Fly in when things dont work right, and to check in on things.</p>
<p>They were making so much money they could not spend it all.  They were a streaming service, that did on-site filming of their product.    I guess he had to go on-set often while they were filming, and help with tech issues with cameras and stuff.  Took a toll on him, and couple of years later he 'found god' and left. Would have left me as IT director with endless budget.  Would not have bothered me in the slightest, i kick myself for not taking him up on the offer.</p>
<p>No, it was not Netflix, and you can can guess what industry it was. Not for everone, but it was legal.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275332</link><pubDate>Tue, 24 Aug 2021 06:52:12 -0000</pubDate><title>Message #2099275332</title><guid isPermaLink="false">2099275332@Uncensored</guid><description><![CDATA[<html><body>

<p>So speaking of security... <br /><br />I did a 6 day gig, several 12-13 hour days, minimum 8 hours/day pay baseline IT Crisis Mitigation gig last week in Northern California. <br /><br />My boss here in Arizona used it as an opportunity to fire me despite our agreement at the start that I needed a very flexible, part time gig. <br /><br />I made more in an hour than I make in a day at his job. I've paid off my car until Feb of 2022 and have enough left over to make the payments again each month through that period. <br /><br />It was an opportunity to make nearly $2000 a day, helping out a person I am professional friends with, who needed someone he could trust, in my home stomping grounds, with all expenses paid, meals and 5 star hotel rooms, upgraded mid-sized rental car, San Jose, Santa Cruz, Stockton, Vacaville, Sacramento... Business class airfare there and back and the opportunity to see my friends and family over the weekend and eat at places I love that aren't anywhere else but where I grew up
<p> </p>
<p>So, large corporations don't really do any better I guess. Maybe the thing to do is to be the outside consultant and only work once everything blows up and there are interesting and engaging things to do and it means long, hard hours getting them done on a tight schedule. I suppose there is a lot less stability - but regular IT work gets me biting my own neck. </p>
<p><br />And all outsourcing does it shift it to someone outside of your organization. The cost still gets passed on, the failures and breaches still happen - the outside specialists get called in, the work backs up, the business flow is disrupted just the same. <br /><br />You're just paying someone else outside of your company to handle it and make it FEEL more transparent. They've still got to make enough to cover those inevitable scenarios - so it is built in to your upfront costs. </p>
<p> </p>
<p><br /><br /></p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275256</link><pubDate>Mon, 23 Aug 2021 12:07:16 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099275256@Uncensored</guid><description><![CDATA[<html><body>

<p>No. </p>
<blockquote>
<div class="message_header"><span>Mon Aug 23 2021 04:15:25 AM EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span> <span class="message_subject">Subject: Re: Pegasus</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">Does that mean that if you are a masochist, you get to tie people to a post and flail them while telling them they have been bad and deserve a punishment? </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275240</link><pubDate>Mon, 23 Aug 2021 08:15:25 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099275240@Uncensored</guid><description><![CDATA[ > 2021-08-21 17:42 from Nurb432   
 >Subject: Re: Pegasus  
 >Agreed, but some of us dont need a deity to be moral. Just treat  
 >people as you want to be treated. Its how i live my life. ( but dont  
 >want to go too far down that path in this room.   im trying to be  
 >good :) )    
  
 Does that mean that if you are a masochist, you get to tie people to a post
and flail them while telling them they have been bad and deserve a punishment?

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275159</link><pubDate>Sun, 22 Aug 2021 04:46:19 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099275159@Uncensored</guid><description><![CDATA[<html><body>

<p>thanks,  i've read all the old posts...</p>
<p> </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sat Aug 21 2021 05:42:49 PM EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span> <span class="message_subject">Subject: Re: Pegasus</span></div>
<div class="message_content">
<p>Agreed, but some of us dont need a deity to be moral. Just treat people as you want to be treated. Its how i live my life. ( but dont want to go too far down that path in this room.   im trying to be good :) ) </p>
<blockquote>
<div class="message_header"><span>Sat Aug 21 2021 11:20:08 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span> <span class="message_subject">Subject: Re: Pegasus</span></div>
<div class="message_content">
<blockquote>
<div class="message_content">
<p><span style="background-color: transparent; color: navy;">Without morality, everything is permitted.</span></p>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275117</link><pubDate>Sat, 21 Aug 2021 21:42:49 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099275117@Uncensored</guid><description><![CDATA[<html><body>

<p>Agreed, but some of us dont need a deity to be moral. Just treat people as you want to be treated. Its how i live my life. ( but dont want to go too far down that path in this room.   im trying to be good :) ) </p>
<blockquote>
<div class="message_header"><span>Sat Aug 21 2021 11:20:08 AM EDT</span> <span>from <a href="do_template?template=user_show?who=IGnatius T Foobar">IGnatius T Foobar</a> </span> <span class="message_subject">Subject: Re: Pegasus</span></div>
<div class="message_content">
<blockquote>
<div class="message_content">
<p><span style="background-color: transparent; color: navy;">Without morality, everything is permitted.</span></p>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275092</link><pubDate>Sat, 21 Aug 2021 15:54:27 -0000</pubDate><title>Message #2099275092</title><guid isPermaLink="false">2099275092@Uncensored</guid><description><![CDATA[  
 Without permissiveness, everything is moralizing. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099275089</link><pubDate>Sat, 21 Aug 2021 15:20:08 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099275089@Uncensored</guid><description><![CDATA[<html><body>

<blockquote>
<div class="message_content">
<p>For example - without China and North Korea and Cuba to measure ourselves again, how would we know if we were doing better or worse? You could claim that we would implicitly know we were doing better because we are better - but without a benchmark to measure against - if we were doing terrible - it would be VERY difficult to determine. It would just be "what we knew". </p>
</div>
</blockquote>
<p>"If God did not exist, it would be necessary to invent Him."   --Voltaire</p>
<p>Without morality, everything is permitted.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099274319</link><pubDate>Wed, 11 Aug 2021 15:50:27 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099274319@Uncensored</guid><description><![CDATA[  
 :-D 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273798</link><pubDate>Thu, 05 Aug 2021 20:34:08 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273798@Uncensored</guid><description><![CDATA[<html><body>

<p>"These so called "benchmarks" of "human rights" are just the rhetoric of oppression employed by the bourgeois capitalist pigs to ensure that the patriarchy remains in undisputed power!" <br /><br /></p>
<blockquote>
<div class="message_header"><span>Thu Aug 05 2021 07:52:47 EDT</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span> <span class="message_subject">Subject: Re: Pegasus</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2021-08-05 01:30 from ParanoidDelusions <br />Subject: Re: Pegasus <br />The Tao doesn't exactly teach "go with the flow." I mean, it teaches <br />that the flow is there, and that the counterflow is there too - and <br />both are necessary and that a harmonious balance is ideal.  <br /><br />For example - without China and North Korea and Cuba to measure <br />ourselves again, how would we know if we were doing better or worse? <br />You could claim that we would implicitly know we were doing better <br />because we are better - but without a benchmark to measure against - <br />if we were doing terrible - it would be VERY difficult to determine. </blockquote>
<br />In MY one-world-government socialist utopia, we won't have that problem, because I'll shoot anyone who starts talking about benchmarks. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273764</link><pubDate>Thu, 05 Aug 2021 11:52:47 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273764@Uncensored</guid><description><![CDATA[ > 2021-08-05 01:30 from ParanoidDelusions   
 >Subject: Re: Pegasus  
 >The Tao doesn't exactly teach "go with the flow." I mean, it teaches  
 >that the flow is there, and that the counterflow is there too - and  
 >both are necessary and that a harmonious balance is ideal.   
 >  
 >For example - without China and North Korea and Cuba to measure  
 >ourselves again, how would we know if we were doing better or worse?  
 >You could claim that we would implicitly know we were doing better  
 >because we are better - but without a benchmark to measure against -  
 >if we were doing terrible - it would be VERY difficult to determine.  
  
 In MY one-world-government socialist utopia, we won't have that problem,
because I'll shoot anyone who starts talking about benchmarks. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273731</link><pubDate>Thu, 05 Aug 2021 05:30:33 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273731@Uncensored</guid><description><![CDATA[<html><body>

<p>The Tao doesn't exactly teach "go with the flow." I mean, it teaches that the flow is there, and that the counterflow is there too - and both are necessary and that a harmonious balance is ideal. <br /><br />For example - without China and North Korea and Cuba to measure ourselves again, how would we know if we were doing better or worse? You could claim that we would implicitly know we were doing better because we are better - but without a benchmark to measure against - if we were doing terrible - it would be VERY difficult to determine. It would just be "what we knew". <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Tue Aug 03 2021 19:53:55 EDT</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span> <span class="message_subject">Subject: Re: Pegasus</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2021-08-02 15:48 from LoanShark <br />Subject: Re: Pegasus <br />
<blockquote>2021-07-26 22:11 from ParanoidDelusions <br />Subject: Re: Pegasus <br />Evidently India has been fucking with the Dahli Lama because China is </blockquote>
</blockquote>
<br />
<blockquote><br />
<blockquote>trying to control who the next one selected will be... because... <br />politics. Bunch of Monks running around with compromised iPhones and </blockquote>
</blockquote>
<br />
<blockquote><br />
<blockquote>Android devices. <br /><br />Tibet and shit. </blockquote>
<br />gross, the way China wants to stamp out organized religion. They <br />justify their takeover of Tibet on the rationale that the monks were <br />spiritual charlatans, exploiting the population. <br /><br /><br />Guess what? Now there's just a different set of exploiters. <br /><br /><br /></blockquote>
<br />Sure. I have heard there is a list of "acceptable" religions to follow in China, such as Taoism (follow the events and don't fight your circumpstances, of TAO WILL CRUSH YOU). Stepping out of the allowed list is bad for you. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273588</link><pubDate>Tue, 03 Aug 2021 23:53:55 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273588@Uncensored</guid><description><![CDATA[ > 2021-08-02 15:48 from LoanShark   
 >Subject: Re: Pegasus  
 > > 2021-07-26 22:11 from ParanoidDelusions     
 > >Subject: Re: Pegasus    
 > >Evidently India has been fucking with the Dahli Lama because China is
 
 >  
 > >trying to control who the next one selected will be... because...    
 > >politics. Bunch of Monks running around with compromised iPhones and 
 
 >  
 > >Android devices.      
 > >    
 > >Tibet and shit.       
 >    
 > gross, the way China wants to stamp out organized religion. They   
 >justify their takeover of Tibet on the rationale that the monks were   
 >spiritual charlatans, exploiting the population.    
 >    
 >    
 > Guess what? Now there's just a different set of exploiters.   
 >   
 >  
  
 Sure. I have heard there is a list of "acceptable" religions to follow in
China, such as Taoism (follow the events and don't fight your circumpstances,
of TAO WILL CRUSH YOU). Stepping out of the allowed list is bad for you. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273493</link><pubDate>Mon, 02 Aug 2021 20:19:46 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273493@Uncensored</guid><description><![CDATA[  
 true. communism is a religion. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273490</link><pubDate>Mon, 02 Aug 2021 19:56:00 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273490@Uncensored</guid><description><![CDATA[<html><body>

<p>Just ones that are not theirs.. </p>
<blockquote>
<div class="message_header"><span>Mon Aug 02 2021 03:48:34 PM EDT</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span> <span class="message_subject">Subject: Re: Pegasus</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />gross, the way China wants to stamp out organized religion. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273487</link><pubDate>Mon, 02 Aug 2021 19:48:34 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273487@Uncensored</guid><description><![CDATA[ > 2021-07-26 22:11 from ParanoidDelusions   
 >Subject: Re: Pegasus  
 >Evidently India has been fucking with the Dahli Lama because China is  
 >trying to control who the next one selected will be... because...  
 >politics. Bunch of Monks running around with compromised iPhones and  
 >Android devices.   
 >  
 >Tibet and shit.    
  
 gross, the way China wants to stamp out organized religion. They justify
their takeover of Tibet on the rationale that the monks were spiritual charlatans,
exploiting the population.  
  
  
 Guess what? Now there's just a different set of exploiters. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099273486</link><pubDate>Mon, 02 Aug 2021 19:46:58 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099273486@Uncensored</guid><description><![CDATA[ >funded by people like Amnesty international.    
  
 who really stink in some ways, BTW 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099272975</link><pubDate>Tue, 27 Jul 2021 02:11:49 -0000</pubDate><title>Re: Pegasus</title><guid isPermaLink="false">2099272975@Uncensored</guid><description><![CDATA[<html><body>

<p>Evidently India has been fucking with the Dahli Lama because China is trying to control who the next one selected will be... because... politics. Bunch of Monks running around with compromised iPhones and Android devices. <br /><br />Tibet and shit. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Sun Jul 25 2021 09:47:20 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span> <span class="message_subject">Subject: Pegasus</span></div>
<div class="message_content">
<p>Been reading about this.  not good.  </p>
<p>I guess you can scan for it ( and i think others ) by using some tool funded by people like Amnesty international. </p>
<p><a href="https://github.com/mvt-project/mvt" target="webcit01">https://github.com/mvt-project/mvt</a></p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099272849</link><pubDate>Sun, 25 Jul 2021 13:47:20 -0000</pubDate><title>Pegasus</title><guid isPermaLink="false">2099272849@Uncensored</guid><description><![CDATA[<html><body>

<p>Been reading about this.  not good.  </p>
<p>I guess you can scan for it ( and i think others ) by using some tool funded by people like Amnesty international. </p>
<p>https://github.com/mvt-project/mvt</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099265041</link><pubDate>Sat, 15 May 2021 18:29:01 -0000</pubDate><title>Message #2099265041</title><guid isPermaLink="false">2099265041@Uncensored</guid><description><![CDATA[ > I am using it, but not with Uncensored. SOme other people and I tried 
 
 >your i2p interface after you migrated it but it didn't work so we fell 
 
 >back to Tor.   
  
 Ok then I'm going to delete it, and I'll try again at some future date. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099264225</link><pubDate>Sun, 09 May 2021 20:54:47 -0000</pubDate><title>Message #2099264225</title><guid isPermaLink="false">2099264225@Uncensored</guid><description><![CDATA[ > 2021-05-08 13:45 from IGnatius T Foobar   
 >@darknetuser   
 >  
 >If I were to make another attempt at I2P, is it safe to say you're  
 >not using it and I won't break your workflow?  I think the answer is  
 >yes but I wanted to make sure.  
 >  
  
 I am using it, but not with Uncensored. SOme other people and I tried your
i2p interface after you migrated it but it didn't work so we fell back to
Tor. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099264094</link><pubDate>Sat, 08 May 2021 18:04:43 -0000</pubDate><title>Message #2099264094</title><guid isPermaLink="false">2099264094@Uncensored</guid><description><![CDATA[<html><body>

<p>Even if you dont have it enabled, with Vpro, dont be surprised if you actually do anyway :) </p>
<p>Amazing how they snuck that into pretty much everything modern and no one really noticed the HUGE hole it was until it was too late...Putting effectively another computer at a lower level that has access to *everything* and never turns off, cant be a good idea to anyone, other than those wanting the control.</p>
<p>Tho it did quietly make minix the most used OS on the planet for non-mobile devices.</p>
<blockquote>
<div class="message_header"><span>Thu May 06 2021 10:53:24 AM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>I'm going to have to research this. I don't think I've got push firmware enabled on the Dells I own. They don't make it clear in the article if a remote attack can be initiated against the firmware - or if you need physical access. </p>
<p><br /><br /><br /></p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099264090</link><pubDate>Sat, 08 May 2021 17:45:22 -0000</pubDate><title>Message #2099264090</title><guid isPermaLink="false">2099264090@Uncensored</guid><description><![CDATA[<html><body>

<p>@darknetuser</p>
<p>If I were to make another attempt at I2P, is it safe to say you're not using it and I won't break your workflow?  I think the answer is yes but I wanted to make sure.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099263815</link><pubDate>Thu, 06 May 2021 15:53:00 -0000</pubDate><title>Message #2099263815</title><guid isPermaLink="false">2099263815@Uncensored</guid><description><![CDATA[  
 Threats of this kind are not even new. Insecure BIOS-flash drivers have been
a known vector for quite some time now. I'll bet that this was quietly known
and exploited in certain circles for years. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099263801</link><pubDate>Thu, 06 May 2021 14:53:24 -0000</pubDate><title>Message #2099263801</title><guid isPermaLink="false">2099263801@Uncensored</guid><description><![CDATA[<html><body>

<p>I'm going to have to research this. I don't think I've got push firmware enabled on the Dells I own. They don't make it clear in the article if a remote attack can be initiated against the firmware - or if you need physical access. </p>
<p><br /><br /><br /></p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099263800</link><pubDate>Thu, 06 May 2021 14:50:41 -0000</pubDate><title>Message #2099263800</title><guid isPermaLink="false">2099263800@Uncensored</guid><description><![CDATA[<html><body>

<p>Damnit.</p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099263783</link><pubDate>Thu, 06 May 2021 11:52:48 -0000</pubDate><title>Message #2099263783</title><guid isPermaLink="false">2099263783@Uncensored</guid><description><![CDATA[ > 2021-05-05 16:48 from zooer   
 >Hundreds of Millions of Dell Users at Risk from Kernel-Privilege Bugs  
 >https://threatpost.com/dell-kernel-privilege-bugs/165843/  
 >  
  
 For a moment I was fearing I'd have to replace my ancient del servers. The
I realized they are so ancient they predate this bug. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099263729</link><pubDate>Wed, 05 May 2021 20:48:58 -0000</pubDate><title>Message #2099263729</title><guid isPermaLink="false">2099263729@Uncensored</guid><description><![CDATA[<html><body>

<p>Hundreds of Millions of Dell Users at Risk from Kernel-Privilege Bugs</p>
<div>https://threatpost.com/dell-kernel-privilege-bugs/165843/</div>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099262342</link><pubDate>Wed, 28 Apr 2021 05:00:10 -0000</pubDate><title>Message #2099262342</title><guid isPermaLink="false">2099262342@Uncensored</guid><description><![CDATA[<html><body>

<p>Office 365, Adobe Creative Cloud - OS X, Windows *and* Linux - these are ALWAYS throwing down new security updates. My Synology is always throwing down new updates - and most people have enough systems doing this that they can't regression check them all before applying them - and the industry spits out this narrative that you HAVE to do it - or your system *is* a target. <br /><br />I don't know. I just think the conventional wisdom on aggressive, constant updates is a flawed approach. </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Apr 27 2021 14:53:30 EDT</span> <span>from <a href="do_template?template=user_show?who=Nurb432">Nurb432</a> </span></div>
<div class="message_content">
<p>It depends on the vendor</p>
<p>In my case with the app i support, we only get 1 upgrade a year for free.  So, they wont be doing it without our our knowledge.  And any hot fix for issues we run across that we cant wait on, gets applied to our test system first, for us to sign off on before its scheduled to be put in prod.</p>
<p> </p>
<p>Now, stuff like O365, ya, its a constantly moving target.</p>
<blockquote>
<div class="message_header"><span>Mon Apr 26 2021 11:48:20 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>Doesn't this point out the flaw with cloud based - always latest update - software? <br /><br />I think there are so many things being updated so frequently that the odds of this happening outweigh the majority of "security updates" that roll out rapidly. <br /><br /></p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099262188</link><pubDate>Tue, 27 Apr 2021 18:53:30 -0000</pubDate><title>Message #2099262188</title><guid isPermaLink="false">2099262188@Uncensored</guid><description><![CDATA[<html><body>

<p>It depends on the vendor</p>
<p>In my case with the app i support, we only get 1 upgrade a year for free.  So, they wont be doing it without our our knowledge.  And any hot fix for issues we run across that we cant wait on, gets applied to our test system first, for us to sign off on before its scheduled to be put in prod.</p>
<p> </p>
<p>Now, stuff like O365, ya, its a constantly moving target.</p>
<blockquote>
<div class="message_header"><span>Mon Apr 26 2021 11:48:20 PM EDT</span> <span>from <a href="do_template?template=user_show?who=ParanoidDelusions">ParanoidDelusions</a> </span></div>
<div class="message_content">
<p>Doesn't this point out the flaw with cloud based - always latest update - software? <br /><br />I think there are so many things being updated so frequently that the odds of this happening outweigh the majority of "security updates" that roll out rapidly. <br /><br /></p>
<blockquote>
<div class="message_header"> </div>
</blockquote>
</div>
</blockquote>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099262074</link><pubDate>Tue, 27 Apr 2021 03:48:20 -0000</pubDate><title>Message #2099262074</title><guid isPermaLink="false">2099262074@Uncensored</guid><description><![CDATA[<html><body>

<p>Doesn't this point out the flaw with cloud based - always latest update - software? <br /><br />I think there are so many things being updated so frequently that the odds of this happening outweigh the majority of "security updates" that roll out rapidly. <br /><br /></p>
<blockquote>
<div class="message_header"><span>Sat Apr 24 2021 20:24:17 EDT</span> <span>from <a href="do_template?template=user_show?who=zooer">zooer</a> </span></div>
<div class="message_content">
<p>Backdoored password manager stole data from as many as 29K enterprises</p>
<p><a href="https://arstechnica.com/gadgets/2021/04/hackers-backdoor-corporate-password-manager-and-steal-customer-data/" target="webcit01">https://arstechnica.com/gadgets/2021/04/hackers-backdoor-corporate-password-manager-and-steal-customer-data/</a></p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=2099261734</link><pubDate>Sun, 25 Apr 2021 00:24:17 -0000</pubDate><title>Message #2099261734</title><guid isPermaLink="false">2099261734@Uncensored</guid><description><![CDATA[<html><body>

<p>Backdoored password manager stole data from as many as 29K enterprises</p>
<p>https://arstechnica.com/gadgets/2021/04/hackers-backdoor-corporate-password-manager-and-steal-customer-data/</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4670826</link><pubDate>Wed, 10 Mar 2021 19:54:36 -0000</pubDate><title>Message #4670826</title><guid isPermaLink="false">4670826@Uncensored</guid><description><![CDATA[ > 2021-03-10 14:35 from Nurb432     
 >VM and block all ports other than TOR or freenet or I2P.       
 >> Wed Mar 10 2021 14:33:16 EST from darknetuser     
 >>    
 >>       
 >>>If you want to interact with regular clearnet services, the    
 >>>following solutions take a "secure by default" aproach:    
 >    
 >>     
 >>    
 >>     
 >>    
 >>     
 >    
 >     
 >    
 >     
 >    
    
 That too but those you have to configure yourself, which is less bullet proof
than a ready-to-go solution.   
  
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4670820</link><pubDate>Wed, 10 Mar 2021 19:35:22 -0000</pubDate><title>Message #4670820</title><guid isPermaLink="false">4670820@Uncensored</guid><description><![CDATA[<html><body>

<p>VM and block all ports other than TOR or freenet or I2P.  </p>
<blockquote>
<div class="message_header"><span>Wed Mar 10 2021 14:33:16 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote><span style="color: #000000; font-family: sans-serif; font-size: 16px; text-align: justify; background-color: #ffffff;">If you want to interact with regular clearnet services, the following solutions take a "secure by default" aproach:</span></blockquote>
</div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4670818</link><pubDate>Wed, 10 Mar 2021 19:33:16 -0000</pubDate><title>Message #4670818</title><guid isPermaLink="false">4670818@Uncensored</guid><description><![CDATA[ > 2021-03-10 01:55 from ParanoidDelusions           
 >I set up i2p on my Pi400 - and it scares me, because I don't know      
   
 >that I'm doing it right, and it doesn't really hold your hand through  
       
 >holding it right - so it is kind of a novelty. I'm getting to sites    
     
 >that I can't get to normally, through regular methods - but I don't    
     
 >know that I'm leaking traceable information.           
 >          
 >And that seems to be the problem with these solutions - they need a    
     
 >reliable sanity check that says, "The Ayatollah or President Xi is     
    
 >not going to see you posting this because you're not making a stupid   
      
 >mistake that is easy for a noob to make, citizen of an oppressive      
   
 >regime."            
 >          
 >          
 >Which seems to be growing more important here in the US, too. Some     
    
 >Facebook
loony stalked me OFF of Facebook. I had his personal address          
 >in Yuba city and everything else his metadata was leaking within 20    
     
 >minutes of him starting to harass me - but still. I'll post more       
  
 >details later - it is an interesting story.           
 >          
          
 If you want to interact with regular clearnet services, the following solutions
take a "secure by default" aproach:         
        
 * The Tor Browser Bundle is a package available for any popular operating
system (and a lot of not popular operating systems) with includes a preconfigured
web browser with a tor instance. It has all the common leaks and issues eliminated
and it has nice fingerprinting protection - your http traffic looks like some
common internet browser's for providers.       
      
 * The Tails Live Operating System is a Linux distribution designed to be
installed
in a DVD or pen-drive. All the traffic is tunneled through tor by default.
All the traffic goes through an agressive network filter to ensure you don't
generate leaky side traffic. Lots of apparmor thrown in so the whole thing
is sealed shut. The distribution does not have many programs, but it has all
the basics (email, openpgp, browser, office, bitcoin) and all of them are
specifically adapted for privacy.     
    
 * The Whonix suit of operating systems is a ready-to-go solution. It is included
in the Qubes distribution. Basically you use a Whonis instance as a Tor router
and then another Whonix instance as a client virtual machine. The architecture
is a bit complex but the idea is that the Whonix client works in an isolated
network that can only communicate to the outside via the Whonix router. If
you make a mistake or get your Whonix client cracked, the Whonix router won't
allow it
to leak information to the outside. It sounds complex to set, but when using
a ready-to-go solution as in Qubes, it is deployed automatically for you.
  
  
 TL;DR: there is no shortage of out-of-the-box privacy tools for posting pictures
of Biden and Gates sodomizing each other in some *.chan. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4670686</link><pubDate>Wed, 10 Mar 2021 06:55:55 -0000</pubDate><title>Message #4670686</title><guid isPermaLink="false">4670686@Uncensored</guid><description><![CDATA[<html><body>

<p>I set up i2p on my Pi400 - and it scares me, because I don't know that I'm doing it right, and it doesn't really hold your hand through holding it right - so it is kind of a novelty. I'm getting to sites that I can't get to normally, through regular methods - but I don't know that I'm leaking traceable information. <br /><br />And that seems to be the problem with these solutions - they need a reliable sanity check that says, "The Ayatollah or President Xi is not going to see you posting this because you're not making a stupid mistake that is easy for a noob to make, citizen of an oppressive regime." </p>
<p><br />Which seems to be growing more important here in the US, too. Some Facebook loony stalked me OFF of Facebook. I had his personal address in Yuba city and everything else his metadata was leaking within 20 minutes of him starting to harass me - but still. I'll post more details later - it is an interesting story. <br /><br /></p>
<blockquote>
<div class="message_header"><span>Wed Mar 03 2021 09:27:26 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>I think if I used tor I would probably set up a proxy config in my </blockquote>
<br />
<blockquote>regular browser to send all ".onion" requests to the correct proxy </blockquote>
<br />
<blockquote>instead of needing to use another browser. Same with .i2p, I guess. </blockquote>
<br />
<blockquote>And that's probably the wrong way to do it from an ultra-privacy point </blockquote>
<br />
<blockquote>of view. <br /><br /><br /></blockquote>
<br />Yes, that setup is very broken. <br /><br />First if you visit an i2p site which has some resource loaded over cearnet, your computer will fect both the i2p and the clearnet components of the page at once.... the i2p part over i2p, and the clearnet part over clearnet. Which is very very bad. <br /><br />Also, when you use the same browser for both things it is hard to forget which configuration you are using at a given time. This is, there is no clear indication when you are fetching results in the clear or not, so if you are tired it is easy to mess up. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669948</link><pubDate>Wed, 03 Mar 2021 14:27:26 -0000</pubDate><title>Message #4669948</title><guid isPermaLink="false">4669948@Uncensored</guid><description><![CDATA[ > I think if I used tor I would probably set up a proxy config in my    
  
 >regular browser to send all ".onion" requests to the correct proxy     
 
 >instead of needing to use another browser.  Same with .i2p, I guess.   
     
 >And that's probably the wrong way to do it from an ultra-privacy point 
     
 >of view.       
 >       
 >      
      
 Yes, that setup is very broken.     
    
 First if you visit an i2p site which has some resource loaded over cearnet,
your computer will fect both the i2p and the clearnet components of the page
at once.... the i2p part over i2p, and the clearnet part over clearnet. Which
is very very bad.   
  
 Also, when you use the same browser for both things it is hard to forget
which configuration you are using at a given time. This is, there is no clear
indication when you are fetching results in the clear or not, so if you are
tired it is easy to mess up. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669890</link><pubDate>Wed, 03 Mar 2021 00:06:03 -0000</pubDate><title>Message #4669890</title><guid isPermaLink="false">4669890@Uncensored</guid><description><![CDATA[ >Brave browser’s Tor feature found to leak .onion queries to ISPs  
  
 I got smacked by Corporate IT for even *having* Brave on my machine, simply
because it *can* do Tor.  :( 
  
 I think if I used tor I would probably set up a proxy config in my regular
browser to send all ".onion" requests to the correct proxy instead of needing
to use another browser.  Same with .i2p, I guess.   And that's probably the
wrong way to do it from an ultra-privacy point of view. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669855</link><pubDate>Tue, 02 Mar 2021 17:04:59 -0000</pubDate><title>Message #4669855</title><guid isPermaLink="false">4669855@Uncensored</guid><description><![CDATA[ > 2021-03-01 22:43 from ParanoidDelusions   
 >Yeah... encryption and security has gotten very good on consumer  
 >grade devices. Intel had boxes full of password encrypted hard drives  
 >in 2003, pulled from ThinkPads.   
  
 Yeah unfortunately if it's BitLocker, and not using HW encryption on one
of the known-bugged SSD's, it's probably pretty tough to crack. But the key
is often linked to the person's Microsoft Account, so if you can acccess *that*...

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669813</link><pubDate>Tue, 02 Mar 2021 03:43:12 -0000</pubDate><title>Message #4669813</title><guid isPermaLink="false">4669813@Uncensored</guid><description><![CDATA[<html><body>

<p>Yeah... encryption and security has gotten very good on consumer grade devices. Intel had boxes full of password encrypted hard drives in 2003, pulled from ThinkPads. <br /><br /></p>
<blockquote>
<div class="message_header"><span>Mon Mar 01 2021 06:21:50 EST</span> <span>from <a href="do_template?template=user_show?who=darknetuser">darknetuser</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>2021-03-01 05:24 from triLcat <br />Not sure if this is the right place... but a friend died, leaving <br />basically everything important stuck in a computer that's password</blockquote>
<br />
<blockquote>protected, firewalled, and other layers of security.   <br /><br />His kids need access to his financial information (and other stuff, </blockquote>
<br />
<blockquote>but mainly that).  <br /><br />  <br /><br />Anyone here able to do that kind of thing? (The computer is in NY)  </blockquote>
<br /><br />Do you have phisical access to the computer? <br /><br />I have cracked some computers that used **heavy** full disk encryption, but only because the guy who had forgotten the password remembered most of it. The typical situation in which the guy says "I know the password started by "paypalsucks", and then it had a number, or maybe three, and ended with a special character which I don't remember. <br /><br />If you have access to the computer directly, is it full disk encrypted? Which operating system (and version) does it run? </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669744</link><pubDate>Mon, 01 Mar 2021 11:21:50 -0000</pubDate><title>Message #4669744</title><guid isPermaLink="false">4669744@Uncensored</guid><description><![CDATA[ > 2021-03-01 05:24 from triLcat       
 >Not sure if this is the right place... but a friend died, leaving      
 >basically everything important stuck in a computer that's password     

 >protected, firewalled, and other layers of security.        
 >      
 >His kids need access to his financial information (and other stuff,    
 
 >but mainly that).        
 >      
 >        
 >      
 >Anyone here able to do that kind of thing? (The computer is in NY)    
  
 >      
      
 Do you have phisical access to the computer?     
    
 I have cracked some computers that used **heavy** full disk encryption, but
only because the guy who had forgotten the password remembered most of it.
The typical situation in which the guy says "I know the password started by
"paypalsucks", and then it had a number, or maybe three, and ended with a
special character which I don't remember.   
  
 If
you have access to the computer directly, is it full disk encrypted? Which
operating system (and version) does it run? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669739</link><pubDate>Mon, 01 Mar 2021 10:24:02 -0000</pubDate><title>Message #4669739</title><guid isPermaLink="false">4669739@Uncensored</guid><description><![CDATA[<html><body>

<p>Not sure if this is the right place... but a friend died, leaving basically everything important stuck in a computer that's password protected, firewalled, and other layers of security.  <br /><br />His kids need access to his financial information (and other stuff, but mainly that). </p>
<p> </p>
<p>Anyone here able to do that kind of thing? (The computer is in NY) </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669381</link><pubDate>Thu, 25 Feb 2021 23:44:39 -0000</pubDate><title>Message #4669381</title><guid isPermaLink="false">4669381@Uncensored</guid><description><![CDATA[<html><body>

<p>I had forgot about those people.  invasive SoBs</p>
<blockquote>
<div class="message_header"><span>Tue Feb 23 2021 21:44:00 EST</span> <span>from <a href="do_template?template=user_show?who=LoanShark">LoanShark</a> </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">My mom was talking about this stuff to me a month ago. It sounds like you're talking about LexisNexis' verification system. <br /><br />She had to get through this process, and it was asking her about me, and it was blocking her. It would ask her things like whether I've ever been associated with her most current address, or, I don't know. So she started giving it the wrong-but-plausible answers just to get through the process, and now I wonder if it will take those as correct, and now *I* have to give the wrong-but-plausible answers next time I go through this shit (and I just had to go through it a few days ago to sign up for WeillCornell's patient portal.) <br /><br />For fuck's sake. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669159</link><pubDate>Wed, 24 Feb 2021 03:06:51 -0000</pubDate><title>Message #4669159</title><guid isPermaLink="false">4669159@Uncensored</guid><description><![CDATA[<html><body>

<p>I have gotten those questions as well, scary.</p>
<p>What scares me is when none of the answers were correct.  </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669156</link><pubDate>Wed, 24 Feb 2021 02:44:00 -0000</pubDate><title>Message #4669156</title><guid isPermaLink="false">4669156@Uncensored</guid><description><![CDATA[ > 2021-02-23 17:33 from Nurb432   
 >Somewhat related.   
 >  
 >    
 >  
 >Last night i signed up with a medical testing place so i could  
 >schedule online/get results/etc.   
 >  
 >As i did "we want to ask you some questions to verify its you"  They  
 >had one of my places of employment back in 1991 ( that is no longer  
 >even in business )... and one of the cars i own make/model/year.. ( a  
 >very uncommon car )   
 >  
 >wtf.. not exactly secret data, but still ..wtf  
 >  
  
 My mom was talking about this stuff to me a month ago. It sounds like you're
talking about LexisNexis' verification system. 
  
 She had to get through this process, and it was asking her about me, and
it was blocking her. It would ask her things like whether I've ever been associated
with her most current address, or, I don't know. So she started giving it
the wrong-but-plausible answers just to get
through the process, and now I wonder if it will take those as correct, and
now *I* have to give the wrong-but-plausible answers next time I go through
this shit (and I just had to go through it a few days ago to sign up for WeillCornell's
patient portal.) 
  
 For fuck's sake. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4669129</link><pubDate>Tue, 23 Feb 2021 22:33:42 -0000</pubDate><title>Message #4669129</title><guid isPermaLink="false">4669129@Uncensored</guid><description><![CDATA[<html><body>

<p>Somewhat related.</p>
<p> </p>
<p>Last night i signed up with a medical testing place so i could schedule online/get results/etc.</p>
<p>As i did "we want to ask you some questions to verify its you"  They had one of my places of employment back in 1991 ( that is no longer even in business )... and one of the cars i own make/model/year.. ( a very uncommon car )</p>
<p>wtf.. not exactly secret data, but still ..wtf</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4668994</link><pubDate>Mon, 22 Feb 2021 17:08:46 -0000</pubDate><title>Message #4668994</title><guid isPermaLink="false">4668994@Uncensored</guid><description><![CDATA[<html><body>

<p>My mother told me, when I was very young, <br /><br />"Don't ever write anything to a girl that you wouldn't want other people to read." <br /><br /><br />With technology: <br /><br />Just assume that no matter how good you are, if someone is interested in seeing what you're doing, they're better than you are. <br /><br />Even if they are not - it is good humility to have. </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4651049</link><pubDate>Sat, 20 Feb 2021 16:26:52 -0000</pubDate><title>Message #4651049</title><guid isPermaLink="false">4651049@Uncensored</guid><description><![CDATA[ > 2021-02-20 06:29 from zooer     
 >Brave browser’s Tor feature found to leak .onion queries to ISPs    
 >https://portswigger.net/daily-swig/brave-browsers-tor-feature-found-to 
  
 >-leak-onion-queries-to-isps     
 >    
 >or https://rb.gy/vaslzn    
 >    
    
 That sucks cocks.   
  
 Yet another reason tooperate your own DNS in your LAN with a nice set of
rules for .onion and .i2p domains. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4651007</link><pubDate>Sat, 20 Feb 2021 11:29:44 -0000</pubDate><title>Message #4651007</title><guid isPermaLink="false">4651007@Uncensored</guid><description><![CDATA[<html><body>

<p>Brave browser’s Tor feature found to leak .onion queries to ISPs<br />https://portswigger.net/daily-swig/brave-browsers-tor-feature-found-to-leak-onion-queries-to-isps</p>
<p>or https://rb.gy/vaslzn<br /><br /></p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4640927</link><pubDate>Thu, 31 Dec 2020 18:44:03 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4640927@Uncensored</guid><description><![CDATA[Actually I don't.  I've heard that it used to happen in the early 20th century.
 But in modern times we have the best antitrust investigators money can buy.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4634614</link><pubDate>Tue, 22 Dec 2020 02:41:22 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4634614@Uncensored</guid><description><![CDATA[<html><body>

<p><span style="color: #000080; font-family: sans-serif; font-size: 16px; text-align: justify; background-color: #f5f5f5;">Remember when the government used to do anti-competition and</span><br style="color: #000080; font-family: sans-serif; font-size: 16px; text-align: justify;" /><span style="color: #000080; font-family: sans-serif; font-size: 16px; text-align: justify; background-color: #f5f5f5;">anti-trust investigations when tech companies pulled this kind of</span><br style="color: #000080; font-family: sans-serif; font-size: 16px; text-align: justify;" /><span style="color: #000080; font-family: sans-serif; font-size: 16px; text-align: justify; background-color: #f5f5f5;">shit? </span></p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4634480</link><pubDate>Mon, 21 Dec 2020 19:19:20 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4634480@Uncensored</guid><description><![CDATA[ >To an extent Microsoft with IE.  ( sure it was a hand-slap fine and  
 >not a break up, but it still happened )   
  
 Microsoft's divestiture was called off in 2001 when a more well-bribed AG
took over. 
  
 Bottom line, of course, is that trust busting is no longer a thing, because
it requires the trust busters to be un-buy-able.  IBM's monopoly came to an
end when the world moved past mainframes.  Microsoft's monopoly came to an
end when the world moved past desktop computers.  Both companies were presented
with toothless "consent decrees" that had little effect on their business
practices. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4634474</link><pubDate>Mon, 21 Dec 2020 19:10:43 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4634474@Uncensored</guid><description><![CDATA[<html><body>

<p>Yeah. I think Microsoft was the last company to really face genuine threat of Government restriction for their behavior. At the very least, the Government was still shaking the stick at them and putting on a show for the public. <br /><br />Now they don't even bother trying to convince us. At least give me a song and dance while you're screwing me. <br /><br />It is like the difference between gentle prison love with a kiss and gang rape in the showers. <br /><br /></p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Dec 21 2020 08:20:14 EST</span> <span>from Nurb432 </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<p>Bell systems? I still remember that.  I lived thru it, being a bell-baby.</p>
<p>To an extent Microsoft with IE.  ( sure it was a hand-slap fine and not a break up, but it still happened )</p>
<blockquote>
<div class="message_header"><span>Sun Dec 20 2020 18:01:17 EST</span> <span>from IGnatius T Foobar </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Remember when the government used to do anti-competition and <br />anti-trust investigations when tech companies pulled this kind of <br />shit? </blockquote>
<br />Not in our lifetime they didn't. Now they just have antitrust theater hearings, after which the monopolists know whose coffers they are expected to fill.</div>
</div>
</blockquote>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4634231</link><pubDate>Mon, 21 Dec 2020 13:20:14 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4634231@Uncensored</guid><description><![CDATA[<html><body>

<p>Bell systems? I still remember that.  I lived thru it, being a bell-baby.</p>
<p>To an extent Microsoft with IE.  ( sure it was a hand-slap fine and not a break up, but it still happened )</p>
<blockquote>
<div class="message_header"><span>Sun Dec 20 2020 18:01:17 EST</span> <span>from IGnatius T Foobar </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Remember when the government used to do anti-competition and <br />anti-trust investigations when tech companies pulled this kind of <br />shit?  </blockquote>
<br />Not in our lifetime they didn't. Now they just have antitrust theater hearings, after which the monopolists know whose coffers they are expected to fill. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4633720</link><pubDate>Sun, 20 Dec 2020 23:01:17 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4633720@Uncensored</guid><description><![CDATA[ >Remember when the government used to do anti-competition and  
 >anti-trust investigations when tech companies pulled this kind of  
 >shit?    
  
 Not in our lifetime they didn't.  Now they just have antitrust theater hearings,
after which the monopolists know whose coffers they are expected to fill.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4628461</link><pubDate>Sun, 13 Dec 2020 19:37:08 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4628461@Uncensored</guid><description><![CDATA[<html><body>

<p>Most of them are working for the government now. just not 'overtly', so they have to be careful not to piss off their 'propaganda wing', but still appear to be 'hard on them' to the public.  what a freaking scam.</p>
<blockquote>
<div class="message_header"><span>Mon Dec 07 2020 12:44:46 EST</span><span>from ParanoidDelusions </span><span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<p><br /><br />Remember when the government used to do anti-competition and anti-trust investigations when tech companies pulled this kind of shit? </p>
<p> </p>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4628460</link><pubDate>Sun, 13 Dec 2020 19:34:22 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4628460@Uncensored</guid><description><![CDATA[<html><body>

<p>I never stopped. I still buy 'hard' media, be it movies, books or music. Then i either rip/scan it myself or "find" it out on the network and pack the original safely away so it cant be damaged. ( is 'finding' 100% legal, no, but i dare any judge to say anything when i wave the original in the air )</p>
<p>Of course 99% of my music is Indi as i HATE mainstream music, so that helps there too.</p>
<p> </p>
<p>And ya, 'cloud services suck', unless you are running the service..</p>
<blockquote>
<div class="message_header"><span>Mon Dec 07 2020 09:54:17 EST</span> <span>from ParanoidDelusions </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<p><br /><br />The Google Play Music/YouTube Music, where do I buy my music now issue - has me considering going all the way back to just buying CDs from Amazon and ripping them to digital format. <br /><br /><br /></p>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4623570</link><pubDate>Mon, 07 Dec 2020 17:44:46 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4623570@Uncensored</guid><description><![CDATA[<html><body>

<p>Checked last night, and it doesn't look like it. <br /><br />That is the infuriating thing - these corporations all seem to move in lockstep - making the same decisions that put them in more control and hurt the consumer at the same time. <br /><br />Remember when the government used to do anti-competition and anti-trust investigations when tech companies pulled this kind of shit? </p>
<p> </p>
<blockquote>
<div class="message_header"><span>Mon Dec 07 2020 10:07:39 EST</span> <span>from zooer </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<blockquote>
<div class="message_content">
<p><span style="background-color: transparent; color: navy;">Does Amazon still allow you to download music?</span></p>
</div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4623472</link><pubDate>Mon, 07 Dec 2020 15:07:39 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4623472@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Mon Dec 07 2020 09:54:17 AM EST</span> <span>from ParanoidDelusions</span></div>
<div class="message_content">
<p>The Google Play Music/YouTube Music, where do I buy my music now issue - has me considering going all the way back to just buying CDs from Amazon and ripping them to digital format. <br /><br /></p>
</div>
</blockquote>
<p>Does Amazon still allow you to download music?</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4623457</link><pubDate>Mon, 07 Dec 2020 14:54:17 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4623457@Uncensored</guid><description><![CDATA[<html><body>

<p>I still run *most* of my applications that really matter locally. Increasingly, I am more hostile toward hosted applications. I don't want Creative Cloud - because Adobe keeps moving my cheese - and it takes me a half hour to relearn how to do it their new and improved way every time I launch Illustrator or Photoshop. Paint Shop Pro, though - I'm still on the 2018 version - and everything is right where I left it. <br /><br />The Google Play Music/YouTube Music, where do I buy my music now issue - has me considering going all the way back to just buying CDs from Amazon and ripping them to digital format. <br /><br />Of course, I still *acquire* the majority of these things through the web. To me, the web just became a big 24x7x365 mail-order catalog. It is Digital Turn Of the Century Sears. </p>
<p> <br /><br /><br /></p>
<blockquote>
<div class="message_header"><span>Mon Dec 07 2020 08:52:26 EST</span> <span>from IGnatius T Foobar </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<p><span style="background-color: transparent;">The web evolved from a distributed document management system to a user environment that </span><em style="background-color: transparent;">replaced Windows</em><span style="background-color: transparent;"> as the primary application delivery platform.</span></p>
<p> </p>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4623404</link><pubDate>Mon, 07 Dec 2020 13:52:26 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4623404@Uncensored</guid><description><![CDATA[<html><body>

<p>"stuck" is maybe not the best choice of words when you think about what happened:</p>
<p>The web evolved from a distributed document management system to a user environment that <em>replaced Windows</em> as the primary application delivery platform.</p>
<p>It isn't what Tim Berners-Lee envisioned, but it sure as hell is what Marc Andreesen envisioned.  And he did it.  Horray for the web.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4606124</link><pubDate>Tue, 17 Nov 2020 20:55:15 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4606124@Uncensored</guid><description><![CDATA[<html><body>

<p>Wow, should not be sending posts with a migraine.</p>
<p> </p>
<p>Short version:</p>
<p>Today is not what the founders envisioned..  But we are stuck. And source code helps.</p>
<p> </p>
<blockquote>
<div class="message_header"><span>Tue Nov 17 2020 15:13:08 EST</span> <span>from Nurb432 </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<p>I totally agree with the vision not being what it was in the beginning, and I also do not like what its (de)evolved into, but reality is we are not going back to pure web again of just simple display clients. So have to make the best of what we have.  </p>
<p>My example: Having source and building it yourself, helps. At least from a security standpoint. But true, you are relying on others to point out issues. I know i dont have time to read thru all that code...</p>
<blockquote>
<div class="message_header"><span style="background-color: transparent; color: navy; font-size: 12px; display: inline !important;"><br /></span></div>
<div class="message_header"><span style="background-color: transparent; color: navy; font-size: 12px; display: inline !important;"> </span></div>
</blockquote>
<br /><br /></div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4606097</link><pubDate>Tue, 17 Nov 2020 20:13:08 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4606097@Uncensored</guid><description><![CDATA[<html><body>

<p>I totally agree with the vision not being what it was in the beginning, and I also do not like what its (de)evolved into, but reality is we are not going back to pure web again of just simple display clients. So have to make the best of what we have.  </p>
<p>My example: Having source and building it yourself, helps. At least from a security standpoint. But true, you are relying on others to point out issues. I know i dont have time to read thru all that code...</p>
<blockquote>
<div class="message_header"><span>Sun Nov 15 2020 21:44:37 EST</span> <span>from IGnatius T Foobar </span> <span class="message_subject">Subject: Re: An alternative ?</span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">
<blockquote>Too bad everything is now client side. Wasn't how the web was <br />supposed to be. But if it was still, would be a lot easier to code </blockquote>
<br />It's not what Tim Berners-Lee originally envisioned. It is what Netscape envisioned. It is what Sun envisioned. Those pioneers tried to get there in one step, and were destroyed by the giants who were not ready for it. But if you compare a modern client-side web app to the original Java vision -- that is, before it failed on the client side and became the new COBOL instead -- we got there. We totally got there: <br /><br />* Write once, run anywhere. <br />* Application code loads from the server at the moment the program is run, never saved locally. <br />* Upgrade the server, never push upgrades to clients. <br />* Printing sucks. <br /><br />So ... Netscape didn't live to see the browser replace Windows as the most popular client platform, Sun didn't live to see JavaStations replace PCs as the most popular client side hardware, but their vision totally became reality. </div>
</div>
</blockquote>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4604890</link><pubDate>Mon, 16 Nov 2020 15:03:38 -0000</pubDate><title>Message #4604890</title><guid isPermaLink="false">4604890@Uncensored</guid><description><![CDATA[  
 *stack, not static. 
  
 Actually probably not fair to say I'm doing "a lot" of work in that area,
but it was an interesting side gig over the weekend, and this is te stack
our UI team uses. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4604889</link><pubDate>Mon, 16 Nov 2020 15:02:06 -0000</pubDate><title>Message #4604889</title><guid isPermaLink="false">4604889@Uncensored</guid><description><![CDATA[  
 ironic that the "low tech" JavaScript ended up being the do-everything answer.
Leaner and meaner than Java. 
  
 (I'm doing a lot of work with Webpack and Babel and transpilers lately...
it's kinda nice to have a static that lets you use full ECMAScript 6 or 8
or whatever the latest is, with async's and modules, and yet compile it down
to a bundle that your average browser can understand.) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4604382</link><pubDate>Mon, 16 Nov 2020 02:44:37 -0000</pubDate><title>Re: An alternative ?</title><guid isPermaLink="false">4604382@Uncensored</guid><description><![CDATA[ >Too bad everything is now client side. Wasn't how the web was  
 >supposed to be. But if it was still, would be a lot easier to code  
  
 It's not what Tim Berners-Lee originally envisioned.  It is what Netscape
envisioned.  It is what Sun envisioned.  Those pioneers tried to get there
in one step, and were destroyed by the giants who were not ready for it. 
But if you compare a modern client-side web app to the original Java vision
-- that is, before it failed on the client side and became the new COBOL instead
-- we got there.  We totally got there: 
  
 * Write once, run anywhere. 
 * Application code loads from the server at the moment the program is run,
never saved locally. 
 * Upgrade the server, never push upgrades to clients. 
 * Printing sucks. 
  
 So ... Netscape didn't live to see the browser replace Windows as the most
popular client platform, Sun didn't live to see JavaStations
replace PCs as the most popular client side hardware, but their vision totally
became reality. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4603203</link><pubDate>Fri, 13 Nov 2020 23:26:08 -0000</pubDate><title>An alternative ?</title><guid isPermaLink="false">4603203@Uncensored</guid><description><![CDATA[<html><body>

<p>https://codeloop.org/python-how-to-make-browser-in-pyqt5-with-pyqtwebengine/</p>
<p> </p>
<p>Too bad everything is now client side. Wasn't how the web was supposed to be. But if it was still, would be a lot easier to code safe alternatives to use.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599668</link><pubDate>Tue, 10 Nov 2020 15:05:04 -0000</pubDate><title>Message #4599668</title><guid isPermaLink="false">4599668@Uncensored</guid><description><![CDATA[<html><body>

<p>I have seen AOL email addresses.  </p>
<p>The two that I remember recently, one is a friend of the family an older guy not very technical.  He might have switched to gmail now that he has an android phone but still has the AOL address.</p>
<p>The other was the personal account of an older doctor.  I don't know why, maybe he kept his email because that is what he used for years.  He might have used it for medical work unrelated to the practice.</p>
<p>He told me once that all his old mails were gone and wanted to know if I could get them back. </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599639</link><pubDate>Tue, 10 Nov 2020 14:39:11 -0000</pubDate><title>Message #4599639</title><guid isPermaLink="false">4599639@Uncensored</guid><description><![CDATA[<html><body>

<p>I still run into AOL and Yahoo accounts surprisingly often - but I haven't seen a Netscape address in decades, probably. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599603</link><pubDate>Tue, 10 Nov 2020 14:03:38 -0000</pubDate><title>Message #4599603</title><guid isPermaLink="false">4599603@Uncensored</guid><description><![CDATA[ > I wish someone would bring back the Netscape brand.  netscape.com   
 >simply redirects to AOL at this point.  How is AOL even still in   
 >business?   
  
 strangely enough, my girlfriend still has a @netscape.net email address that's
grandfathered in from the old old days. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599115</link><pubDate>Tue, 10 Nov 2020 04:13:01 -0000</pubDate><title>Message #4599115</title><guid isPermaLink="false">4599115@Uncensored</guid><description><![CDATA[ >I know that Edge is just Chrome..   
  
 ...and it's a decent way to surf the net when you're on a Windows machine.
 It's the same browser as Chrome, but with all the Google spyware removed
and Microsoft spyware replacing it.  But if you're on Windows, Microsoft is
watching anyway. 
  
 My rationale is that if I'm going to use Chrome on Windows, I might as well
use the version that can't be uninstalled.  If you install DuckDuckGo Privacy
Essentials, and add another extension to set the New Tab Page to anything
other than MSN, it is basically indistinguishable from Chrome. 
  
 I had been using Brave, a privacy-focused Chromium browser, but our IT department
asked me to remove it because it has a built-in Tor client, and IT doesn't
like that.  At home, I am using Dissenter, a close cousin of Brave that is
even more paranoid about privacy. 
  
 I wish someone would bring back the Netscape
brand.  netscape.com simply redirects to AOL at this point.  How is AOL even
still in business? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599109</link><pubDate>Tue, 10 Nov 2020 04:03:50 -0000</pubDate><title>Message #4599109</title><guid isPermaLink="false">4599109@Uncensored</guid><description><![CDATA[ >You are correct, as expected, the attack never materialized.  I didn't 
 
 >think it would -- but I just couldn't risk it.   
  
 What *is* happening, however, is that someone is trying to brute-force an
account -- any account, it seems.  They have our user list (which is public,
at least the screen names) and have been hitting random accounts with random
passwords for days now.  They are using IMAP to test passwords. 
  
 This is happening from a massive botnet of over 1000 machines.  But it's
happening at a slow rate of maybe ten tests per minute. 
  
 I'm not sure what they think they're going to do with someone else's account,
when it would have exactly the same privileges as an account they could just
create as a new user.  Are they spammers?  And if so, what kind of spammer
is clever enough to learn enough of Citadel to read the user list, but dumb
enough to fail to understand that
the vast majority of those users do not have permission to send Internet mail?

  
 If this is the same "Russian" hacker who promised to DDoS the site unless
I sent him a ransom payment, he's not very bright. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599061</link><pubDate>Tue, 10 Nov 2020 02:26:19 -0000</pubDate><title>Message #4599061</title><guid isPermaLink="false">4599061@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Mon Nov 09 2020 21:17:23 EST</span> <span>from LoanShark </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />It's an absolute, objective truth that I have been visiting the wrong sort of websites. What is the internet for, anyway? </div>
</div>
</blockquote>
<p>Quoted for Truth. ;) </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599054</link><pubDate>Tue, 10 Nov 2020 02:17:23 -0000</pubDate><title>Message #4599054</title><guid isPermaLink="false">4599054@Uncensored</guid><description><![CDATA[  
 It's an absolute, objective truth that I have been visiting the wrong sort
of websites. What is the internet for, anyway? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4599021</link><pubDate>Tue, 10 Nov 2020 00:55:57 -0000</pubDate><title>Message #4599021</title><guid isPermaLink="false">4599021@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Mon Nov 09 2020 19:12:49 EST</span> <span>from LoanShark </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY"><br />... you're talking to a guy who just had both nostrils raped today, for a mandatory test. <br /><br />I don't agree that DMV websites are the best (LOL), but I will be very happy when this is all over. <br /><br /><br />The DMV website was badly written. It failed on the callback from the payment provider they were using (I had to pay to purchase an accident report.) So they coded a simple URL redirect handshaking sequence that just fails on any modern browser. Lame. This really has nothing to do with the JavaScript-is-bad debate or anything like that. </div>
</div>
</blockquote>
<p>I didn't say DMV websites are the best... I said old websites are generally the best. You clearly have been visiting the wrong sort of old websites. :) <br /><br />I like sites that play well with my Amiga 500. Citadel is not one of those sites, even without encryption - but, there is always Telnet. :) <br /><br />.gov websites are generally the worst, regardless of if they're old or new. :) </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598995</link><pubDate>Tue, 10 Nov 2020 00:12:49 -0000</pubDate><title>Message #4598995</title><guid isPermaLink="false">4598995@Uncensored</guid><description><![CDATA[  
 ... you're talking to a guy who just had both nostrils raped today, for a
mandatory test. 
  
 I don't agree that DMV websites are the best (LOL), but I will be very happy
when this is all over.  
  
  
 The DMV website was badly written. It failed on the callback from the payment
provider they were using (I had to pay to purchase an accident report.) So
they coded a simple URL redirect handshaking sequence that just fails on any
modern browser. Lame. This really has nothing to do with the JavaScript-is-bad
debate or anything like that. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598953</link><pubDate>Mon, 09 Nov 2020 22:55:14 -0000</pubDate><title>Message #4598953</title><guid isPermaLink="false">4598953@Uncensored</guid><description><![CDATA[<html><body>

<p>Yeah, most likely I was trying to do something on a thoroughly obsolete web site. They're generally the best. Thoroughly modern technology rapes you, sells your personal information, and reports you to the feds for every deep secret thought you've ever fleeting entertained. </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598876</link><pubDate>Mon, 09 Nov 2020 20:23:02 -0000</pubDate><title>Message #4598876</title><guid isPermaLink="false">4598876@Uncensored</guid><description><![CDATA[  
 it's thoroughly obsolete, but that's why some sites only work on it 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598875</link><pubDate>Mon, 09 Nov 2020 20:19:19 -0000</pubDate><title>Message #4598875</title><guid isPermaLink="false">4598875@Uncensored</guid><description><![CDATA[<html><body>

<p>I've experienced this "only works on IE" thing on a couple of sites. Which ones they were escape me right now, or what set of steps made me think, "let's see how this page renders on IE..." <br /><br />But I remember being shocked that IE was beating Chrome at anything. </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598805</link><pubDate>Mon, 09 Nov 2020 18:34:23 -0000</pubDate><title>Message #4598805</title><guid isPermaLink="false">4598805@Uncensored</guid><description><![CDATA[  
 I actually bumped into a website the other day that was breaking under Chrome,
and only worked under IE. (I didn't attempt Edge or Firefox.) 
  
 You get three guesses which website, and the first two don't count: it was
the Department of Motor Vehicles. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598749</link><pubDate>Mon, 09 Nov 2020 17:15:51 -0000</pubDate><title>Message #4598749</title><guid isPermaLink="false">4598749@Uncensored</guid><description><![CDATA[<html><body>

<p>Another "Google is the new Microsoft" issue. <br /><br />Today I came in and my boss was losing his shit because his machine wasn't working and was crawling. Windows update was applying - and it was doing the thing where it takes 20 minutes to install, counting down the percentage, then on reboot, it gives you a DIFFERENT progress percentage countdown, that also crawls. I figured it was going to back it out, but it looks like the 2nd time it tried to apply it worked. <br /><br />At any rate - after applying, then his system was crawling. I had a look, and CPU utilization was at 50% or more at idle. Looking at the task list... I discovered Software Reporter Tool had two instances running and together they were running most of the 50+% of utilization being consumed... <br /><br />The irony is a Google search rats Google out: <br /><br />https://www.techpout.com/what-is-chrome-software-reporter-tool-and-how-to-block-it/<br /><br />I know that Edge is just Chrome.. <br /><br />But Chrome is really no bet
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598731</link><pubDate>Mon, 09 Nov 2020 17:12:04 -0000</pubDate><title>Message #4598731</title><guid isPermaLink="false">4598731@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Mon Nov 09 2020 09:58:00 EST</span> <span>from IGnatius T Foobar </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">That's interesting ... if it's anonymized now then it's been anonymized for about a year, since I switched to that registry. I wonder how they found my address. </div>
</div>
</blockquote>
<p>Anonymizing your WhoIS record requires a service that costs extra. For years I just put false information in my WhoIS contact information - but that can get you deregistered if they catch you. <br /><br />Now they've got the correct info, the registrar doesn't send me threatening e-mails about my WhoIs info being fake, and I've got a level of protection me between and the Internet fruitcake stalkers. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598720</link><pubDate>Mon, 09 Nov 2020 17:01:20 -0000</pubDate><title>Message #4598720</title><guid isPermaLink="false">4598720@Uncensored</guid><description><![CDATA[  
 I dunno, I was actually having trouble querying their server, so I could
be mistaken. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4598589</link><pubDate>Mon, 09 Nov 2020 14:58:00 -0000</pubDate><title>Message #4598589</title><guid isPermaLink="false">4598589@Uncensored</guid><description><![CDATA[That's interesting ... if it's anonymized now then it's been anonymized for
about a year, since I switched to that registry.  I wonder how they found
my address. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4597972</link><pubDate>Sun, 08 Nov 2020 22:45:27 -0000</pubDate><title>Message #4597972</title><guid isPermaLink="false">4597972@Uncensored</guid><description><![CDATA[  
 For what it's worth, I hope your whois record is anonymized. Looks like it
is, at least, now. 
  
 You don't *want* to make it impossible for people looking at the website
to contact you, but at least you can make it at little harder to automate
that. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4597758</link><pubDate>Sun, 08 Nov 2020 15:12:50 -0000</pubDate><title>Message #4597758</title><guid isPermaLink="false">4597758@Uncensored</guid><description><![CDATA[You are correct, as expected, the attack never materialized.  I didn't think
it would -- but I just couldn't risk it. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4596223</link><pubDate>Thu, 05 Nov 2020 23:52:15 -0000</pubDate><title>Message #4596223</title><guid isPermaLink="false">4596223@Uncensored</guid><description><![CDATA[ > I received an email from DDoS extortion scammers, announcing that     
 
 >www.citadel.org (the Citadel project web site, not Uncensored) is going
     
 >to get DDoSed starting November 2, unless they are paid off with a     
 
 >large amount of bitcoin.       
      
 Everybody who has a website gets tons of those every frigging month.    

    
 Most of those threats are not worth the bits used to deliver them.   
  
 I am fed up of receiving warnings that they are gonig to crash my websites
using an unpatched plugin exploit when the website has no plugins engine at
all. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4595126</link><pubDate>Mon, 02 Nov 2020 15:26:21 -0000</pubDate><title>Message #4595126</title><guid isPermaLink="false">4595126@Uncensored</guid><description><![CDATA[  
 Yeah. Figures. Good luck with the new (old) arrangements. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4594819</link><pubDate>Sun, 01 Nov 2020 20:09:08 -0000</pubDate><title>Message #4594819</title><guid isPermaLink="false">4594819@Uncensored</guid><description><![CDATA[Well, here's why I was concerned.  I wasn't able to say this before but I
can now. 
  
 As some of you might remember, in 2007 I moved all of the Citadel sites (including
this one) from my home server, which was attached to 1 Mbps DSL, to a server
at a real hosting company -- one that I happen to work for.  At the time,
we were a company of about 20 people.  Since then, we have grown to 40+ locations
and 1000+ people.  So even if the risk of a real DDoS was small, I had to
deal with the threat, because if it happened, the question "Which customer
was attacked?" would be asked, even if we successfully mitigated the attack.

  
 Less than two years ago, someone from my department (but in another part
of the country) was fired for having a personal server that got attacked --
but in his case, the server was attached to both the public Internet and the
corporate network, it let some malware into
both our network and some customers, and he was warezing and torrenting on
it.  I explained to our boss that my server was strictly Internet only, and
that I was using it to host an open source project and an associated community
bulletin board.  So he was ok with it, but he advised me that if it was the
target of a DDoS attack that had collateral damage, his ability to protect
me might not be sufficient. 
  
 So as of this weekend, all of the citadel.org sites are once again hosted
from my home.  But this time, instead of DSL, I obtained a VPN tunnel service
from the very same company I had DSL with in the past -- Ace Innovative Solutions.
 They are super friendly to people like me.  Check out the "I Want Broadband
Everything" room to see a more detailed description of the service. 
  
 Bottom line, the likelihood of the attack materializing is very small, but
the consequences to me if
it did happen would have been significant.  Although ... it would have been
ironic to have lost my job over my work on Citadel, considering that my work
on Citadel is part of what got me this job nearly 20 years ago. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4594785</link><pubDate>Sun, 01 Nov 2020 18:22:48 -0000</pubDate><title>Message #4594785</title><guid isPermaLink="false">4594785@Uncensored</guid><description><![CDATA[ > I think I'd just the plug on citadel.org DNS--delete the www A   
  
 (only if they actually attack, I mean) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4594784</link><pubDate>Sun, 01 Nov 2020 18:21:57 -0000</pubDate><title>Message #4594784</title><guid isPermaLink="false">4594784@Uncensored</guid><description><![CDATA[  
 You're right to call their bluff, and ignore their emails. 
  
 I think I'd just the plug on citadel.org DNS--delete the www A record--and
wait for them to get bored and go away. Their ability to DDoS someone, even
with a botnet of hacked devices, is a finite resource that they will only
use if they expect to get paid. 
  
 If they're unusually persistent, send us a raw IP address to log into :)

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4593784</link><pubDate>Wed, 28 Oct 2020 13:27:15 -0000</pubDate><title>Message #4593784</title><guid isPermaLink="false">4593784@Uncensored</guid><description><![CDATA[  
 Sooo ... we might have some trouble. 
  
 I received an email from DDoS extortion scammers, announcing that www.citadel.org
(the Citadel project web site, not Uncensored) is going to get DDoSed starting
November 2, unless they are paid off with a large amount of bitcoin. 
  
 Obviously I don't have the kind of money they are asking for, because I operate
the project as a hobby.  The email says they are doing a half hour warning
shot today to prove they're for real, but I may have missed it.  I am less
concerned with the site being offline for a couple of days, and more thinking
about where I might move it out of the way so it hits someone else's network.

  
 The attackers claim to be the Russian hacking group "Cozy Bear" but a web
search brings up articles suggesting that the people doing DDoS attacks are
impostors using the name. 
  
 Anyway, if we go dark on November 2, just wait a couple of days and come
on back. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4586329</link><pubDate>Fri, 25 Sep 2020 21:04:14 -0000</pubDate><title>Message #4586329</title><guid isPermaLink="false">4586329@Uncensored</guid><description><![CDATA[That's pretty common with MFA providers..... 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4585957</link><pubDate>Wed, 23 Sep 2020 13:21:53 -0000</pubDate><title>Message #4585957</title><guid isPermaLink="false">4585957@Uncensored</guid><description><![CDATA[ > Now now. Report to your CCNA reeducation center for AnyConnect   
 >training.   
  
 @#$%$^&&*^^%$#@$ AnyConnect. 
  
 ${WORK} decided to enable two-factor authentication on our AnyConnect.  I'm
totally ok with that, except they did it in a way that displays an HTML screen
from the 2FA provider.  This breaks start-before-login, and breaks third party
clients. 
  
 "Security is an illusion.  Data security, doubly so."   -- Ford Prefect 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4577131</link><pubDate>Sun, 09 Aug 2020 07:30:06 -0000</pubDate><title>Message #4577131</title><guid isPermaLink="false">4577131@Uncensored</guid><description><![CDATA[  
 Now now. Report to your CCNA reeducation center for AnyConnect training.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4571679</link><pubDate>Fri, 17 Jul 2020 16:32:10 -0000</pubDate><title>Message #4571679</title><guid isPermaLink="false">4571679@Uncensored</guid><description><![CDATA[Interesting development in the world of consumer-grade VPNs. 
  
 https://blog.mozilla.org/blog/2020/07/15/mozilla-puts-its-trusted-stamp-on-vpn/

  
 Mozilla has rolled out a VPN service of its own.  The interesting part is
not that it's from Mozilla, but that it's based on WireGuard.  I've been watching
the WireGuard project very closely and have been considering setting up a
VPN of my own with it. 
  
 WireGuard is *very* lean compared to IPSEC. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4528957</link><pubDate>Fri, 28 Feb 2020 19:21:16 -0000</pubDate><title>Message #4528957</title><guid isPermaLink="false">4528957@Uncensored</guid><description><![CDATA[<html><body>

<p>I use LastPass. It is centralized but also locally stored in an encrypted store. I'm able to sync across multiple browsers/machines, plus I can use it on my phone. The phone app also pops up options to autofill for other apps on my phone, which is convenient.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4527256</link><pubDate>Fri, 21 Feb 2020 19:08:31 -0000</pubDate><title>Message #4527256</title><guid isPermaLink="false">4527256@Uncensored</guid><description><![CDATA[KeePass is still good, with the benefit of not being stored in a central location
for someone to scoop up a-mission-and-one users' passwords. Not perfect security,
but does a nice balance between security and convienance.  
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4526378</link><pubDate>Tue, 18 Feb 2020 13:49:50 -0000</pubDate><title>Message #4526378</title><guid isPermaLink="false">4526378@Uncensored</guid><description><![CDATA[ > I'm giving some consideration towards letting the browser generate and
       
 >remember my passwords to various sites, instead of keeping track myself
       
 >and letting the browser remember it merely as a convenience.         
        
 I would not let my web browser administrate my password.       
      
 For less important stuff, I have pass (I think it is packaged as password-store
for debian), which is a CLI password manager. I have it on a self-hosted shell
account. This way I can access my password manager from anywhere I have a
secure terminal for sshing into my server.     
    
 The compromising stuff lives in a Tails intance and is stored in Keepassxc.
So ti is encryted twice: once at filesystem level, anothe at application level.
  
  
 The really important stuff I learn by heart. I have some of those passwords
noted down in a notebook and stored in a safe just in case I am put to pressure
one day and cannot remember a password. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4526163</link><pubDate>Mon, 17 Feb 2020 17:12:00 -0000</pubDate><title>Message #4526163</title><guid isPermaLink="false">4526163@Uncensored</guid><description><![CDATA[ >Has anyone experience or thoughts on various password manager schemes  

  
 Funny that this was the inaugural message in this room in 2015, because I
have the same question now. 
  
 I'm giving some consideration towards letting the browser generate and remember
my passwords to various sites, instead of keeping track myself and letting
the browser remember it merely as a convenience. 
  
 What's trustworthy these days?  What's reliable?  Sig, did you have any luck
with the hardware token?  Like most people these days, I'm using Chrome, but
there's always the concern that anything tied to Google is problematic.  Lastpass?
 Keepass?  Something else? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4487603</link><pubDate>Wed, 25 Sep 2019 16:24:39 -0000</pubDate><title>Message #4487603</title><guid isPermaLink="false">4487603@Uncensored</guid><description><![CDATA[As long as you're alive, it's never too late to call on God.  You may only
have seconds to live, but that final moment of faith could have a significant
effect on what happens next. 
  
 But you knew that. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4483285</link><pubDate>Mon, 09 Sep 2019 14:53:04 -0000</pubDate><title>Message #4483285</title><guid isPermaLink="false">4483285@Uncensored</guid><description><![CDATA[  
 By which time it's probably too late. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4483156</link><pubDate>Mon, 09 Sep 2019 05:26:13 -0000</pubDate><title>Message #4483156</title><guid isPermaLink="false">4483156@Uncensored</guid><description><![CDATA[<html><body>

<p> </p>
<blockquote>
<div class="message_header"><span>Fri Sep 06 2019 10:09:31 EDT</span> <span>from IGnatius T Foobar </span></div>
<div class="message_content">
<div class="fmout-JUSTIFY">That kind of usage is specifically a mormon thing. It's a slightly different take, because mormon is not mainline Christianity. </div>
</div>
</blockquote>
<p>Yup. It definitely conveys a different, more direct relationship with God Himself than say, a Protestant or Catholic would express. <br /><br />We would refer to the Lord... God... <br /><br />Jesus is kind of our go-between - as Protestants - and Mary, if you're a Catholic. But both kind of operate on an assumption that God is busy and although He doesn't miss *anything* - you better only invoke him personally if your car is about to go over a cliff. </p>
<p> </p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4482452</link><pubDate>Fri, 06 Sep 2019 14:09:31 -0000</pubDate><title>Message #4482452</title><guid isPermaLink="false">4482452@Uncensored</guid><description><![CDATA[That kind of usage is specifically a mormon thing.  It's a slightly different
take, because mormon is not mainline Christianity. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4482018</link><pubDate>Thu, 05 Sep 2019 02:11:03 -0000</pubDate><title>Message #4482018</title><guid isPermaLink="false">4482018@Uncensored</guid><description><![CDATA[It has to do with how it is used. Most "Christian" denominations will refer
to "The Heavenly Father." It isn't used as a proper noun so much as a descriptive
one. They'll call him God, the Lord, the Lord God, Jehovah, Yaweh... and "The
Heavenly Father."  
  
 Mormons call him, "Heavenly Father," as a proper noun. Like, if they met
Him, they would address Him that way. "Heavenly Father, I beseech you to have
mercy on me!" I'm not quite getting it right here, but it is in the manner
of speech in how they use it. If you hear a person say something like, "If
I am in doubt, I ask Heavenly Father for guidence, and He grants it to me
in His wisdom," you're not talking to a Catholic or a Protestant. We recognize
it as something *different* than us, and they're using it that way for that
reason. It is a special language that conveys in-group membership.  
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4481842</link><pubDate>Wed, 04 Sep 2019 13:50:40 -0000</pubDate><title>Message #4481842</title><guid isPermaLink="false">4481842@Uncensored</guid><description><![CDATA[  
 Probably not just Mormon, as I've heard it used by other Christians. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4481745</link><pubDate>Wed, 04 Sep 2019 05:10:14 -0000</pubDate><title>Message #4481745</title><guid isPermaLink="false">4481745@Uncensored</guid><description><![CDATA[Sure... in AD&D, they call them "cants," like a "thieves cant". Ingroup language.
Both sides use it. Religious people do it too. I had a worker once who referred
to God as "Heavenly Father." It was strange.  
  
 "When I feel challenged, I ask Heaveny Father for guidence, and Heavenly
Father gives me direction. If I listen, I am usually rewarded."  
  
 Turns out this language is Mormonism. Jesus Christ, Mother of Mary...  
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4473825</link><pubDate>Thu, 08 Aug 2019 14:50:48 -0000</pubDate><title>RE: Diversity</title><guid isPermaLink="false">4473825@Uncensored</guid><description><![CDATA[<html><body>

<p>I concur with your assessment regarding diversity and racism.</p>
<p> </p>
<p>You know, somebody in th I2P official irc network brought the subject up. It turns out the Chinese already knew that language deformation (for example, inclusive language) serves the purpose of identifying your enemies and allies. It works like follows.</p>
<p> </p>
<p>You and your lobby create a stupid languageism. For example, you decide to stop calling encryption tools encryption tools, and call them "tools for obfuscating terrorist activity". After a while, you check who has adopted the term. Anybody who still uses "encryption tool" is not one of yours. Anybody who says that openssl is a terrorism activity obfuscation tool is one of yours. Notice that you don't have to openly ask people which side of the fence they are standing at... you only have to listen to their regular talk in order to know who to befriend and how to mark for annihilation.</p>
<p> </p>
<p>Things like modern codes of conduct and inclusive language are just this. A means to mark developer teams as friends o foes. If you don't have a code of conduct you are a fascist bastard and must be destroyed. When a development team adopts one of these, they are not just adopting. They are publicly declaring who they are siding with.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4463643</link><pubDate>Mon, 01 Jul 2019 16:09:00 -0000</pubDate><title>Message #4463643</title><guid isPermaLink="false">4463643@Uncensored</guid><description><![CDATA[I'll be 67 years old then.  Gosh, I hope I don't live that long. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4463635</link><pubDate>Mon, 01 Jul 2019 14:54:13 -0000</pubDate><title>Message #4463635</title><guid isPermaLink="false">4463635@Uncensored</guid><description><![CDATA[  
 I would have thought you'd have gone for 2038-01-19 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4463621</link><pubDate>Mon, 01 Jul 2019 13:47:24 -0000</pubDate><title>Message #4463621</title><guid isPermaLink="false">4463621@Uncensored</guid><description><![CDATA[This could have been good if he hadn't woven a discredited political narrative
throughout the whole article.  So let's take apart the legitimate concerns
and unpack this a bit. 
  
 * Panic spreads fast.  Panic spreads even faster on social media.  In the
event of a highly contagious, potentially lethal, and difficult to treat outbreak
... would it make sense to shut down Twitter?  Is such a suppression of information
even possible?  And if it is, can that technique be abused by bad actors for
non-lethal reasons? 
  
 * For a subject like this, who *IS* a credible source?  No one trusts anyone
anymore. 
  
 * No one wants to see their own family and friends die, and most people aren't
ready to die early (except for me, I want to die on 2023-mar-10) ... BUT ...
it could be argued that we're overdue for a mass die-off.  Losing a few hundred
million people, particularly from the more populous societies, would ease
the strain humanity places on the global environment. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4463458</link><pubDate>Sun, 30 Jun 2019 21:51:48 -0000</pubDate><title>Message #4463458</title><guid isPermaLink="false">4463458@Uncensored</guid><description><![CDATA[<GRIN> 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4462773</link><pubDate>Thu, 27 Jun 2019 19:16:40 -0000</pubDate><title>Message #4462773</title><guid isPermaLink="false">4462773@Uncensored</guid><description><![CDATA[  
 I reconcur? ;-p 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4461353</link><pubDate>Fri, 21 Jun 2019 21:36:58 -0000</pubDate><title>Message #4461353</title><guid isPermaLink="false">4461353@Uncensored</guid><description><![CDATA[That looks disfortunate. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4461315</link><pubDate>Fri, 21 Jun 2019 18:13:59 -0000</pubDate><title>Message #4461315</title><guid isPermaLink="false">4461315@Uncensored</guid><description><![CDATA[  
 Nice article from Bruce Schneier on the intersection of pandemics, medical
tinfoil-hatters, and other disinformation. 
  
 https://www.nytimes.com/2019/06/17/opinion/pandemic-fake-news.html 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4454836</link><pubDate>Thu, 30 May 2019 06:00:06 -0000</pubDate><title>Message #4454836</title><guid isPermaLink="false">4454836@Uncensored</guid><description><![CDATA[<html><body>

<p>Intel has really... really become good at it, though. <br /><br />They like to lead. </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4454729</link><pubDate>Thu, 30 May 2019 00:22:01 -0000</pubDate><title>Message #4454729</title><guid isPermaLink="false">4454729@Uncensored</guid><description><![CDATA["diversity" when spoken by anyone other than a radio engineer means "racism
and sexism is ok as long as you're oppressing white males".  This isn't anything
Intel-specific. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4449466</link><pubDate>Tue, 14 May 2019 01:22:56 -0000</pubDate><title>Message #4449466</title><guid isPermaLink="false">4449466@Uncensored</guid><description><![CDATA[Indian Business Machines. Heh. That made me think that Intel's new logo should
be Indians Inside. Seriously, look up Folsom Intel Diversity Day on Youtube.
By diversity they mean, "we replaced all the old white men with Indians."
 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4445307</link><pubDate>Wed, 01 May 2019 04:19:48 -0000</pubDate><title>Message #4445307</title><guid isPermaLink="false">4445307@Uncensored</guid><description><![CDATA[Feh.  Some of these spyware, er, I mean "endpoint security" tools really slow
down your browser.   
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4423321</link><pubDate>Fri, 15 Feb 2019 19:48:50 -0000</pubDate><title>Message #4423321</title><guid isPermaLink="false">4423321@Uncensored</guid><description><![CDATA[  
 (Didn't impact us to that degree because we don't use Fargate) 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4423320</link><pubDate>Fri, 15 Feb 2019 19:48:35 -0000</pubDate><title>Message #4423320</title><guid isPermaLink="false">4423320@Uncensored</guid><description><![CDATA[  
 Maybe it actually was doomsday in a sense - this issue impacted Fargate,
meaning it could have allowed one AWS customer to compromise another AWS customer:
https://aws.amazon.com/security/security-bulletins/AWS-2019-002/ 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4423060</link><pubDate>Thu, 14 Feb 2019 21:22:01 -0000</pubDate><title>Message #4423060</title><guid isPermaLink="false">4423060@Uncensored</guid><description><![CDATA[Containers seem to make sense as the ultimate package management tool ...
but there are also service providers who like to treat them as lightweight
virtual machines ... particularly the ones like Google who suck at virtual
machines.  
  
 But considering the tight kernel integration, it seems that there will be
a lot of privilege escalation bugs on the way. 
  
 I want to understand more about containers in a service provider environment,
because I work for a service provider and we don't currently have a container
strategy. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4422389</link><pubDate>Tue, 12 Feb 2019 13:43:08 -0000</pubDate><title>Message #4422389</title><guid isPermaLink="false">4422389@Uncensored</guid><description><![CDATA[    
 "Doomsday" is absurd. First an attacker has to break into the container from
the app before they can break out of the container.   
  
  
 Most people running containers are hosting all the same organization's assets
on that shared kernel, and we're using containers as much for management and
fault tolerance as for security. 
  
 There's always another privilege escalation bug. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4422217</link><pubDate>Tue, 12 Feb 2019 01:42:12 -0000</pubDate><title>Message #4422217</title><guid isPermaLink="false">4422217@Uncensored</guid><description><![CDATA[I've been suspect of Docker when it comes to security since I first learned
of containers....     
  
  
 https://www.zdnet.com/article/doomsday-docker-security-hole-uncovered/ 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4323129</link><pubDate>Thu, 30 Nov 2017 04:09:26 -0000</pubDate><title>Message #4323129</title><guid isPermaLink="false">4323129@Uncensored</guid><description><![CDATA[...aaaaaaaaand just like that, the year-end layoffs are being distributed
as badly chosen Christmas presents at India Business Machines. 
  
 Seriously, there's very little left of IBM anymore.  It's now just an accounting
firm that dabbles in technology.  30 years ago I wouldn't have dreamed of
ever saying this, but I miss the Incongruous Blue Monoliths. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4321314</link><pubDate>Mon, 20 Nov 2017 22:52:15 -0000</pubDate><title>Message #4321314</title><guid isPermaLink="false">4321314@Uncensored</guid><description><![CDATA[<html><body>

<p>&lt;laughs&gt;  In this case, it's that small business unit that is still International Business Machines.  It's hard to find these days, but there is still a bit of it lingering around.  :-)</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4321288</link><pubDate>Mon, 20 Nov 2017 22:13:26 -0000</pubDate><title>Message #4321288</title><guid isPermaLink="false">4321288@Uncensored</guid><description><![CDATA[India Business Machines, the former technology company? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4321259</link><pubDate>Mon, 20 Nov 2017 20:05:11 -0000</pubDate><title>Message #4321259</title><guid isPermaLink="false">4321259@Uncensored</guid><description><![CDATA[<html><body>

<p>That second link is a blog run by that team's leadership, btw</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4321257</link><pubDate>Mon, 20 Nov 2017 20:04:33 -0000</pubDate><title>Message #4321257</title><guid isPermaLink="false">4321257@Uncensored</guid><description><![CDATA[<html><body>

<p style="text-align: justify;">IG, IBM's "X-Force threat intelligence database" is the database that houses the intelligence and research performed by the IBM X-Force Research team, which is a highly respected commercial security research team.  Much of their research is published on the X-Force Exchange, which is a "cloud-based threat intelligence sharing platform enabling users to rapidly research the latest security threats, aggregate actionable intelligence and collaborate with peers."</p>
<p style="text-align: justify;">https://www.ibm.com/security/xforce/</p>
<p style="text-align: justify;">https://securityintelligence.com/</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4321241</link><pubDate>Mon, 20 Nov 2017 19:12:47 -0000</pubDate><title>Message #4321241</title><guid isPermaLink="false">4321241@Uncensored</guid><description><![CDATA[  
 Everyone knows about the 8.8.8.8 Google DNS server. 
  
 Now there's a new one at 9.9.9.9, called "Quad9 DNS" service, that checks
all requests against IBM's "X-Force threat intelligence database" -- whatever
that is. 
  
 And just like Google, IBM has managed to keep itself from laughing uncontrollably
while claiming they wouldn't use DNS lookup data to snoop on users' privacy.

  
 I'm more concerned about the 10.10.10.10 server.  That one, somehow, has
managed to gain access to my private network. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4269698</link><pubDate>Tue, 16 May 2017 13:00:52 -0000</pubDate><title>Message #4269698</title><guid isPermaLink="false">4269698@Uncensored</guid><description><![CDATA[  
 Hmm... such a big todo about security lately, what with all those breakins
overseas. 
  
 Hospitals victims of ransomware... ugh... 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4102420</link><pubDate>Fri, 12 Aug 2016 18:04:44 -0000</pubDate><title>Re: additional tags: #rants #workplace</title><guid isPermaLink="false">4102420@Uncensored</guid><description><![CDATA[<html><body>

<p>Disabling DHCP as a means of keeping away an intruder who has already gained access to the physical network is only going to slow them down by a tiny bit.  They'll just sniff the wire for a minute or two to figure out its addressing scheme, and look for traffic on port 53 to learn the location of the DNS servers.  In fact, a <em>good</em> attacker will do that even in the presence of a DHCP server, to avoid having any DHCP requests logged.</p>
<p>I haven't seen a lot of access networks having DHCP disabled as a security measure.  What I <em>do</em> see often though, in a larger organization, is the Windows, Linux, and Network teams fighting over who gets to run the DHCP server, and gains the control it offers.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4102149</link><pubDate>Fri, 12 Aug 2016 07:40:33 -0000</pubDate><title>additional tags: #rants #workplace</title><guid isPermaLink="false">4102149@Uncensored</guid><description><![CDATA[<html><body>

<p>It seems to be a common "best practice" by windows admins to disable DHCP as a layer of security, so that it "is harder to hack the network". Ok, I have only seen this at two clients side, but both of them share the following:</p>
<p>1. It is incredibly hard to do any normal admin work, like hooking up a new computer, replace a network device, etc. Because you need to put the MAC address on the whitelist and maybe add a distinct address to the host. The result is, people issue a hardwired IP in the device and forget to document that.</p>
<p>2. They use the worst passwords ever, enforce absolutely no password policy and users never have to change their passwords.</p>
<p> </p>
<p>They use passwords like "pass" in the one place, for admin accounts. In the other place, there are local admin accounts on the machines with absolutely no password at all. And all the switches communicate with the "intelligent management console" via ... telnet. Logging in with the very same masterpassword... which is slightly identical to the domain admin password. Oh, and most important people share the very same simple password for all their computer accounts, "because we need to use the other persons computer a lot". (In a domain scenario, where you could login with your own account to the other computer. But people do not save files on the server, they use their own desktop, so..)</p>
<p>So, while I as an admin that only hooks up gear to the network have to jump through hoops and get to enjoy typing in hundreds of MAC adresses, the people with the most confidential data act like total retards and only need to memorize one utterly mongoloid password. Which is also a common term at the place, so it is easily guessable on top of all that.</p>
<p>Lesson learned: "Der Fisch fängt immer am Kopf an zu stinken." A german proverb, stating that the fish begins to smell from the head on, when it rots. In all places I have worked for, the more important the people or the files, the more stupid the passwords and the behavior. (Guess where the master password list is stored in clear text?!)</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4101129</link><pubDate>Wed, 10 Aug 2016 03:54:53 -0000</pubDate><title>Message #4101129</title><guid isPermaLink="false">4101129@Uncensored</guid><description><![CDATA[When I used to do Sarbanes-Oxley remediations and change control implementations
I would inevitable be in a CTO's office on the third or fourth day of the
project and hand them a list of 20 passwords. They'd look at me incredulously.
I'd tell them "You have great password security.. 10 characters. Must have
upper, lower, number and or symbol. Changes required every 90 days. No repetitions
from previous passwords. No repeating characters. Just superb.. No one can
rememebr their passwords. It's all written on sticky notes on their monitors.
Let's come up with something more useful." 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4099058</link><pubDate>Fri, 05 Aug 2016 16:23:38 -0000</pubDate><title>Message #4099058</title><guid isPermaLink="false">4099058@Uncensored</guid><description><![CDATA[The reason the XKCD hint is so popular is because it describes the problem
in terms anyone can understand.  Long passwords are better than complex passwords.
 Password complexity requirements make people write down their passwords (or
store them in some unsecure location online) which completely ruins the whole
objective. 
  
 And although all reasonable people understand that, the people who do security
policy all seem to stick with complexity requirements because that's the current
"standard" and no one wants to go out on a limb to buck it.  Realistically,
password policies should be like "contain a symbol or hieroglyphics *or* be
more than 20 characters" 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4099015</link><pubDate>Fri, 05 Aug 2016 15:05:51 -0000</pubDate><title>Message #4099015</title><guid isPermaLink="false">4099015@Uncensored</guid><description><![CDATA[<html><body>

<p>http://arstechnica.com/security/2016/08/frequent-password-changes-are-the-enemy-of-security-ftc-technologist-says/</p>
<p>This article annoys me. The example provided just is a piss poor excuse for bad password changing policy. Which is used almost anywhere, I acknowledge.</p>
<p>Admin's should be way more demanding, 50% difference to all previous passwords, or something like that. I dunno how feasable that is with hashed and salted passwords, though.</p>
<p>In general, passwords should be at least 20 chars long and they must not contain a number. There are only 10 digits, why reduce your entropy on one char, if you could simply demand one char more and let the user choose it? People will use a 1 or their birthdate (visible on facebook) or some other stupid number.</p>
<p>On long term, we need to overcome passwords, there must be something smarter. My 30 char long passphrases are a nightmare on touchscreens to enter. And the more often you mistype, the easier it is for somebody to spy on your fingers.</p>
<p>The problem with passwords at all my clients is always the boss or the bosses. They choose the easiest and worst passwords ever, I even have one that uses 12345, another site uses a common 4 letter word for admin logins (and at the same time disable dhcp for security reasons, so the network is harder to hack *...). They always want to know the passwords of everyone else, so they can "log in to their computers, if needed." So passwords need to be stored on paper somewhere in the office, which then lands on the server as a scanned page. Or there is a password text file on the public share.</p>
<p>So, besides the xkcd hint, is there any good guide that a boss would understand for a password policy in the office?</p>
<p>* This disabling dhcp hack is a common security by obscurity trick, that would have stopped me for like 15 minutes when I was 14. In the age of ubiquitious internet, it does probably only stop the persons that want to use the network with good intentions.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4085820</link><pubDate>Sun, 10 Jul 2016 03:37:40 -0000</pubDate><title>Message #4085820</title><guid isPermaLink="false">4085820@Uncensored</guid><description><![CDATA[Yup. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4039679</link><pubDate>Mon, 28 Mar 2016 15:59:53 -0000</pubDate><title>Message #4039679</title><guid isPermaLink="false">4039679@Uncensored</guid><description><![CDATA[ >Why would they do that?  Data encryption at rest is more important  
 >than ever.   
  
 Oh, was this in response to the Amazon FireOS comment? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4038873</link><pubDate>Sat, 26 Mar 2016 14:34:31 -0000</pubDate><title>Message #4038873</title><guid isPermaLink="false">4038873@Uncensored</guid><description><![CDATA[<html><body>

<p>*This* is why we can't have nice things.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4038872</link><pubDate>Sat, 26 Mar 2016 14:21:57 -0000</pubDate><title>Message #4038872</title><guid isPermaLink="false">4038872@Uncensored</guid><description><![CDATA[<html><body>

<p>you should cosider that in case of device loss you may not want the finder be able to access your data.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4038795</link><pubDate>Sat, 26 Mar 2016 02:23:54 -0000</pubDate><title>Message #4038795</title><guid isPermaLink="false">4038795@Uncensored</guid><description><![CDATA[<html><body>

<p>For a lot of people, getting your work email on your phone requires accepting a device policy that gives the administrator of the email server permission to remote-wipe the device.  And of course there are mobile device managers that can get even more heinous than that.</p>
<p>If device manufacturers truly cared about their customers, they would create a mode where it tells the email server that it was given permission to remote-wipe the device, but if such a request actually comes across, tells the server to go shit in its hat.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4037777</link><pubDate>Thu, 24 Mar 2016 19:02:45 -0000</pubDate><title>Message #4037777</title><guid isPermaLink="false">4037777@Uncensored</guid><description><![CDATA[  
 Huh? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4037665</link><pubDate>Thu, 24 Mar 2016 15:31:25 -0000</pubDate><title>Message #4037665</title><guid isPermaLink="false">4037665@Uncensored</guid><description><![CDATA[<html><body>

<p>Why would they do that?  Data encryption at rest is more important than ever.</p>
<p>I'd actually be far more interested in seeing device vendors set up a mode where the device tells your employer's email server "yeah yeah, you have permission to remote wipe the device etc. etc." but not actually do that.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4026897</link><pubDate>Mon, 14 Mar 2016 11:49:15 -0000</pubDate><title>Message #4026897</title><guid isPermaLink="false">4026897@Uncensored</guid><description><![CDATA[  
 Seems equally plausible that the attackers co-opted a normal user or plant
operator level account first, and gradually escalated their privileges once
they gained a toehold. They had plenty of time to do that - 6 months or so.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4026681</link><pubDate>Mon, 14 Mar 2016 04:41:48 -0000</pubDate><title>Message #4026681</title><guid isPermaLink="false">4026681@Uncensored</guid><description><![CDATA[<html><body>

<p>Good read LoanShark.  Thanks for posting.  I hate to think that sysadmins were the weak link here, but I suppose some of them can be co-opted to run a MS Word macro.</p>
<p> Paranoia, the destroyer.</p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4024859</link><pubDate>Sat, 12 Mar 2016 10:57:42 -0000</pubDate><title>Message #4024859</title><guid isPermaLink="false">4024859@Uncensored</guid><description><![CDATA[  
 Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid 
  
 http://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

  
 (The conventional wisdom is clearly wrong; this hack wasn't perpetrated by
Putin & Co; it was obviously done by Bernie Sanders' campaign staff in an
unauthorized data-trolling operation. More on that theory later when I'm sober.)

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4022971</link><pubDate>Tue, 08 Mar 2016 15:46:10 -0000</pubDate><title>Message #4022971</title><guid isPermaLink="false">4022971@Uncensored</guid><description><![CDATA[<html><body>

<p>I was in such shock to see Ed Shultz still on TV it didn't think too much about McAffee's statement.  he said he was lying. I think we knew that,</p>
<p>http://www.news.com.au/technology/online/security/john-mcafee-said-he-lied-about-how-he-would-crack-iphone-to-draw-attention-to-the-deception-of-the-fbi/news-story/83796467e74b31c1c2ea5717406a77e9</p>
<p>But he had a reason to do it.</p>
<p>McAffees motto should be "Whose to blame?  Hookers and cocaine!"</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4022013</link><pubDate>Sun, 06 Mar 2016 16:18:34 -0000</pubDate><title>Message #4022013</title><guid isPermaLink="false">4022013@Uncensored</guid><description><![CDATA[And then put it back 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4021397</link><pubDate>Fri, 04 Mar 2016 19:10:36 -0000</pubDate><title>Message #4021397</title><guid isPermaLink="false">4021397@Uncensored</guid><description><![CDATA[<html><body>

<p>Amazon removed encryption from the latest version of Fire OS</p>
<p>http://mashable.com/2016/03/04/amazon-removed-encryption-fire-os/#R5nLdj91AGqj</p>
<p> </p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4021291</link><pubDate>Fri, 04 Mar 2016 14:37:17 -0000</pubDate><title>Message #4021291</title><guid isPermaLink="false">4021291@Uncensored</guid><description><![CDATA[<html><body>

<p>I tried searching for a video clip of Sgt Shultz but I don't want to watch him to see if I found the correct one.  There is a clip of him angrily screaming on his MSNBC show about how terrible it is when old fat white guys are angry and scream about things.  I think it was directed at Rush Limbaugh.</p>
<p>I had read that Shultz started off as a conservative talk show host but that market was already dominated by Rush so he went with the far left shtick.  I don't know. </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4021170</link><pubDate>Fri, 04 Mar 2016 06:36:08 -0000</pubDate><title>Message #4021170</title><guid isPermaLink="false">4021170@Uncensored</guid><description><![CDATA[<html><body>

<p>I remember when Ed was still doing radio on WDAY out of "Margo's Forehead"- Fargo / Morehead back in the day.  Oh, how the local Libertarians would have fun with him on his call in talk show.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=4020344</link><pubDate>Wed, 02 Mar 2016 15:09:50 -0000</pubDate><title>Message #4020344</title><guid isPermaLink="false">4020344@Uncensored</guid><description><![CDATA[<html><body>

<p>John McAffee explains how easy it is to break into any phone.</p>
<p>http://www.youtube.com/watch?v=MG0bAaK7p9s</p>
<p>This is amazing information, what I find most interesting about this video is that Ed Shultz is still on TV.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3999539</link><pubDate>Wed, 20 Jan 2016 11:51:46 -0000</pubDate><title>Message #3999539</title><guid isPermaLink="false">3999539@Uncensored</guid><description><![CDATA[<html><body>

As you have suggested , itś that Honda Civic is truly a death trap.
Having worked in the towing industry (1980ś) , no one has survived a
major crash, seriously, every Civic in the tow yard had fatal crashes.  
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950986</link><pubDate>Thu, 23 Jul 2015 01:12:09 -0000</pubDate><title>Message #3950986</title><guid isPermaLink="false">3950986@Uncensored</guid><description><![CDATA[  
 The concern is that any modern car with integrated electronics might have
risks we do not know about. 
  
 I don't mind my car's stereo and entertainment system being kept as far from
the functioning of the transmission, steering wheel, and other such parts
of the car as possible. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950837</link><pubDate>Wed, 22 Jul 2015 15:32:51 -0000</pubDate><title>Message #3950837</title><guid isPermaLink="false">3950837@Uncensored</guid><description><![CDATA[  
 none known. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950830</link><pubDate>Wed, 22 Jul 2015 15:20:24 -0000</pubDate><title>Message #3950830</title><guid isPermaLink="false">3950830@Uncensored</guid><description><![CDATA[ > Honda sells a lot of Accords... I wonder how badly they are impacted. 
 
  
 waitwaitwhat...?  I drive an Accord ... what exploit is affecting them? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950826</link><pubDate>Wed, 22 Jul 2015 14:30:14 -0000</pubDate><title>Message #3950826</title><guid isPermaLink="false">3950826@Uncensored</guid><description><![CDATA[    
 you may feel lucky that your car (like mine) is an old piece of junk, but
when this shit really hits the fan the problem will be all the *other* cars
on the road going crazy *at once* :-)   
  
  
 and ghod help us if throttle-by-wire is ever widely deployed. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950811</link><pubDate>Wed, 22 Jul 2015 12:43:21 -0000</pubDate><title>Message #3950811</title><guid isPermaLink="false">3950811@Uncensored</guid><description><![CDATA[  
 Honda sells a lot of Accords... I wonder how badly they are impacted. 
  
 Heh... impacted... I didn't mean it quite as this might suggest. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950708</link><pubDate>Tue, 21 Jul 2015 18:06:55 -0000</pubDate><title>Message #3950708</title><guid isPermaLink="false">3950708@Uncensored</guid><description><![CDATA[  
 by "connected to", I mean "deeply embedded in" 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950707</link><pubDate>Tue, 21 Jul 2015 18:06:31 -0000</pubDate><title>Message #3950707</title><guid isPermaLink="false">3950707@Uncensored</guid><description><![CDATA[  
 If I buy a modern car, I'm tempted to do the same exercise: sign up for a
mechanic account, get schematics, determine how to disconnect all 'net-connected
radios... 
  
 wifi and bluetooth would likely be more difficult as they are connected to
the dash. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3950700</link><pubDate>Tue, 21 Jul 2015 17:13:35 -0000</pubDate><title>Message #3950700</title><guid isPermaLink="false">3950700@Uncensored</guid><description><![CDATA[  
 Gads... this is very frightening. 
  
 http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3946131</link><pubDate>Tue, 07 Jul 2015 19:59:05 -0000</pubDate><title>Message #3946131</title><guid isPermaLink="false">3946131@Uncensored</guid><description><![CDATA[Keychain on the Mac at home, with remote access to it from my phone. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3943995</link><pubDate>Fri, 26 Jun 2015 17:20:52 -0000</pubDate><title>Message #3943995</title><guid isPermaLink="false">3943995@Uncensored</guid><description><![CDATA[  
 https://secure.msdservices.com/apg/ 
  
 Randomized passwords that are FIPS compliant, allowing for memorization without
as much risk. 
  
 For example, one of the passwords this generated for me is 'bojTon2'.  It's
reasonably complicated, but unlikely for someone to use in hacking my account.
 But I could probably remember this if I made an effort to do so. 
  
 This said, eventually, you wind up with so many different passwords, you
have to start using something in your smartphone or the like to remember them
all for you.  And then, you have to update it in your phone, keeping the old
versions in case there's some straggling something that used an older version
of the password, etc. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3943811</link><pubDate>Thu, 25 Jun 2015 20:28:09 -0000</pubDate><title>Message #3943811</title><guid isPermaLink="false">3943811@Uncensored</guid><description><![CDATA[Sorry needs and upper case, a lower case a number and a symbol.  If you can't remember your password write it 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3943684</link><pubDate>Thu, 25 Jun 2015 00:48:51 -0000</pubDate><title>Message #3943684</title><guid isPermaLink="false">3943684@Uncensored</guid><description><![CDATA[Yeah.  I've finally started writing down passwords.  It's gotten to the point
where there are enough systems out there that require ridiculously complex
passwords and prohibit password reuse that I just can't keep them all in my
head anymore.  This is of course counter-productive; I should be able to just
set my password to "correct horse battery staple" and have its length count
as complexity. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3943671</link><pubDate>Wed, 24 Jun 2015 22:40:23 -0000</pubDate><title>Message #3943671</title><guid isPermaLink="false">3943671@Uncensored</guid><description><![CDATA[<html><body>

<p>So this LastPass thing amuses me.  Because seriously, I know I'm supposed to be touting that good security includes a password manager, but I have never found the logic in essentially *writing down* all your passwords together *in one place* in an *electronic medium*.....and then securing them with just a *single* other password *also electronic*.  </p>
<p>If you put on your silly logic hat that makes little sense.  Heck, these days a large portion of the population works from home...which means they might even be safer writing it down on paper and leaving it behind some closet door than having it on any accessible electronic medium.</p>
<p>Basically, unless you have a 2-factor solution, you've basically left the back door unlocked, kids.</p>
<p>http://www.wired.com/2015/06/hack-brief-password-manager-lastpass-got-breached-hard/</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3937366</link><pubDate>Thu, 04 Jun 2015 22:38:15 -0000</pubDate><title>Message #3937366</title><guid isPermaLink="false">3937366@Uncensored</guid><description><![CDATA[  
 Whut, I can't imagine what the problem with that might be. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3936990</link><pubDate>Thu, 04 Jun 2015 15:23:17 -0000</pubDate><title>Message #3936990</title><guid isPermaLink="false">3936990@Uncensored</guid><description><![CDATA[I took an online training module in the Protected Critical Infrastructure
Information (PCII) program a few weeks ago.  It was mostly pretty common-sense
stuff about protecting information in the program, but had some really stupidly
bad advice sprinkled in here and there.  For example, when talking about how
to send PCII over e-mail, if that becomes necessary, the slides instructed
you to do the following (copied from a screen shot): 
  
 -Ensure the PCII document password is NOT included in the e-mail you've attached
the PCII to 
  
 -Send the email 
  
 -Send the password to the protected PCII document in a separate email that
uses a different subject line 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3936370</link><pubDate>Wed, 03 Jun 2015 01:47:26 -0000</pubDate><title>Message #3936370</title><guid isPermaLink="false">3936370@Uncensored</guid><description><![CDATA[IG - Reading through that I'm like "DAYUMMM!!!!" Is very neat.  
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3936115</link><pubDate>Tue, 02 Jun 2015 15:35:41 -0000</pubDate><title>Message #3936115</title><guid isPermaLink="false">3936115@Uncensored</guid><description><![CDATA[That is huge!  How did I not know about that! 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3935823</link><pubDate>Mon, 01 Jun 2015 20:12:22 -0000</pubDate><title>Message #3935823</title><guid isPermaLink="false">3935823@Uncensored</guid><description><![CDATA[I was interested to learn that the (sadly now defunct) Orion Incident Response
Live CD, geared at blue team collaboration in a compromised environment, used
Citadel for team communication.  A SANS white paper from 2010: 
 http://www.sans.org/reading-room/whitepapers/incident/orion-incident-response-live-cd-33368

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3928279</link><pubDate>Tue, 26 May 2015 13:14:38 -0000</pubDate><title>Message #3928279</title><guid isPermaLink="false">3928279@Uncensored</guid><description><![CDATA[An electronic billboard has not lived up to its full potential until it displays
Goatse. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3925106</link><pubDate>Fri, 15 May 2015 18:55:59 -0000</pubDate><title>Message #3925106</title><guid isPermaLink="false">3925106@Uncensored</guid><description><![CDATA[Electronic billboard in Atlanta hacked.  Goatse displayed. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3915424</link><pubDate>Sun, 26 Apr 2015 01:39:41 -0000</pubDate><title>Message #3915424</title><guid isPermaLink="false">3915424@Uncensored</guid><description><![CDATA[I haven't actually done much with the YubiKey aside from use it to prove I'm
me before I can access the LastPass on a given system.  I am a pretty big
fan of LastPass; my wife has also started using it.  Paying the 12/year for
the premium version lets me use it with my tablet also, and that's how I interact
with the rest of the world a good deal of the time.  Worthwhile for me. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3880251</link><pubDate>Fri, 13 Feb 2015 16:01:42 -0000</pubDate><title>Message #3880251</title><guid isPermaLink="false">3880251@Uncensored</guid><description><![CDATA[<html><body>

<p>Well, after all, We Must Protect Our Children From Terrorists.</p>
<p>So yeah, eavesdropping everywhere, but only for the well-connected.  Yeah.  That's it.</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3864794</link><pubDate>Thu, 15 Jan 2015 15:32:53 -0000</pubDate><title>Message #3864794</title><guid isPermaLink="false">3864794@Uncensored</guid><description><![CDATA[<html><body>

<p>http://falkvinge.net/2015/01/14/hilarious-activists-turn-tables-on-political-surveillance-hawks-wiretaps-them-with-honeypot-open-wi-fi-at-security-conference/</p>
<p>hm...... ;-)</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3862646</link><pubDate>Sun, 11 Jan 2015 23:18:41 -0000</pubDate><title>Message #3862646</title><guid isPermaLink="false">3862646@Uncensored</guid><description><![CDATA[I am really excited to see where SQRL (https://www.grc.com/sqrl/sqrl.htm)
authentication ends up.  I have listened to several of Steve Gibson's podcasts
about SQRL with Leo Leporte and really hope that it turns into a good solution.

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3862638</link><pubDate>Sun, 11 Jan 2015 21:21:27 -0000</pubDate><title>Message #3862638</title><guid isPermaLink="false">3862638@Uncensored</guid><description><![CDATA[]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3862332</link><pubDate>Sun, 11 Jan 2015 12:30:06 -0000</pubDate><title>Message #3862332</title><guid isPermaLink="false">3862332@Uncensored</guid><description><![CDATA[When are web sites going to start letting us authenticate with a public key?!

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3859703</link><pubDate>Wed, 07 Jan 2015 04:56:00 -0000</pubDate><title>Message #3859703</title><guid isPermaLink="false">3859703@Uncensored</guid><description><![CDATA[<html><body>

<p>nristen,</p>
<p>I have a gpg file as well for my home stuff, but will probably switch to Password Safe for that as I use it at work and it will let you do safe imports from someone else's password file and merge changes.  It gets rid of all that who changed what and when stuff by letting you decide what to delete.  Kind of a pain to have to manually decide, but when dealing with others on shared account info, I think it will work out for the best :-)</p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3858963</link><pubDate>Sun, 04 Jan 2015 20:33:50 -0000</pubDate><title>Message #3858963</title><guid isPermaLink="false">3858963@Uncensored</guid><description><![CDATA[I have tried KeePass a couple of times but had difficulty using on multiple
system (syncronizing) - at the time, I read about using dropbox but I don't
really care for dropbox.  Currently, I have a gpg encrypted file that I store
on a git server which I can pull from for any of the computers that I need
to access it from. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3858962</link><pubDate>Sun, 04 Jan 2015 20:30:00 -0000</pubDate><title>Message #3858962</title><guid isPermaLink="false">3858962@Uncensored</guid><description><![CDATA[I have the original yubikey which I like a lot.  It took some work to incorporate
into my existing server logins though.  A lot of public services don't work
with yubikey unless you take advantage of the static password option which
allows for a constant (long) password to be inputed (both static and OTP options
can be used).  My wife uses and likes LastPass a lot for her business.  I
agree the newer NFC model of yubi key would add some flexibility although
I have been able to use the yubi key with my android phone by connecting the
yubi key to a USB to Go adapter which was connected to my phone (galaxy 3).

]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3858500</link><pubDate>Sat, 03 Jan 2015 09:29:06 -0000</pubDate><title>Message #3858500</title><guid isPermaLink="false">3858500@Uncensored</guid><description><![CDATA[]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3858483</link><pubDate>Sat, 03 Jan 2015 05:08:52 -0000</pubDate><title>Message #3858483</title><guid isPermaLink="false">3858483@Uncensored</guid><description><![CDATA[<html><body>

<p>I still kick it old school with Bruce Schneier and his Password Safe:</p>
<p>https://www.schneier.com/passsafe.html</p>
<p>Ports for non Windows / Linux exist, but Bruce says about auditing other code-bases... "Ain't nobody got time for that.".</p>
<p> </p>
</body></html>
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3858422</link><pubDate>Fri, 02 Jan 2015 23:37:01 -0000</pubDate><title>Message #3858422</title><guid isPermaLink="false">3858422@Uncensored</guid><description><![CDATA[How do Google and Twitter tie into third party auth tokens? 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3858026</link><pubDate>Thu, 01 Jan 2015 21:25:44 -0000</pubDate><title>Message #3858026</title><guid isPermaLink="false">3858026@Uncensored</guid><description><![CDATA[Eh, I ordered one.  I'll let you know. 
]]></description></item><item><link>http://uncensored.citadel.org/readfwd?go=Security?start_reading_at=3857951</link><pubDate>Thu, 01 Jan 2015 18:57:41 -0000</pubDate><title>Message #3857951</title><guid isPermaLink="false">3857951@Uncensored</guid><description><![CDATA[Has anyone experience or thoughts on various password manager schemes and/or
hardware tokens?  Specifically, I am looking into a Yubikey NEO, possibly
in conjunction with LastPass premium (at $12/year).  Password managers kind
of give me the willies, but right now I have a disturbing amount of my life
tied to two Google accounts and I'd like to diversify and further enable meaningful
2-factor authentication.  I have it enabled now on web accounts that allow
it (Google, Twitter, etc.), but I'd like to go farther.  I've read enough
tech docs and forum posts on the YubiKey device to believe that people are
actually able to implement its use for things like PGP, SSH keys, and local
system logins.  (The advantage of the NEO over the cheaper models is the NFC
capability, which would let me use it to secure my Android-based Nexus 7 tablet.)

]]></description></item></channel></rss>

