But Tor is explicitly designed for this sort of thing and does not have a paid access system.
Nowhere on Big Mama VPN’s landing page does it say that by using their service you open your network to access by randoms.
That there is no perfect defense. There is no protection. Being alive means being exposed; it’s the nature of life to be hazardous—it’s the stuff of living.
But Tor is explicitly designed for this sort of thing and does not have a paid access system.
Nowhere on Big Mama VPN’s landing page does it say that by using their service you open your network to access by randoms.
Big Mama is made up of two parts: There’s the free VPN app, which is available on the Google Play store for Android devices and has been downloaded more than 1 million times. Then there’s the Big Mama Proxy Network, which allows people (among other options) to buy shared access to “real” 4G and home Wi-Fi IP addresses for as little as 40 cents for 24 hours.
I am surprised this is legal. I have zero knowledge of the nuances of law, but there is no situation where allowing a completely random 3rd party to use your IP/network on an on-demand basis is legitimate. This is not a “grey area” (in the real sense, not in the judicial sense).
So this a remote vulnerability, but no execution just information access? The CVE and Microsoft are not clear about it (or I am bad at reading).
Hacktivists? These are clearly state-sponsered and managed groups.
This is why I avoid opening up “service” devices to the broader internet.
My current work around is to access a computer with TeamViewer on a given local network and manage things from there. There are probably flaws with this approach too, but it seems like a more manageable solution than giving IoT-type devices access to the open internet.
I do wonder if protocol like Yggdrasil would be a good solution in the future.
Interesting discussion, but I would argue lack of reputational damage is primarily due to lack of competition. If it was easy to switch (and government policies were built around doing everything possible to reduce barriers to entry and switching costs) to other options, reputational damage would likely have far more severe consequences.
Now we can find out who is working with the Winklewii twins.
For a second I thought merely playing the video would get your system compromised.
But you do actually have to install the malware (which would work for some targets).
It’s interesting that the Houthi’s are trying to extract useful location data, I am assuming this is for potential targeting UAV drones.
Don’t if it’s just my system, but last night a windows update got stuck at 96% (saw it when I woke up in the morning).
After rebooting, I got a nasty “Page Fault in Nonpaged Area” error that led to a nasty bootloop.
Eventually I was able to boot into Windows 10 and everything seems to be working fine (ran a system file check, some files were found to be corrupted).
This is on an ancient Haswell laptop from 2014; my initial thoughts were this was definitely tied to my hardware, the laptop is really outdated and I use it heavily (have a modern desktop, but I am away from home), but perhaps something was wrong with the update.
I guess I will found out.
Nah, I’d say the passwords from Hackers (1995) such as love, sex, secret, god are the best.
Android 11 is not getting security updates? I can see manufacturers not pushing updates, but I would have assumed Google still patches the OS. It seems that roughly 18% of Android devices still run 11, with another 11% for Android 10.
Have you ever lived in the “free world”?
Have you ever lived in Russia?
Good question.
I wonder what Assange was doing at russia today and what goals he was promoting?
It’s fascinating that there has been zero (public?) response to their GPS jamming in the Baltic sea and now this.
With the russians you have to be able to show them that there are consequences; that you are able and willing to use a stern hand at the first sign of trouble. That you know what they are like and their lies will have no effect.
A real response would be to kick out the russians out of the ITU and similar standards organizations. And this needs to be done with a emphasis on speed, broad scope of execution and irreversibility.
If they don’t get the message, start blockading all land/air connections to occupied Königsberg, while looking for ways to making ship connections to Russia proper difficult.
From my understanding this is only relevant if your have remote admin enabled? Still need to update ASAP, but wanted to clarify.
All the individuals you mentioned made their contributions and statements under their real names.
The Tor team largely publishes their work under their real names:
https://www.torproject.org/about/people/
They even have a board of directors:
https://blog.torproject.org/announcing-new-board-members/
Has the lead Nostro developer mentioned anything about his support for Olavo de Carvalho (the claim that “Pepsi-Cola was flavored with stem cells of aborted fetuses” is particularly wild)? I will note Stallman, Linus have provided feedback to public criticism of their statements/approaches.
The Lemmy tankie issue is definitely a major problem.
The scope (and potential impact?) of this zero-day hack is insane.
First time I heard about Hola. Read an article about them. They claimed that:
Avi Cohen is liar and scoundrel.