• 0 Posts
  • 39 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle


  • Hey I don’t know your technical capability, but Steve Gibson pointed out the lowest knowledge way to get an isolated network just by buying two more cheap NAT routers. Your current router stays routing internet, but in LAN1 you plug in one of the new routers, let’s call it your home network, and LAN2 of your internet router plug in the other router and call it insecure. Plug in your WiFi access points into home and your devices. Plug in work laptop and other IoT to insecure. Home won’t be able to talk to insecure, and insecure can’t talk to home. This is all because of NAT. Just make sure the home network range is a different range to the insecure.

    Otherwise it’s just a vlan on router and switches and access points with no firewall rules that allow INSECURE to HOME.

    You might already know all this in which case never mind!

    https://www.grc.com/nat/nat.htm



  • It’s solving a real problem in a niche case. Someone called it gimmicky, but it’s actually just a good tool currently produced by an unknown quantity. Hopefully it’ll be sorted or someone else takes up the reigns and creates an alternative that works perfectly for all my different isos.

    For the average home punter maybe even up to home lab enthusiast, probably not saving much time. For me it’s on my keyring and I use it to reload proxmox hosts, Nutanix hosts, individual Ubuntu vms running ROS Noetic and not to mention reimaging for test devices. Probably a thrice weekly thing.

    So yeah, cumulatively it’s saving me a lot of time and just in trivialising a process.

    If this was a spanner I’d just go Sidchrome or kingchrome instead of my Stanley. But it’s a bit niche so I don’t know what else allows for such simple multi iso boot. Always open to options.


  • Don’t waste time on pandering to proof of ability when actions speak louder than words. The release of your research is personally something I’m looking forward to regardless of your history or experience. I will interpret your research and evaluation with my own bias and sceptical stance. I’d rather question you afterwards if your article left questions unanswered or unclear.

    Jumping the gun now and questioning you before we start just wastes both our time.

    Good luck with your research!


  • I think you probably don’t realise you hate standards and certifications. No IT person wants yet another system generating more calls and complexity. but here is iso, or a cyber insurance policy, or NIST, or acsc asking minimums with checklists and a cyber review answering them with controls.

    Crazy that there’s so little understanding about why it’s there, that you just think it’s the “IT guy” wanting those.



  • The root cause of this issue that they identify, is 100% the kind of AI that they’ll build for this situation.

    Old mate wants to use it to keep people on their best behaviour. The kind of subjective wording that whatever he doesn’t like, is the exact reason people lie in court.

    Power to that thought process through systemising it, legitimising it, is exactly part of the problem.

    What’s that American who said lies about the eating cats then justifying it by saying “I’d lie if it got the American public to wake up”. Let me get the quote…

    https://www.mediaite.com/news/remarkable-confession-jd-vance-absolutely-floors-observers-with-comment-that-hes-been-creating-stories-about-migrant-pet-eating/

    If I have to create stories so that the American media actually pays attention to the suffering of the American people, then that’s what I’m going to do.

    Yep. It’s not infallible, it’s intentional. Intent goes into the creation of systems and implementations. These are the kind of people that want these systems. They’re justified in their own minds.

    So to close the loop you linked that article and it’s point was:

    More than half of wrongful convictions can be traced to witnesses who lied

    Don’t give them reason for more ways to do so. Don’t give them legitimacy. That’s deterministic. It’s intent. It’s not failed if it worked. Your opinion on a system which is failed or fallible is not the same as the Oracle hocho who wants to be God.

    They’re not sharing your values, morals, ethics or compassion.



  • Bleeping computer was blocking my vpn but that also sounds common. Not only is there heaps of controls through conditional access policies where you can use device compliance policies and mass download defender for office 365 rules to detect these things, Microsoft also allow a bunch of ways to circumvent that through publishing enterprise apps and leave it to you not to lose your keys. I use one such app a lot called pnp powershell so my powershell can access basically everything and do anything so I can script largely migrations and audits of those migrations into sharepoint. While I do remove that app at the end of my projects, most people just move on.

    Of course pure speculation. It’s just not even hard to either footgun yourself, and fortinet have been known to be shooting themselves in the foot, even assuming they tried to put controls in, in the first place.

    I’ll read the actual article when I get home to see how impacted I will be though. As a customer, seller and with certifications. Not to mention, maybe there’s something for me to learn about the whole thing anyway.







  • This will be able to do cross site (apps) information collection within other sites (apps) in this profile. The way this works is one of many, and complicated so: https://blog.mozilla.org/en/products/firefox/cross-site-tracking-lets-unpack-that/

    The idea of profiles is to stop this behaviour and other behaviours through isolation. Along with other practices makes up a privacy-in-depth (layered) approach. It doesn’t solve everything.

    For example if you are in the same house sharing an internet connection, it is possible to say “at least one outstation in this house (IP) are interested in ‘x’ and therefore I should target everyone in that house because people who live together are interested in similar things”. Even if you isolate, you could still teach a data hoarding company like meta you like something simply by them by necessity needing your IP to communicate.

    Some people try to say ‘I’ve got a VPS with a VPN to communicate all traffic through’ but that doesn’t add any privacy, your exposed VPS with its IP is an IP only for you and still all collected information about you would be able to be thumbprinted to that IP across many services (eg instagram whatsapp and Facebook). A public VPN provider in this case adds a layer of obfuscation since you can change your IP rapidly and it’s an IP that’s shared with other unrelated users. Which is exactly why many services like reddit are banning access from them under the guise of “oh training data leaks from VPN, and we want to sell it” bs.

    Anyway it’s a tough world out there to be private. I’m at an age where after 10 years without Facebook and I never had instagram, everyone knows I’m contactable via sms. It’s not secure, it’s barely private, but I don’t really “chat” except at the pub. So that’s where they ask me to visit. Lol.


  • I knew a Datacenter that had hundreds of ps3s for rendering fluid simulation and other such things that at the time were absolutely cutting edge tech. I believe F1 and some early 3d pixar stuff was rendered on those farms. But like all things, technology marched on. fpgpas and cuda have taken that space.

    Cell definitely was heavily used by specialist/nichr industry though.

    I wonder if I can find you some link to explain it better than the rumours I heard from staff that used to work in those datacentres.

    Hmm hard to find commercial applications, probably individuals might have blogged otherwise here’s what I’m talking about: https://en.m.wikipedia.org/wiki/PlayStation_3_cluster



  • biscuitswalrus@aussie.zonetoMemes@lemmy.mlplease
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    Ah you’re thinking I’m reading your other comments to other people.

    BTW HIPAA is for providers for their patients information handling. Once it’s in the person’s hands, it’s no longer under HIPPA and it no longer applies. If you decide to put your private medical information on a commercial advertisement board on a highway, and it’s not breaking laws to do with acceptable adcertisement (eg gore or smut) you’ll be able to do that to.

    Basically theres no expectation for a individual person to adhere to HIPPA for their own personal information storage and it doesn’t apply.

    My assumption with your lawyer comment, is this was a insurance or otherwise medical malpractice lawyer who might collect this information for their client cases, since without having client/patient requirements, HIPPA is irrelevant.