• 1 Post
  • 443 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle


  • You’re holding onto a long-standing misconception: Linux is not inherently more secure than Windows. In fact, the opposite can be true.

    The reason Linux seems safer is because it has a much smaller market share. Attackers don’t build massive botnets to target misconfigured Linux systems the way they do for Windows. But that’s not security—that’s just security through obscurity, which doesn’t hold up if someone is targeting you specifically.

    Let me clarify my earlier point about “a link for you to click.” If an attacker is specifically targeting someone using Linux, they’re not any better protected than someone on Windows. At that point, it comes down to how well the user understands and secures their system.

    The key difference? Windows actively warns you about misconfigurations that open you up to attack. For example, try enabling Remote Desktop Protocol—Windows will warn you repeatedly about the risks. Linux, on the other hand, won’t stop you. You can misconfigure SSH, open ports, or skip updates without a single warning. If someone’s after you and you’ve made a mistake? You’re toast.

    Linux is powerful, but it doesn’t hold your hand the way Windows does. If you think it’s inherently secure, you’re just relying on the fact that fewer bots are looking for you—not that the system itself is protecting you.


  • You’re straight up embarrassing yourself on a forum full of highly technical people. I won’t be surprised when you delete your comments.

    You’re confidently conflating two very different things: basic IP spoofing that breaks TCP connections and the use of a reverse proxy to mask an IP address during communication. Let me explain why you’re wrong and how the process actually works.

    1. IP Spoofing for One-Way Traffic:

    When you “spoof” an IP, you modify the source address in a packet to make it appear as if it came from somewhere else.

    You’re right that for a full TCP connection, the three-way handshake (SYN → SYN-ACK → ACK) won’t complete because the response (SYN-ACK) goes to the spoofed IP, not to the actual sender. This is basic networking, and no one is arguing that.

    1. Reverse Proxy Basics:

    Here’s where you get it wrong: a reverse proxy or intermediary server is not IP spoofing in the raw packet sense.

    The reverse proxy establishes the connection with the target server on your behalf. It completes the handshake, relays data to/from the target, and forwards the responses back to you.

    Your actual IP never touches the target because all the traffic appears to come from the proxy.

    Simplified Flow:

    VM (Google Voice) → VPN (Mullvad, paid with cash) → Reverse Proxy → Target Hotline

    The target sees the reverse proxy’s IP, not yours. The reverse proxy handles the replies and sends them back to your system.

    1. Why This Works:

    You only need to maintain a stable connection with the reverse proxy. The proxy takes care of everything else, including interacting with the target server or hotline.

    This is not spoofing mid-connection traffic; this is using a relay to abstract your origin. It’s a fundamental networking concept used for load balancing, anonymity, and even services like Cloudflare.

    1. Google Voice Context:

    The call originates from a VM, using Mullvad to mask your real IP. If you route the call through a reverse proxy, the target hotline only interacts with the proxy’s IP.

    You maintain full two-way communication because the proxy handles and relays replies, ensuring nothing breaks.

    TL;DR: You’re incorrectly applying the concept of raw IP spoofing (which doesn’t work for full communication) to a process that involves a reverse proxy or VPN, where the proxy legitimately completes the connection and forwards traffic. If you’re a “network specialist,” you should know this. The fact that you don’t is what’s truly embarrassing.

    And now, I block you. I won’t waste my time talking to morons who are so confidently incorrect.