(no title)
jmgao
|
1 year ago
Back in the days of blaster, if you were connected to a network with infected machines or had a public IP address because you were connected straight into your cable modem, you would get infected in the windows installer before it finished installing. Nowadays, everything is behind NAT and there aren't any infected Windows XP machines left on your local network, so that's not a problem anymore.
lupusreal|1 year ago
throw0101c|1 year ago
It is not the address translation mechanism that does the protecting but rather the state tracking.
Until very recently I was with an ISP with IPv6, and things like my home printer had IPv6 addresses—but just because they were globally addressable did not mean that they were globally reachable.
rcxdude|1 year ago
LegionMammal978|1 year ago
But as far as I can tell, that's only relevant for an attacker who can MITM the connection between the local router and the next ISP router, since clearly the ISP wouldn't know who to forward the local address to. I'd think it isn't within the threat model of the "typical internet user" who'd be running such a poorly-configured network.
63stack|1 year ago
https://samy.pl/slipstream/
globular-toast|1 year ago
nubinetwork|1 year ago
cqqxo4zV46cp|1 year ago
PaulHoule|1 year ago
[deleted]
tetris11|1 year ago
zamadatix|1 year ago
snakeyjake|1 year ago
All end-user PCs have been behind NAT since the late 90s unless the system was a dialup straggler. Enterprise users raw-dogging the internet only have themselves to blame.
alex_duf|1 year ago
And with IPv6 all my devices could be publicly addressed but I've enabled a firewall to block incoming traffic at the router level.
zinekeller|1 year ago
jmgao|1 year ago