Sami_Lehtinen
|
3 years ago
dig -6 aaaa ip @dns.toys
doesn't work.
Sami_Lehtinen
|
3 years ago
WireGuard & ZeroTier, check it out.
Sami_Lehtinen
|
3 years ago
Walkie Talkie mode, I've really waited for it. I've found it amazing how developers find it way too hard and complex to implement basic PTT features.
Sami_Lehtinen
|
4 years ago
DuckDuckGo did implement filters which is big part of the problem. Mojeek is also independent when DuckDuckGo is just cover on mostly Bing.
Sami_Lehtinen
|
4 years ago
My servers currently ban in average 1200 individual addresses and around 20 /24 cidr network addresses, which is triggered after N individual addresses in a specific subnet size gets flagged. The amount of abuse traffic is ridiculous.
Sami_Lehtinen
|
4 years ago
> “.onion” address demands that the person is using a TorBrowser
Actually this is not true. Tor runs as SOCKS5 proxy, and you can use any browser or application with it.
Sami_Lehtinen
|
4 years ago
|
on: Microsoft Teams users can now chat with Teams users outside their organization
Chat phishing is coming.
Sami_Lehtinen
|
4 years ago
Sami_Lehtinen
|
4 years ago
Mostly yes, but also Yandex, Wikipedia, etc. But for reference the
https://mojeek.com is actually an independent search engine, with own index and crawler.
Sami_Lehtinen
|
4 years ago
Sami_Lehtinen
|
4 years ago
Sami_Lehtinen
|
4 years ago
Sami_Lehtinen
|
4 years ago
CNAME target should be allowed to contain a dash '-'
Sami_Lehtinen
|
4 years ago
Many of the examples contain well, obvious mistakes. It would be nice to get the post fixed. - Thanks
Sami_Lehtinen
|
4 years ago
Sami_Lehtinen
|
4 years ago
In thought they were referring to the Mars drone. But Ok. Tell me when it's flying in another world.
Sami_Lehtinen
|
4 years ago
Been there done that. I did it when XP was released.
Sami_Lehtinen
|
4 years ago
|
on: Disclosing E2EE vulnerability in multiple Matrix clients
Quote from the original documentation: "The recommended strategy is to share the keys automatically only to verified devices of the same user. Requests coming from unverified devices should prompt a dialog, allowing the user to verify the device, share the keys without verifying, or not to share them (and ignore future requests). A client should also check whether requests coming from devices of other users are legitimate." - It made me smile, because should and recommended doesn't generally mean anything to developers. Only mandatory, must and must not, sections might get some attention.
Sami_Lehtinen
|
5 years ago
Sami_Lehtinen
|
5 years ago
Mojeek is a good example of independent search engine. But it isn't distributed nor open source.