Tho85 | 4 years ago | on: The Max Headroom Incident
Tho85's comments
Tho85 | 4 years ago | on: The rise of E Ink Tablets and Note Takers: reMarkable 2 vs Onyx Boox Note Air
In the UI, you can choose if the device should communicate to Chinese or US servers. Both of them are available under the boox.com domain, so I assume they are both controlled by the Chinese manufacturer. The device uses this to check for firmware upgrades, to sync notes, for their own book store and IIRC to send some basic usage statistics. As per firmware version 3.0 (v3.1 is current), this traffic was only partly encrypted.
Besides this, the software seems to include some kind of Tencent SDK, which tries to contact Chinese servers quite aggressively, regardless of which setting you choose in the UI. The traffic is encrypted, so I couldn't figure out what it does. The servers seem to belong to Tencent's QQ service [1], so they supposedly use it for their on-device support feature. However, because the device tries to contact the servers immediately after startup, I assume it does some kind of analytics tracking as well. Blocking the service's domains on the DNS level doesn't work though, as the SDK will start to contact fixed IP addresses if DNS resolution fails.
Luckily, all of this traffic can be blocked after rooting and installing a firewall (see my post above), since all of this is implemented under Android user ID 1000, which makes it easy to block in AFWall+.
Tho85 | 4 years ago | on: The rise of E Ink Tablets and Note Takers: reMarkable 2 vs Onyx Boox Note Air
Tho85 | 4 years ago | on: The rise of E Ink Tablets and Note Takers: reMarkable 2 vs Onyx Boox Note Air
There are only two downsides about it: The vendor does not respect FOSS and does not publish the sources for their modified Linux kernel, and the device constantly phones home to China. However, the device can be rooted easily [1], and you can install a firewall to stop the preloaded apps from phoning home (verified it with Wireshark).
[1]: https://blog.tho.ms/hacks/2021/03/27/hacking-onyx-boox-note-...
Tho85 | 6 years ago | on: Giving every IPv6 address a name
A neat one is x.ip6.name, which resolves to ::, e.g. localhost...
Tho85 | 9 years ago | on: Show HN: Ip6.name – A DNS record for any IPv6 address
Tho85 | 9 years ago | on: Show HN: Ip6.name – A DNS record for any IPv6 address
I had the idea when I needed a TLS certificate for a system without a global DNS record. I recalled that http://xip.io/ exists for IPv4, but didn't find something similar for IPv6. So I had to do it myself :-)
Tho85 | 12 years ago | on: Rails 3.2.18, 4.0.5 and 4.1.1 have been released
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
[1] http://linux.die.net/man/1/encfs
[2] https://boxcryptor.desk.com/customer/portal/articles/565934
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
Maybe that's the root cause of your issues?
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
Edit: Looks like someone is already working on it: http://stackoverflow.com/questions/10909500/use-encfs-with-j...
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
You can also use Dropbox and Encbox together if you're unsure: Point your Dropbox installation to ~/Encbox and have Dropbox sync your (then decrypted) files. So you can be sure to have backups, file sharing features, etc. and see if Encbox is stable enough for you.
Tho85 | 12 years ago | on: Build your own private, encrypted, open-source Dropbox clone
The only thing your VPS provider could do is delete your files, but Unison's backup feature should protect you from losing your files (in a way).
Tho85 | 13 years ago | on: Denial of Service and Unsafe Object Creation Vulnerability in JSON Gem
Tho85 | 13 years ago | on: Denial of Service and Unsafe Object Creation Vulnerability in JSON Gem
With love :-) Thomas
Tho85 | 13 years ago | on: Denial of Service and Unsafe Object Creation Vulnerability in JSON Gem
http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-ma...
IIRC the panorama cam was connected to the Internet and had been hacked, so no microwave magic there. Good execution nonetheless...