responsible
|
3 years ago
|
on: Hackers Steal Session Cookies to Bypass Multi-Factor Authentication
This article talks about infostealers which don’t resort to violence or five dollar wrench attacks. Instead they sneak onto systems via various means and surreptitiously exfiltrate all they can. Some even bypass AV by being polymorphic and installing root kits which can’t be so easily removed by AV.
responsible
|
3 years ago
|
on: iOS VPNs have leaked traffic for years, researcher claims
Well I have a Gl.inet mango router which I think supports 3g USB modems, so you could hook up that and power the router with a power bank. You can use it traveling, but not when driving as you would need some sort of Wi-Fi hotspot in the car. You could setup one on your phone though this is where everything gets complicated and not for the average user.
responsible
|
3 years ago
|
on: iOS VPNs have leaked traffic for years, researcher claims
I’m not talking about an app. I’m talking about a router that VPN-ifies all your traffic to mitigate any form of leak. That article talks about iOS leaking traffic when using VPN apps. A VPN router is the only solution to stop this from happening.
responsible
|
3 years ago
|
on: iOS VPNs have leaked traffic for years, researcher claims
You can mitigate this by using a VPN router. I have a little GL.Inet router I use that ensures all traffic is passed through the VPN. The only caveat is you can’t travel with it even though they’re advertised as ‘travel routers’. You could use it in a hotel if you don’t trust random Wi-Fi hotspots. All I need is a .OVPN config file which I upload in the router’s admin dashboard, copy and paste my username and password and I’m set. A nice feature is if the VPN connection drops, the router doesn’t leak your IP.
responsible
|
3 years ago
|
on: Freedom and Privacy: Two Sides of the Same Coin
Which is why we have Monero
responsible
|
3 years ago
|
on: Philip K. Dick’s dystopia
PKD didn’t consider encryption and the many tools we can use to thwart spying and surveillance. I’m tired of these articles that suggest we’re helpless fools sleepwalking into a dystopia. Encryption is all we have now to fight Orwellian dystopias and it’s worth having good opsec (depending on your threat model). I feel very safe and cozy on the web and with technology in general because it’s all locked down. MFA. Password managers, AD blockers, secure operating systems, compartmentalized identities etc
responsible
|
3 years ago
|
on: Ask HN: What made you feel that coding as a skill can make you achieve feats?
Coding is bending a computer to your will. If the will is there, I will try everything and anything to get results. If that includes learning a whole new programming language then so be it.
responsible
|
3 years ago
|
on: Are You Intellectually Humble?
Good teachers equip you with tools used to dispute their own conclusions. Worldviews should be malleable and subject to change. The ability to see things from different perspectives goes a long way in being able to question rigid thoughts.
responsible
|
3 years ago
|
on: Ask HN: Best Digital Assets to Invest In?
Setup a blog with a domain you keep renewed for as long as possible. Find ways to monetize it and make it pay for itself.