

Fun fact: the Titanic’s swimming pool was originally a salt water pool.
Fun fact: the Titanic’s swimming pool was originally a salt water pool.
Spoofing is a whole hell of a lot easier said than done. Content delivery networks like Akamai, Cloudflare, etc. all know exactly how different versions of different browsers present themselves, and will catch the tiniest mistake.
When a browser requests a web page it sends a series of headers, which identify both itself and the request it’s making. But virtually every browser sends a slightly different set of headers, and in different orders. So Akamai, for example can tell that you are using Chrome solely by what headers are in the request and the order they are in, even if you spoof your User-Agent string to look like Firefox.
So to successfully spoof a connection you need to decide how you want to present yourself (do I really want them to think I’m using Opera when I’m using Firefox, or do I just want to randomize things to keep them guessing). In the first case you need to be very careful to ensure your browser sends requests that exactly matches how Opera sends them. One header, or even one character out of place can be enough for these companies to recognize you’re spoofing your connection.
I had a few AC Pros in a 110+ year old house where other AP’s had issues with all the plaster & lathe walls. They worked great. I also have a couple of them installed at a non-profit org I volunteer with and everybody is very happy with how they work there as well.
After moving from that first house to a new one with a bigger footprint I upgraded to a pair of their U6 mesh AP’s, one at each end of the house. Never had any issues with them.
president or secretary of a recognised organisation
What constitutes a “recognized organization”? That sounds rather open to interpretation…
Wary why? I work remotely in IT and manage a ton of Linux systems with it. Because my company has a large number of remote employees they limit us to Windows or Macs only, and have pretty robust MDM, security, etc. installed on them. Since MacOS is built on top of a unix kernel it’s much more intuitive to manage other unix & linux systems with it.
Personally I haven’t used Windows really since before Windows 10 came out, and as the family tech support department I managed to switch my wife, parents, brother, and mother in-law all to Mac’s years ago as well.
I doubt it would help. My employer uses Akamai as a CDN & security provider for our websites. Their bot analysis tools regularly flag distributed bot activity that can come from a handful or a few thousand IPs. They do a range of browser fingerprinting, TLS fingerprinting, etc. to uniquely identify traffic across ranges of IP’s. I’m sure Google/Youtube has the ability to do this as well.
Any given client would need to regularly randomize the order of headers in requests, randomly include/exclude optional headers, and also randomize TLS negotiation to try to circumvent all the fingerprinting these big corporations perform.
Back in the 90’s I worked for a guy whose first name is “H”.
I use Calibre to remove the DRM from all ebooks I buy. Not that I buy a lot of them, but hell if I’ll let Amazon be the keeper of the keys.
IANAL, but I believe these laws cover audio recording only. OP shouldn’t have an issue if they use something that records video only.
Think about it a second. I live in a two party consent state, but I see security & surveillance cameras everywhere. If two party consent was required for video then they wouldn’t be there.
Professional hitmen don’t actually exist.
Sammy “The Bull” Gravano would probably disagree with you. He’d likely consider himself a professional since he admitted to involvement in 19 murders. Granted they were all mob related, and not “for hire” by anybody with a pile of cash and a grudge…
DigiCert recently was forced to invalidate something like 50,000 of their DNS-challenge based certs because of a bug in their system, and they gave companies like mine only 24 hours to renew them before invalidating the old ones…
My employer had an EV cert for years on our primary domain. The C-suites, etc. thought it was important. Then one of our engineers who focuses on SEO demonstrated how the EV cert slowed down page loads enough that search engines like Google might take notice. Apparently EV certs trigger an additional lookup by the browser to confirm the extended validity.
Once the powers-that-be understood that the EV cert wasn’t offering any additional usefulness, and might be impacting our SEO performance (however small) they had us get rid of it and use a good old OV cert instead.
Back in the 90’s before the days of Windows 3.0 I had to debug a memory manager written by a brilliant but somewhat odd guy. Among other thing I stumbled across:
If you have ssh open to the world then it’s better to disable root logins entirely and also disable passwords, relying on ssh keys instead.
Port 22 is the default SSH port and it receives a TON of malicious traffic any time it’s open to the whole internet. 20 years ago I saw a newly installed server with a weak root password get infected by an IP address in China less than an hour after being connected to the open internet.
With all the bots out there these days it would probably take a lot less time if we ran the same experiment again.
This reminded me of a glass artist named Josh Simpson who is known for his glass spheres he calls “planets” that have amazingly complex scenes in them. For over two decades he’s had what he calls the “Infinity Project” where he encourages people to hide them out in the open where folks are unlikely to find one. If you submit a proposal to him that he likes then he’ll send you two of his smaller planets, one for you to hide and one to keep for yourself.
Well OPSEC is the stated cause. Who knows how the person was initially identified and tracked. For all we know he was quickly identified through some sort of Tor backdoor that the feds have figured out, but they used that to watch for an unrelated OPSEC mistake they could take advantage of. That way the Tor backdoor remains protected.
Exactly. Tor was originally created so that people in repressive countries could access otherwise blocked content in a way it couldn’t be easily traced back to them.
It wasn’t designed to protect the illegal activities of people in first world countries that have teams of computer forensics experts at dozens of law enforcement agencies that have demonstrated experience in tracking down users of services like Tor, bitcoin, etc.
Only some VOIP calls are routed over the internet. Most calls, while digital, are still routed over the proprietary networks owned & operated by the major telcos.
The internet is a packet switched network, which means data is sent in packets, and it’s possible for packets to end up at their destination out of order. Two packets sent from the same starting point to the destination could theoretically go over completely different routes due to congestion, etc. The destination is responsible for putting the packets back together properly. Packets can also get delayed if other higher priority packets come along. It’s for reasons like these that both voice & video on the internet can occasionally freeze, stutter, etc. Granted the capacity & reliability of the internet has improved greatly over time so these things happen less and less often. But the fact still remains that a packet switched network isn’t optimal for real time communication.
Telephone networks on the other hand are circuit switched networks. When you are talking to somebody on a telephone then there is a dedicated circuit path between you and the other person. Each piece of the path between the two of you has a hard limit of the number of simultaneous calls it can handle, which ensures it always has the capacity to serve your particular call. If a circuit between two points is maxed out then the telephone exchange may try to route your call via a different path, or you may just end up with a busy signal.
Packet switched networks also don’t have those hard limits that circuit switched networks do. So packet switched networks can get overwhelmed (think DoS attacks) which can also lead to outages.