Natanael

@Natanael@slrpnk.net

Cryptography nerd

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Natanael,

(I’m assuming CS is Counter Strike, and not like competitive multiplayer Cities Skylines or something.)

“Natural disaster, meteor from northwest, prepare fire fighters!”

Natanael,

Tell them NIST now recommends against it so the insurance company is increasing your risks

Natanael,

NIST now recommends watching for suspicious activity and only force rotation when there’s risk of compromise

Natanael,

Password crackers says you’re wrong

Natanael,

Any ticketing system set up like that is just begging for abuse. If they don’t have queue managers then the team should share the hit if they just leave the ticket untouched

Natanael,

Pretty sure it’s some misapplied heuristics for previously identified bad clients, but that should only trigger an alert (with details!) in most cases and not block you if it’s not also paired with any known malicious activity

Natanael,

That’s why password leak detection services exists

(And a rare few of them yes)

Natanael,

Yup, unless you specifically set it to use one of the few outproxies then it’s by default just for connecting to other peers within the I2P network

Natanael,

I2P doesn’t behave like Tor by default, it’s designed around connecting to internal peers within its network so your browser won’t treat it as a proxy but default and you have to specifically configure it to route traffic to the I2P network

Natanael,

This is not how the law is applied to packet switching.

If it was store and forward then maybe just maybe law enforcement would care, but anybody smart enough to set up an I2P node to research it and who tried to track where packets from from would first see the packets originate from their own local node at 127.0.0.1, then in the I2P console they could see that packet came in via an active half-tunnel from their own end interfacing with the endpoint node of the other side’s half-tunnel, and they would know that node has no idea what it’s sending (just like their ISP)

Natanael,

Torrents are literally built around file hashes so yes

Natanael,

1: then they would go after literally anybody running a node

2: their client will not see peers on another IP. It will just see their own I2P node. Any I2P aware software will also not have any IP addresses as peers, only I2P specific internal addresses. They will not even be able to associate an incoming connection to any one node without understanding the I2P network statistics console.

3: by this argument all anonymization tools should be illegal, Signal too, etc, and nobody should help anybody maintain privacy. In the real world there’s plenty of reasons why anonymization tools are necessary. And there will be literally zero evidence tying you to a crime. Preexisting legal precedence says an IP address alone is not enough.

Natanael, (edited )

Your scenario would specifically require the cops to ask their techs for a detailed report and then deliberately lie about it’s conclusions to attack completely random people, and just FYI the last few rounds of this happened when public WiFi was new and the cops kept losing so badly in courts that this doesn’t really happen much anymore. You don’t even need a great lawyer, just an average one who can find the precedence.

There’s no “additional fingerprints” of relevance binding any node in a tunnel to the communications in the tunnel. It uses PFS and multiple layers of encryption (tunnels within tunnels). They need to run a debugger against their node to have any chance to really argue that a specific packet came from a specific node, which also would ironically simultaneously prove that node didn’t actually know and was just a blind relay (just like how mailmen aren’t liable for content of packages they deliver).

Your argument is literally being used to argue that nobody should have privacy because those who don’t break laws don’t need it, yet you yourself are arguing for why we still need privacy if we haven’t broken laws. The collateral damage when such tools aren’t available is so much greater than when privacy tools are available. One of the greatest successes of Signal is how its popularity makes each of its users part of a “haystack” (large anonymity set) and targeting individual users just for using it is infeasible, protecting endless numbers of minorities and other at-risk individuals.

In addition, it’s extremely rare that mass surveillance like spying on network traffic leads to prosecutions. It’s usually infiltration that works, so you running an I2P node will make zero difference.

Natanael,

If it’s IP blocked it still won’t work, but most aren’t

Natanael,

Depends on alloy, some are more brittle or prone to deformation than others

Natanael,

It’s not entirely wrong, public transit is better

Natanael,

You haven’t seen good public transit then, are you being satirical or are you really that dimwitted?

Natanael,

A roku, Chromecast, etc, which will get updates for longer than the TV itself, and which is much less likely to be backdoored.

Or begging companies to support Miracast properly

Natanael,

If he hadn’t been in long he might have still have had a heartbeat, and then CPR does no good

Natanael,

I suspect reddit’s /u/fuckswithducks is involved

Natanael,

Assuming enough water that most of it doesn’t boil, then my math would still check out, but yeah, any substantial amount of boiling forces you do do the math in multiple steps to handle that

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #