IllNess

joined 2 years ago
[–] IllNess 8 points 4 months ago (1 children)

I'll take a look. Thanks.

My favorite is Metropolis (1927).

[–] IllNess 5 points 4 months ago

I'll do my research. Thank you for the info.

[–] IllNess 8 points 4 months ago (2 children)

I wanted to move to the Netherlands because of their biking culture. But citizenship is difficult and I don't speak Dutch.

[–] IllNess 5 points 4 months ago (1 children)

You can sometimes find your bike in a nearby market for a fee. By a fee I mean they stole it and they are selling it back to you.

[–] IllNess 1 points 4 months ago (1 children)

So your logic for using Tor is because you can hide a server behind one and people understand the risk. And the only thing that prevents the government from busting people from illegally accessing their own servers is effort.

Why would you suggest using anything that you yourself considers a risk?

But this post is about accessing government servers, which aren't onion servers. Creating servers is irrelevant in this discussion. I'd rather use a service that hasn't failed it's users, which hides IP addresses. When Mullvad got raided, the police couldn't do anything. It was a dead end for them. With Tor, that has been far from the case over and over again.

[–] IllNess 1 points 4 months ago (3 children)

Several VPNs claim they don't keep logs. I trust Mullvad. Mullvad got raided. The police found nothing.

I trust a trusted VPN over a technology created by the government and that has frequently been broken by them.

Compare the amount of arrest of Mullvad users versus Tor users, logically for me at least, I found my answer. If you trust Tor to access government websites illegally, I say go ahead. I wouldn't.

[–] IllNess 2 points 4 months ago (5 children)

https://www.forbes.com/sites/kashmirhill/2014/11/07/how-did-law-enforcement-break-tor/

FBI kept information to themselves of how they did it and this isn't the first time.

Also I wouldn't trust accessing a site administered by the government on Tor if onion sites can't keep me anonymous.

[–] IllNess 2 points 4 months ago (7 children)

Don't use Tor. If the FBI found ways to break it before, assume it could have other vulnerabilities to do it again.

[–] IllNess 6 points 4 months ago

That's the plan.

It starts with adult sites then it moves on to everything else.

This would allow tech companies to get more data and stop guessing who is behind a shared IP address.

[–] IllNess 7 points 4 months ago (10 children)

This shouldn't need to be said but use a VPN with these accounts.

[–] IllNess 49 points 4 months ago (1 children)

“The idea that data protection has any bearing on being filmed driving your car on a public road and committing traffic offences is ridiculous,” he said.

Yeah.

You know how you could avoid getting caught using your phone while you're driving? How about don't use your phone while you are driving.

[–] IllNess 5 points 4 months ago

We still do the first part but it'll be easier when they are consolidated together.

 

cross-posted from: https://infosec.pub/post/8070199

No exploitations have been observed in the wild as of yet, according to the company's European site, but owners should scan for indicators of compromise given that the bugs have been publicly known but unpatched for months.

Beyond the obvious step of updating to the latest firmware, Canon is advising its customers to "set a private IP address for the products and create a network environment with a firewall or wired/Wi-Fi router that can restrict network access."

 

No exploitations have been observed in the wild as of yet, according to the company's European site, but owners should scan for indicators of compromise given that the bugs have been publicly known but unpatched for months.

Beyond the obvious step of updating to the latest firmware, Canon is advising its customers to "set a private IP address for the products and create a network environment with a firewall or wired/Wi-Fi router that can restrict network access."

view more: ‹ prev next ›