Supermariofan67

joined 1 year ago
[–] Supermariofan67 2 points 14 hours ago

It has no fiber at all. No animal products contain any dietary fiber. Dietary fiber is by definition cellulose and other non-digestible starches found in plant material.

[–] Supermariofan67 17 points 1 day ago (3 children)

Saturated fats are not good actually. That's a lie funded by dairy industry.

And trail mix (with nuts and whole grains and fruit) is in fact healthy.

The overwhelming majority of Americans eat nowhere close to the bare minimum recommended amount of fiber. Guess which one has lots of fiber? And is also full of minerals not found in many other foods

[–] Supermariofan67 6 points 1 month ago (1 children)

I don't exactly consider Drew Devault a reliable or unbiased judge of character

[–] Supermariofan67 13 points 1 month ago

Perfect example of a (part of a) security vulnerability being fixed in a commit that doesn't immediately seem security related and would never be back ported to a ~~stable~~stale distro

The code which parses the binary MaxMind database after decompression is well guarded as of 2024 but used to look different, potentially providing more attack surface. There is also an interesting commit where a contributor makes adjustments to the gzip::decompress() function which hints at a stack overflow, as the destination buffer was changed from static allocation on the stack to dynamic allocation on the heap, though it was not exploitable due to checks before it is written to

[–] Supermariofan67 17 points 1 month ago (2 children)

The problem is not the RSA math itself but that it is both extremely slow and implementing it is particularly susceptible to bugs and side channel attacks https://blog.trailofbits.com/2019/07/08/fuck-rsa/

[–] Supermariofan67 3 points 2 months ago

The article on theregister stated

Also inside the uploaded source code was some GPL 2 source code, which renders the not-very-open WCL moot.

[–] Supermariofan67 52 points 2 months ago (3 children)

Winamp published their code as "open source". Problem is...

  1. It wasn't open source, it was proprietary but you can see the source code.
  2. Their custom license didn't even allow forks, which is against GitHub TOS
  3. The codebase apparently contains proprietary code from third parties that they don't have the right to relicense.
  4. The codebase apparently contains GPL code from third parties that they probably didn't have the right to make proprietary in the first place
[–] Supermariofan67 15 points 2 months ago

This is a standard feature on any IPv6 enabled network if you enable IPv6 Privacy Extensions

[–] Supermariofan67 1 points 2 months ago (2 children)

Huh, I misremembered then. I stand corrected.

Notable though that there are specific countries (such as India) where adoption is far higher at 72%

[–] Supermariofan67 1 points 2 months ago

Huh weird that it would be removed, that's a fair comment.

For Web scraping and other activities by so-called "legitimate" companies to varying degrees, this may be the case. But for general bots, they are generally attempting to scan and probe the entire IPv4 range, since it can be exhaustively checked in a reasonable amount of time and the majority of IPs have hosts on them. Enumerating the entire IPv6 space is quite literally impossible without some external list of hosts known to exist, due to the number of hosts. This happens, but it's a much higher hanging fruit for an attacker so far fewer will bother. So you generally see few to no continuous probes on things like sshd over IPv6 unless you have a domain name. I'm guessing a lot of bots (in botnets) are dumb old technology that doesn't even have IPv6.

NAT was always a hacky workaround. And although it effectively ends up functioning as a firewall under normal usage when combined with a typical "drop invalid incoming packets" rule, it was not designed to be a firewall and shouldn't be assumed to always function as one. A simple accept established, default drop firewall rule should do the trick and should be used on both v4 and v6 regardless of NAT (and probably is on your router already).

If your goal is privacy in the sense of blending in, you can still use NATv6 and this is a good use case for it. This is what VPNs like Mullvad use. If your goal is privacy in the sense of being more difficult to track across sessions, you can enable IPv6 privacy extensions which essentially generates a new IPv6 address for every connection your device makes. So in this sense it's more private than IPv4

[–] Supermariofan67 9 points 2 months ago (7 children)

Or you could just... learn to use the modern internet that 60% of internet traffic uses? Not everyone has a dedicated IPv4 anymore, we are in the days of mobile networks and CGNAT. IPv4 exhaustion is here today.

[–] Supermariofan67 3 points 2 months ago

Best to set a firewall rule with nftables to block non-vpn traffic from leaving (you should also do the save for IPv4 traffic to prevent leaks in case the tunnel disconnects)

view more: next ›