Giver of skulls

Verified icon

  • 0 Posts
  • 587 Comments
Joined 101 years ago
cake
Cake day: June 6th, 1923

help-circle

  • Many fairy tales are. Especially the oldest. Some of them have direct references to historic people. This is what I got out of the story:

    I think the sausage is supposed to be the rich class, safely hidden away, in a life of luxury, having others do most of her work. Leaving the safety of their own land without protection was no safe task for many nobles, especially with warring nobles around waiting for a chance to seize more power. With an excuse, the dog took out their neighbouring queen and left society to crumble.

    The mouse may be an allegory for the church (as the church, nobility, and the laymen were often grouped together). Though the sausage clearly had an easy life, the mouse had control in the end, and could be persuaded by the bird (the common people doing the hardest work). The second bird was a (foreign?) revolutionary, infecting the bird’s mind with dangerous ideas.

    In other words: stay in your lane, just do your chores, and everyone is better off. Start shit and society will collapse, and everyone will suffer. Probably written by someone well off.


  • Threadly reminder that “German fairy tales” were as much for adults’ entertainment as they were for kids. Just because a story has a moral, doesn’t mean it’s intended for toddlers

    It’s kind of the old school “cartoons are for children” vibe of stories. Don’t let the evil mouse corporation trick you into believing fairy tales always have a happy ending!



  • And then, as I’ve heard reported in several European countries, when they notice your broken grammar they switch to English for both of your conveniences. Caught myself doing that to some poor student a while back because I was in a hurry and couldn’t parse what they were trying to say.

    And then there’s the other language students, who studied very very well and now sounds like the voice of a kids’ TV show with their perfect “standard” pronunciation. I love seeing immigrants who were so dedicated to their language skills that they end up speaking the local language way better than any local you’ll meet. Sometimes it’s difficult too, because random words won’t have been part of their vocabulary training and they end up talking in-depth about the geopolitical landscape but don’t know what “backyard” means.

    Learning languages is cool, if only I had the patience to do it.


  • Administrator is not root. NT AUTHORIRY\System probably comes closest. You rarely need to interact with that account because Window’s security system doesn’t have the same mix of authentication systems most Linux systems have (users + container APIs + PolKit).

    Windows also supports mixed case filesystems just fine. It’s not the default, so your programs will probably screw up, but it’s just a flag. You can also mount filesystems like ext4 and btrfs on Windows (though booting from them doesn’t really work).

    Also, Windows runs Libreoffice and GIMP just fine. You don’t need to, because you have better sofware available (pirated or paid).

    As for security, Windows is MUCH better unless you’re a cybersecurity specialist with too much time in their hands. Most major distros don’t even come with a firewall enabled by default, let alone a firewall for outgoing traffic. And the best AV I’ve seen for Linux is Microsoft’s enterprise version of Windows defender. In terms of hacking tools, they’re mostly written in languages Python, most of them work on either platform.

    For development, Linux has a slight edge, but with WSL2 it really doesn’t matter much.


  • Running Linux on computers with Nvidia hardware proves that Linux and Windows both have their problems dealing with device drivers. Linux’ benefit is that is has higher standards because the kernel devs need to sign off on driver, but that has downsides of turning away potential driver developers (as getting your code into Linux is a quite a complex thing just on its own). Linux also doesn’t have many drivers in general it seems, unless your device has some kind of generic fallback that disables any special features.

    My kernel panics generally don’t display anything, the display just freezes and I need to force reboot the computer.





  • In the instance of UDP handshakes yes, you need local software to initiate the connection on one of your devices somewhere (I highly doubt that your home router verifies the origin of those packets, so a hacked printer or IoT crap can open ports to your desktop no problem). Other problems are harder to solve.

    NAT is great at what it does, but it does not guarantee security. It blocks straightforward attacks, but brings in tons of edge cases and complexity that sophisticated attacks can abuse. At the same time, the same security can be achieved using IPv6 and a firewall without all the complexity.

    It’s a neat workaround that means you don’t need to mess with subnetting and routing tables when you do stuff like run virtual machines and when your ISP doesn’t offer IPv6. It was designed so larger businesses with 10 machines could access the internet without spending a lot of money on a /30, not to replace firewalls, and it still works well for what it’s designed to do.




  • Not really, though. It was never designed as a security boundary. You can “open” a UDP port by sending UDP packets to another host, and then that host can send UDP packets to you, for instance. Usually the IP addresses of the two hosts are exchanged through a third party, and that’s how STUN/TURN works in essence. Without this, you’d need to port forward every UDP connection manually, both incoming and outgoing.

    NAT only protects you when you have hosts that only communicate along preset routes, but then a normal firewall will also work fine. It’s not like having a public IP means any traffic will actually go through, every modern consumer router has a standard deny all firewall. At best, it sort of hides what devices are sending the traffic.

    Meanwhile, NAT has flaws breaking traffic (causing NAT slipstreaming risks, like I linked elsewhere). It also has companies like Nintendo instruct you to forward every single port to their device if you have connectivity issues. If that forward is not towards a MAC address, and your PC gets the IP your Nintendo Switch used to have, you’ve just disabled your firewall to play Animal Crossing.

    If you want to, you can do NAT on IPv6. Every operating system supports it, even if it’s a stupid idea.


  • Unless you’ve gone out of your way to disable the H.263 NAT ALG, NAT actually allows websites and other services to open either random ports on your machine (if using business firewalls) or ports on any device on your network (many consumer routers).

    If your router allows you to disable SIP ALG and H.263 ALG, you should. If it doesn’t, well, maybe they’ve been patched? If you’ve applied a kernel firmware update to your router the last 1-2 years you may be safe (though not many vendors will bother updating the kernel when updating their routers). You’ll lose access to SIP phones and some video calling services over IPv4, but at least some Javascript on a random blog won’t be able to hack your printer.

    This wouldn’t work with IPv6, as these two protocols just work with IPv6 (and IPv4, as it was designed). ALGs are hacks around protocols, rewriting packets to make all of the problems NAT causes go away.

    More info on this here: https://www.armis.com/research/nat-slipstreaming-v2-0/


  • Hurricane Electric will give you a bunch of free /64s and a /48 to play with, which you can set up for tunneling on any IPv4 connection that doesn’t block ICMP traffic to HE. You can set this up within a range of routers, but if your router doesn’t support it, you can also set it up on most PCs (Windows and Linux for sure, for macOS you’ll need to check, but I’m sure it’ll be fine).

    You can also use IPv6 locally by simply advertising a subnet from the right range (an ULA), which is also useful for maintaining internal addressing if you do get normal IPv6 but your ISP is a bunch of dickwads that rotate the subnets they hand out (likely to happen if they make you pay extra for a static IP right now).


  • This has nothing to do with IPv6 itself. I pull in 4K YouTube videos over IPv6 just fine. My IPv6 routes actually have lower latency than my IPv4 routes, funnily enough.

    Sounds like your ISP has broken their IPv6 routes, or your modem is outdated and can’t do IPv6 hardware acceleration. Disabling IPv6 to downgrade your connection will work as a workaround, at least until your ISP switches over to something using IPv6 as the connection backbone (like DS-Lite, which would allow your ISP to significantly reduce their IPv4 space and make a quick profit selling off their allocations, which is unfortunately becoming more and more common).

    Your ISP or modem manufacturer needs to fix the actual problem here.



  • Then, what prevents whosoever, to copy that file through cloning the complete disk?

    Nothing. At most, you can have a hardware encrypted drive that won’t permit access to the encrypted data without a password, but the file will remain available after unlocking that. Plus, dedicated people (law enforcement, data recovery specialists) may be able to get access to the flash chip itself unless you buy one that self destruct on any tampering attempts (and even those have flaws).

    You cannot prevent copying of data if that data is readable at disk level. At most, you can make the data useless by padding a layer of encryption (as well-encrypted data may as well be random data without the key material). That’s why everyone is going for encryption: encrypted files may as well be inaccessible to anyone who doesn’t know the passphrase. There’s no sense in copying a file which you cannot possibly read any bytes from.

    If the key is gone (i.e. the real key is a password protected file that gets overwritten so even the password doesn’t work anymore), the file becomes irretrievable. This is sometimes called “cryptographic erase” in the context of disks. There are variations of this, for instance, storing the key in the computer’s processor (fTPM) behind a password, and clearing that key out. There’s no way to get the key out of the fTPM so it cannot be backed up. Even if someone were to guess your password, the file will forever remain locked. Or at least until someone manages to break all cryptography, but even quantum computers don’t know how to do that part yet.

    If you’re willing to go deep, you could reprogram the firmware on your SSD/HDD to refuse reading the file. A few years back, someone made a proof of concept firmware that detected disk imaging attempts (because all blocks on the disk were read in order) and had the firmware return garbage while secretly wiping the disk when this detection triggered. You could, in theory, write firmware that refuses to read that block of data. However, if whoever you’re hiding this file from know about that, they can take out the platter/memory chips and dump them directly, bypassing your firmware entirely.


  • “undoing the protection should include filling in a password” That sounds like an encrypted drive. There are USB keys that’ll require software to enter an encryption password before you can do anything (including deleting the contents).

    If you’re on Windows, try Bitlocker or Veracrypt. You can create hard disk images that can be mounted temporarily with a password.

    Same can also be done on other operating systems, though I don’t know what tools yours come with.

    In a pinch, you can just create a password protected 7zip archive, though viewing and editing those files usually involves a temporary copy.

    There’s no way to prevent a file that’s loaded in memory from making it back to the disk. The best you can do is also encrypt the system drive so only people who know the encryption password can boot the computer that’s accessing these files.