lazynooblet

joined 2 years ago
[–] lazynooblet@lazysoci.al 5 points 4 months ago (1 children)

Okay. You got me. Damn it

[–] lazynooblet@lazysoci.al 6 points 4 months ago (1 children)

This is still trivial. A Pi with 2 NICs and a Linux bridge. Using the 2 ports, effectively put the Pi in between the device you want to spoof and the rest of the network. Now you can see the traffic, the MAC addresses etc.

[–] lazynooblet@lazysoci.al 14 points 4 months ago (3 children)

Why are the US meddling in this?

[–] lazynooblet@lazysoci.al 1 points 5 months ago (1 children)
[–] lazynooblet@lazysoci.al 7 points 5 months ago

You've posted this in so many places already, and you think it needs to be in "memes" as well?

[–] lazynooblet@lazysoci.al 1 points 5 months ago

Also nmap uses fingerprinting on port scans to identify devices. Or attempt to, a lot of the time it doesn't know, or says "Linux"

[–] lazynooblet@lazysoci.al 2 points 5 months ago

Yes and yes.

However I don't use these solutions for mobiles. I use standard wireguard for that

[–] lazynooblet@lazysoci.al 3 points 5 months ago (2 children)

There are loads of alternatives now so it's a good time to have a look.

I've setup netmaker at home, and netbird at work They are both good solutions.

I think if I had to redo home I would swap to netbird. Both of these are fully self hosted.

Neither are as easy to setup as tailscale, but once you get over that hurdle it's fine.

[–] lazynooblet@lazysoci.al 9 points 5 months ago

We are getting to the point where llm are used to expand on a topic and fill out an article and then another llm provides an inaccurate tldr summary. What a world to live in. 🤢

[–] lazynooblet@lazysoci.al 5 points 5 months ago* (last edited 5 months ago)

This. Some people don't realise how ridiculously easy it is to change a lock when you can open the door with a key.

  1. Put the working key into the lock

  2. Undo this screw

  3. Turn the key slightly back and forth whilst pulling the cylinder out until it starts to come out. Then just pull it all out.

  4. Mark which side was front and back

  5. Measure from the middle locking mechanism of the cylinder to the ends.

  6. Find a lock with the same lengths. It'll be like 60/40 (100mm total length).

6b. Optional: get one with a fixed turnkey on the inside.

  1. Replace lock by reverse.
[–] lazynooblet@lazysoci.al 4 points 5 months ago

I hear you. I worked for an msp where some customers would refuse to invest in backup solutions and we either declined to renew their contract or they suffered an event and we were then setting up backups.

I was in the middle of a migration from OVH to Hetzner. I knew I had good backups at home so the plan was to blow away OVH and restore from backup to Hetzner. This was the mistake.

Mid migration I get an alert from the raid system that a drive has failed and had been marked as offline. I had a spare disk ready, as I planned for this type of event. So I swapped the disk. Mistake number 2.

I pulled the wrong disk. The Adaptec card shit a brick, kicked the whole array out. Couldn't bring it back together. I was too poor to afford recovery. This was my lesson.

Now I only use ZFS or MDRAID, and have multiple copies of data at all times.

view more: ‹ prev next ›