• 0 Posts
  • 104 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle






  • Do you have any documentation on how this work ? Is there a name to this special protocol? Is it a recent addition to the wifi standard ?

    Again a wifi AP doesn’t send data to a specific client. So how does an AP can enforce that one client can’t read a frame for someone else that is properly authenticated? How would an AP prevent someone spoofing mac addresses from receiving that data ?

    I’m really confused by this feature I never heard of even when I was playing with aircrack and so on. Yes sometimes your mac address can get filtered but even that is not really difficult to avoid.

    Sorry I have so many questions but I honestly did quite some “tinkering” with wifi years ago and none of this sounds familiar.






  • Not OP but everytime I used the verbose output of ssh it didn’t help me one bit. Even adding outrageous verbosity I was still quite confused on what step failed and which didn’t.

    I’m probably just bad at understanding SSH but i don’t know it seems like ssh workflow includes many trial and error until it finds a way to connect.

    Imo the verbose output of SSH is often not very helpful if you don’t know very well ssh in the first place. Obviously it is still worth a shot and a good advice but don’t expect ssh to clearly state what is going on :)


  • So basically:

    Russian bots do exist but they are “not that bad”. Also if someone from Russia they are not necessarily a bot because they have a different opinion…

    That’s all fine to have that position but who are you to tell other people if they encountered a bot or a real human being ?

    Do you have any idea how prevalent Russian bots are ? What are their latest strategy?

    I cannot answer these questions and you shouldn’t either.

    The people you are bashing for pointing at “Russian bots” could be completely right. Their perception of internet is not the same as yours.

    If anything it’s good that people are suspicious of any Russian information on the internet. It’s much better in my opinion than your alternative which seems to be built on contempt for people falling for bots and a very prominent ego yourself for thinking nobody ever got you.


  • I care, what do you think I could do ?

    Israël is backed up by the most powerful country in the world both politically and militarily.

    Many people do care, it’s just not something they can fix.

    We can donate to lessen the suffering but at the end of the day, one dude in the Whitehouse could probably get a cease fire in minutes if they really wanted to.



  • Tetsuo@jlai.lutoSelfhosted@lemmy.worldSimple mail server
    link
    fedilink
    English
    arrow-up
    15
    ·
    5 months ago

    If you do self host I suggest reading carefully the Gmail guidelines for mails. They are the leaders in the field and they dictate the level of security required.

    DNS forward and reverse, DKIM, SPF, DMARC, ARC, DANE, bounce signature etc. Email is indeed a very complicated thing to host. I work on emails system all day and and I wouldn’t host my own mail.

    Even worse I’m hoping email disappear and another technology takes it place. Emails are unreliable and outdated, they need to go.



  • Is it possible that this password was really your gf’s password in the past ? It could have leaked long ago and the hacker just decided to use a previously leaked pass to be more inconspicuous.

    I don’t think this whole story is so wild, it could be just coincidental. The hacker knew somehow about her DOB and thought this would be an easy password.

    Rest assured a hacker wouldn’t want to use their own password or reuse even one as that could link to previous nefarious activity. So they had to set up a brand new password just to move forward. So they set up anything personal they could get their hands on.

    PS: you should check haveIbeenPwned for the address of your gf.