Not to mention that it’s trivial to change your IP on most cloud providers. So if a VPN provider is using a cloud service for some of its gateways then it can quickly remember them if necessary.
- 0 Posts
- 86 Comments
Companies like Akamai already do this to an extent. My employer is an Akamai customer, and they’ve offered this service to us in the past when we saw a lot of malicious traffic originating from commercial VPN providers.
IphtashuFitz@lemmy.worldto
Privacy@lemmy.ml•I am looking to buy a Synology NAS to replace my Raspberry Pi 4B. What data does Synology collect off the NAS?English
1·8 days agodeleted by creator
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL about Marianne Bachmeier who shot dead the man who sexually assaulted and murdered her 7 year old childEnglish
391·11 days agoGary Plauche is another person who took justice into his own hands over the kidnapping and rape of his son back in the 1980s.
Plauche learned that the suspect was being flown back to town in police custody, and figured out the flight he was on. He waited at the airport, pretending to be using a pay phone. As the suspect was escorted past him he walked up and shot him in the head at almost point blank range. A local TV station caught it all on camera and I think you can still find it if you search for it.
Plauche was ultimately convicted of manslaughter but was given a suspended sentence, probation, and community service. No jail time.
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL that all of the world's 500 most powerful supercomputers run on Linux.English
7·12 days agoI managed a research cluster for a university for about 10 years. The hardware was largely commodity and not specialized. Unless you call nVidia GPU’s or InfiniBand “specialized”. Linux was the obvious choice because many cluster-aware applications, both open source and commercial, run on Linux.
We even went so far as to integrate the cluster with CERN’s ATLAS grid to share data and compute power for analyzing ATLAS data from the LHC. Virtually all the other grid clusters ran Linux, so that made it much easier to add our cluster to its distributed environment.
IphtashuFitz@lemmy.worldto
Science Memes@mander.xyz•Health Secretary Kennedy says there's 'not sufficient' proof to show Tylenol causes autismEnglish
1·1 month agodeleted by creator
IphtashuFitz@lemmy.worldto
Privacy@lemmy.ml•There isn’t really another choice: Signal chief explains why the encrypted messenger relies on AWSEnglish
2·1 month agoThe issue with cloud providers like AWS is that they charge for virtually everything, and that makes it easy to rack up charges if you forget about something you spun up as a test last week and forgot to terminate it. For larger companies it can be a significant issue. So there are other companies out there that you can use to scan your entire AWS account, summarize what you’re using, and highlight things you may not need any more. They’ll also recommend cost savings measures like paying for a year of server time up front instead of paying as you go. If you know you’ll need a server for a year then paying annually is a lot less expensive.
On the plus side, you don’t need to deal with things like hardware failures. We have a large AWS environment where I work, and we’ll occasionally get an email informing us that an instance is “running on degraded hardware”. A simple reboot (power cycle) will move the instance to new hardware. And if you decide you need more RAM, more CPUs etc. then it’s also as simple as rebooting.
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL the US Navy maintains a private forest to supply the wooden ship USS ConstitutionEnglish
1·3 months agoNone of those were built in 1797. It’s the world’s oldest commissioned naval warship still afloat.
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL the US Navy maintains a private forest to supply the wooden ship USS ConstitutionEnglish
2·3 months agoThe ship regularly undergoes maintenance, so it’s constantly checked for things like rot etc. and parts of the hull etc. are replaced as needed. There’s a dry dock at the Navy yard where it’s berthed and every few years the news says it’s being put there for a checkup.
During the sail my understanding is that the biggest concern was the use of modern materials in the sails & rigging. 200 years ago the sails would have been made of linen, which is fairly porous, so some percentage of wind would pass through it. Modern sails are made from materials based on plastics that catch virtually all the air. So the concern was if they raised all the sails they could introduce far more stress on the rigging & masts than the ship had ever encountered. So out of an abundance of caution they only used some of the sails.
I also remember hearing that during the planning of the event the Navy wanted to have a couple larger modern ships sail by as part of a salute. That was reportedly shelved when it was pointed out (by somebody not in the Navy) that the wakes of those larger boats were bigger than the Constitution itself.
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL the US Navy maintains a private forest to supply the wooden ship USS ConstitutionEnglish
9·3 months agoFor clarification, the USS Constitution typically does not sail or otherwise maneuver under her own power. Instead, she is towed by a tugboat. I think it has sailed under her own power only three times in recent history, starting back in 1997 when it was towed out of Boston harbor, sailed up the coast unassisted for about an hour, then was towed to Marblehead for a visit before returning to Boston. That was the first time in 116 years that it sailed unassisted.
Source: I was crewing on one of the US Coast Guard Auxiliary escort vessels and had a “front row seat” to the event.
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL there is a law called Marchetti's Constant. Humans only tolerate commutes of less than ~1 hour. Housing outside that limit will fail.English
6·4 months agoI met a lawyer working in Boston & living in the burbs a number of years ago. When Covid hit he worked from home for over a year. His job was one that could easily be remote, but like so many others, his boss eventually wanted him back in the office. His boss did admit that continuing to work remotely would have been an option if he lived further away.
He & his girlfriend moved to Vermont, and he still has that job.
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL there is a law called Marchetti's Constant. Humans only tolerate commutes of less than ~1 hour. Housing outside that limit will fail.English
12·4 months agoBack in the 90’s and 2000’s my commute ranged between 30-60 minutes by car one way to a combination of 15 minutes driving and 30-45 minutes on a subway.
Since shortly before the pandemic my commute has been up a flight of stairs to our guest bedroom that’s now my office.
I’m never going back.
IphtashuFitz@lemmy.worldto
Privacy@lemmy.ml•Tor Browser: Most Common FingerprintsEnglish
5·4 months agoCDN/security providers like Akamai & Cloudflare maintain lists of known Tor exit nodes and keep it regularly updated. That makes it trivial for customers to block that traffic.
Source: My employer is an Akamai customer and we use this list in some our WAF policies.
IphtashuFitz@lemmy.worldto
Science@mander.xyz•Strange radio pulses detected coming from ice in AntarcticaEnglish
27·6 months agodeleted by creator
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL that tracing phone calls by keeping the phone line open is a totally outdated tropeEnglish
5·11 months agoOnly some VOIP calls are routed over the internet. Most calls, while digital, are still routed over the proprietary networks owned & operated by the major telcos.
The internet is a packet switched network, which means data is sent in packets, and it’s possible for packets to end up at their destination out of order. Two packets sent from the same starting point to the destination could theoretically go over completely different routes due to congestion, etc. The destination is responsible for putting the packets back together properly. Packets can also get delayed if other higher priority packets come along. It’s for reasons like these that both voice & video on the internet can occasionally freeze, stutter, etc. Granted the capacity & reliability of the internet has improved greatly over time so these things happen less and less often. But the fact still remains that a packet switched network isn’t optimal for real time communication.
Telephone networks on the other hand are circuit switched networks. When you are talking to somebody on a telephone then there is a dedicated circuit path between you and the other person. Each piece of the path between the two of you has a hard limit of the number of simultaneous calls it can handle, which ensures it always has the capacity to serve your particular call. If a circuit between two points is maxed out then the telephone exchange may try to route your call via a different path, or you may just end up with a busy signal.
Packet switched networks also don’t have those hard limits that circuit switched networks do. So packet switched networks can get overwhelmed (think DoS attacks) which can also lead to outages.
IphtashuFitz@lemmy.worldto
Star Trek Social Club@startrek.website•21 Star Trek Actors That Died in 2024 | TrekCultureEnglish
12·11 months agoFuck that site that requires you to click through 21 individual pages instead of using just one page for the list.
Spoofing is a whole hell of a lot easier said than done. Content delivery networks like Akamai, Cloudflare, etc. all know exactly how different versions of different browsers present themselves, and will catch the tiniest mistake.
When a browser requests a web page it sends a series of headers, which identify both itself and the request it’s making. But virtually every browser sends a slightly different set of headers, and in different orders. So Akamai, for example can tell that you are using Chrome solely by what headers are in the request and the order they are in, even if you spoof your User-Agent string to look like Firefox.
So to successfully spoof a connection you need to decide how you want to present yourself (do I really want them to think I’m using Opera when I’m using Firefox, or do I just want to randomize things to keep them guessing). In the first case you need to be very careful to ensure your browser sends requests that exactly matches how Opera sends them. One header, or even one character out of place can be enough for these companies to recognize you’re spoofing your connection.
IphtashuFitz@lemmy.worldto
Today I Learned@lemmy.world•TIL when applying for a British passport online, your identity has to be confirmed by someone who is not a relative, knows you for two years, and has to be from a specific (weird) list of professions.English
7·1 year agopresident or secretary of a recognised organisation
What constitutes a “recognized organization”? That sounds rather open to interpretation…
IphtashuFitz@lemmy.worldto
Linux@lemmy.ml•Linux Sys Admins, do you work on Linux or Windows office laptops?English
6·1 year agoWary why? I work remotely in IT and manage a ton of Linux systems with it. Because my company has a large number of remote employees they limit us to Windows or Macs only, and have pretty robust MDM, security, etc. installed on them. Since MacOS is built on top of a unix kernel it’s much more intuitive to manage other unix & linux systems with it.
Personally I haven’t used Windows really since before Windows 10 came out, and as the family tech support department I managed to switch my wife, parents, brother, and mother in-law all to Mac’s years ago as well.
In the original.