Anonymous
Wumbo
Wumbo
Anonymous
Anonymous
Automout does that job
neb
https://www.thezdi.com/blog/2020/9/1/cve-2020-7460-freebsd-kernel-privilege-escalation
Patching time
neb
Anonymous
Older till which version?
neb
I don't know, but article from 2020.09.01
Anonymous
Some one could help me to find the file where a video is cached while you're watching on Firefox? I'm trying using lsof but it still has too much information
Anonymous
Seriously @Jharked999 ur annoying as fuck. In leaving this forum because of u
neb
Anonymous
Yes!
Anonymous
https://www.thezdi.com/blog/2020/9/1/cve-2020-7460-freebsd-kernel-privilege-escalation
neb
Anonymous
Hey could anyone ask Admin of hardenedbsd group to unblock me?
I am immediately banned after joining and posting question link.
Anonymous
Hi my friends I'm trying to research about VPN's. My goal is to connect my phone device to my free BSD computer and then navigating through a tunnel reaching a website
Anonymous
I think it is possible but FreeBSD forums explain how to but the connection is made between my device on my os computer acting as the ending node
Anonymous
Ok
Anonymous
Thanks
Anonymous
Hi pals. I want you give me a minute for asking some information about security
neb
Anonymous
Anonymous
Jaja
Anonymous
Excuse me for my absence. I'm recovering from the virus. And I was resting.
Anonymous
Greetings
Anonymous
My last remark was meant ironically... 😉
Anonymous
Truth is, if you want to 'secure any server' (Windows/Linux/Unix), serious business, so to say, you end up examining/verifiy/configure a few thousand switches/items
Anonymous
It is most exhausting. A full time job, so to speak
Anonymous
each app multiplies the threat and adds another avalanche of config items
Anonymous
Here, politicians can show up to public audiences, any chat from either WhatsApp or SMS. I read that governments like Russia, sells software for exposing WhatsApp information. Israel widely offers through a private company the same service. I accept the principle where nothing is totally secure. But when you live in the middle of a criminal state, you loose progressly the calm.
Anonymous
There are many ways to catch your privacy, but when the state leads up these cyber crime, the most wising is to protect yourself
Anonymous
But how they could do that? I wonder how, I wonder why....
Anonymous
And the second point of this little exposition is how to dealing with active and passive rules for decreasing this risk
Anonymous
Same here. I feel exactly the same. Things are getting worse day by day, currently.
Anonymous
There are a couple of things you can do.
Anonymous
Ok
Anonymous
Get a copy of TAILS (4.10, I believe), burn the iso to DVD and surf with it, when you want to check on sth seriously
Anonymous
Buy a little hardware device to act as a hardware firewall.
Anonymous
A good firewall needs to be a separate computer from your workstation.
Anonymous
Freebsd does not fill the expectatives?
Anonymous
Even a little RaspberryPi is way better than nothing. Low power devices with 2x Ethernet LAN are better, though...
Anonymous
Of course, it could. Only, you must be a real pro to get it configured in way, that is really safe.
Anonymous
And what if you connect through VPN to your Freebsd server and the server acts like a bridge connecting two different sites?
Anonymous
With each separate instance of a device you gain automatically way more security, than you could achieve by (mis-)configuring only one single computer, you have to rely on
Anonymous
Already good, but it's not enough in my opinion. I've been sitting here now for months dealing with network security ... it is really complex. I do not trust ANY operating system. The more I look into the differences between different Linux distros, the more I learn, that nobody seem to have serious interest to make your computing experience rocksolid in terms of IT-security. Lot of work needs to be done... in the end you regularly run out of lifetime, due to lack of knowledge...
Anonymous
That holds also true for the BSDs, I believe. You only know, when you have touched every aspect of the whole OS.
Anonymous
Anonymous
Ok man thanks for your support
Anonymous
I gotta go
Anonymous
email and browser fingerprinting are also annoying
Phil
- for asymmetric encryption avoid the eleptic curve NIST-P256 (it's backdoored by NSA and it's a known fact)
Anonymous
interesting.
Anonymous
I'm personally still far away from full encryption. You need huge knowledge for doing so. Nobody teaches you. As I've said earlier: no organisation has the slightest interest in teaching you those computing skills.
Anonymous
have to go also, by Phil
Phil
Me too
Phil
See you
Anonymous
cu 😊
neb
"A COVID CROWDS" if you shuffle some letters. Still true?
Anonymous
i see a lot of keywords i like the look of
Anonymous
#nsa #corvidsrule
Anonymous
https://turingpi.com/
Anonymous
ive got one of these coming in the vain hope that it will lead me to find some sort of use for kubernates
Anonymous
i want to be excited about it too
Anonymous
why do i want kubernates guys, whats the deal there
Anonymous
Host K8S, K3S, Minecraft, Plex, Owncloud, Nextcloud, Seafile, Minio, Tensorflow
Anonymous
i dont understand why i need or want a cluster to host these things
Anonymous
ɴꙩᴍᴀᴅ
neb
Two QEMUs running in (an old) OpenBSD, 6.6!!) Muchas coolos 😎
Anonymous
Anonymous
kub-kun
kub-kun
Nice joke
Anonymous
Wumbo
kub-kun
Anonymous
🤔