Don’t forget the best place to whistleblow and/or change the system is from within. Privacy minded people can better influence what policies and practices happen at a company when they work there.
Don’t forget the best place to whistleblow and/or change the system is from within. Privacy minded people can better influence what policies and practices happen at a company when they work there.
uBlock is a content filter. Cookies are set when a server responds to a web (http/https) request. So if uBlock has a domain blocked, not only are any cookies blocked, but no requests make it to that domain (whatever.com) at all.
If a domain is not blocked by uBlock Origin’s filters, then cookies are set per your browser’s configuration. Firefox I believe blocks some 3rd party tracking cookies by default, but can be configured to block all third-party cookies as well, but this may break site functionality like single sign-on.
It’s already trivial to see that you’re connecting. You’re not making anything at all more difficult for state level actors, just yourself.
There’s no point in hiding the transaction. A state level actor will see that you’re connecting to the Mullvad VPN addresses and won’t need to check your credit card statement to determine that you’re using it.
I understand the concerns of privacy, but working in academia means that you give up some of the privacy.
Yes people will have your real name and they will know what college you work at and if some crazy person decides that they want to stalk you on campus because you’re woke or part of the deep state turning the frogs gay with chemicals they’ll be able to easily do that.
You’re gonna have 100s of strangers in your classes during the year. You’re going to tell them exactly when you’re going to be in your office for office hours.
If you are unable to handle that I doubt academia is for you.
Academia is about furthering human knowledge especially a PhD. There are sacrifices involved; your privacy is probably one of them.
Part of being an academic is being available to discuss your publications. Your full name will not only be flying around the internet but recorded permanently in libraries and journals.
Science is about collaboration, and standing behind the work you do, publicly. You will find it extremely difficult or impossible to get your PhD without being known to the academic community.
I think you won’t find many anonymous scientific papers held in high regard.
The issueI have with the “always unique” plan is that if they can determine your browser was associated with some set of unique IDs, then they can track you. Imagine a TOTP where the keys were leaked so the adversary can determine the entire set of possible codes.
If everyone’s fingerprints always match each other’s, then you have plausible deniability.
The idea with anti-fingerprinting is the idea that no matter who you are or what your setup is, the fingerprint is created, it matches many, many other browsers
Imagine a sea of people in Guy Fawkes masks.
If your fingerprint is unique, that means you can’t be confused for someone else.
That is literally the opposite of anti-fingerprinting.
You want to look like 1000’s of other people, so they can’t prove it was you that visited a particular site and use that information against you.
Ah, didn’t realize pfSense is the OS, not something that runs on linux. My command examples won’t work for you.
So my first question is how can it be that my little mini J1900 Celeron (2 GHz) with 4 GB RAM cannot handle this bandwith?
sudo ethtool enp2s0 | egrep 'Speed|Duplex'
Your device name may be different from enp2s0
. use ip link
to see all devices. if it’s notSpeed: 1000Mb/s
Duplex: Full
then that’s probably a bad sign.
But this user plans to leave ping running all the time to check that their own Internet connection is working.
Either way, at any given time there’s tons of traffic leaving your network, it just means that software is active, not that a human is active. On top of that, Cloudflare probably isn’t selling the fact that an ICMP ping was received at their DNS server directly to spammers quickly enough for them to act and put an email at the top of your inbox, assuming that spam isn’t caught by a spam filter first.
If the other traffic is already correlated to your IP, then what additional info does an ICMP echo leak?
ICMP doesn’t reveal any personal details. As opposed to say when you visit with the web browser where you can be fingerprinted, and perhaps have that tied to the rest of your browsing history or real world identity.
dmesg | less
should allow you to scroll the output. You should use forward slash in less
to search for the devices (hit enter), see if the modules are being loaded or if there some errors.
check lsmod
before and after see what kernel modules are changing.
also look at dmesg
for interesting kernel messages as you attempt to use / not use the offending hardware.
tcpdump, wireshark can capture packets.
haproxy can be a proxy of many networking protocols
mitmproxy can help see encrypted traffic by acting as a literal man in the middle.
ssh with certain parameters can become a SOCKS5 proxy to encrypt and tunnel traffic out of a hostile network
“This is how I spent the previous month, creating these 3D printed objects to achieve a goal”, not “I am about to pass away and I spent my final month 3D printing these forgettable objects”
Partition
Most 3D printers are nothing like traditional paper printers and don’t need drivers, but require a program called a slicer to create the GCode that your 3D printer understands. Then the GCode file is transferred to the printer either via an SDcard or WiFi for printing.
There are several slicers (OrcaSlicer, PrusaSlicer ) that work reliably on linux. Please binge TeachingTech’s YouTube channel to get a better understanding of what 3D printing entails.
https://teachingtechyt.github.io/