Hacker Newsnew | past | comments | ask | show | jobs | submit | aws-user's commentslogin

My goal from posting on various forums like SO is to scale the impact of my knowledge to as many people as possible, to give something back. I really don't care what modality or mechanism is used to distribute my contribution to others.

Why should I care if my SO answer I posted 7 years ago ends up in an LLM output in some random model? I wasn't getting paid for it anyway, and didn't expect to.

I view my random contributions across the web ending up in LLMs as a good thing, my posts now potentially reach even more people & places than it would have on a single forum site, that's the whole point of me posting online. Maybe I'm an outlier here.


Unfortunatly I can't subscribe to the updates "Failed to send verification email". Also, would you be willing to share what prompt are you using? Thanks!


Hey, can you try again? I ran into an API limit that should be resolved now


I just tried. I get the same.

URL looks like that: http://undefined/api/verify-email?token=.....


I also received undefined.

I replaced undefined with trading.snagra.com and I see a success confirmation message


Thanks ccheney, I think I found the issue and fixed it. Sorry again for folks running into issues, really appreciate folks interested enough to follow along and help troubleshoot as well


Can confirm. That worked.


Looks interesting. Unfortunately the profile selection list is empty for me, even though i have populated ~/.aws/credentials and have lots of profiles in ~/.aws/config. Tried using --clear-cache.


Same for me. Editing the config.toml didn't help either.


Name checks out :)


malware and other spying apps (like your television) are just adopting DNS over HTTPS (DoH) and bypassing whatever local DNS server you have deployed on your network, pihole and such are quickly becoming irrelevant.


Thats why you block 53/udp and 53/tcp ports in your home gateway IP forwarder.

Insidious things, tsk tsk.


DNS over HTTPS is using port 443 because it's... HTTPS. Are you blocking that too?


You can block HTTPS to known DoH providers. You can set up an alias in a firewall to load the list from https://public-dns.info/nameservers-all.txt. Its a bit of a cat-and-mouse game as it relies on that list being updated frequently and reliably, but its the best you're gonna get for blocking DoH.

Also make sure to block outgoing TCP and UDP 853 – this blocks DoT and DoQ too.


Have you found any open resolvers that are using a shared CDN IP? I've been on the lookout for those ever since the first discussion of DoH appeared on HN. I have yet to find one but I would really like to know details if you have found one. Thus far I have been able to block DoH by NXDOMAIN'ing "use-application-dns.net" and blackhole routing about 80 IP addresses.


That's why you run a transparent HTTPS proxy gateway with iCAP DNS filters


This DNS server supports DNS-over-TLS, DNS-over-HTTPS and DNS-over-QUIC among others, so it can’t be bypassed.


I like the detailed blood stained steps of the temples


isn't tor under the control of US intel agencies now? is there an alternative darknet?


Tor never claimed resiliency against large-scale traffic correlation attacks. Anyone who can look at a sufficient portion of all internet traffic has a good chance of deanonymizing TOR users. The Snowden revelations could lead one to believe that the US is sniffing enough traffic to make this viable, but it's anyone's guess if they collect and synchronize enough data to make deanonymization of TOR users viable.

I2P always looked more promising to me, and more open about its threat model [1] and potential mitigations. But it's not built for browsing the open internet, so it has a somewhat different niche.

1: https://geti2p.net/en/docs/how/threat-model


I wish more people ran TOR nodes. I intend to run one when I can.


To be fair it's not like you can run one from your home connection. I mean you could, but it wouldn't be a good idea, unfortunately.


Running an exit relay from home would be a very bad idea, and if your IP frequently changes you might not be picked as guard relay. But I don't see why you couldn't run a middle relay from home, as long as you don't have a traffic cap.


You can run an exit relay from home, at least in the US. There are some ISPs (mostly on the East coast, afaict) that may not help you, but most of them seem to understand how the laws work.

In other countries you may not have such luck.


Running an intermediate/middle node is generally safe. You want to avoid running an exit node.


Running a middle node got my IP banned from some services, even services provided by my ISP.


Indeed, some CDNs like Akamai do not bother distinguishing relays from exit nodes and just ban everything.


Does this apply to snowflake relays?


The whole point of Snowflake relays is that nobody knows about them. If Akamai knows about it, then it failed.


I've never heard of snowflake relays. What are they?



I've been running a Tor relay from my home for a decade, at least. It's not an exit relay. Never had any issue.


Tor was originally written by US intel agencies specifically to provide cover for spies. The release of the software to the public was specifically to provide plausible deniability for those spies. So there's always going to be some level of control and knowledge the US has about the network.

If your threat model is anything weaker than a hostile nation state then Tor is still probably good enough to use as a darknet. If you're doing anything illegal over Tor then you probably should be more worried about OPSEC failures or rubber-hose cryptanalysis.


Are you sure it was supposed to provide "cover for spies"? AFAIK onion routing was an invention of the US Naval Research Laboratories and was public from the beginning. If you want "spies" to use it, you don't want them connecting to known gateways. High anonymity (simplex) is why number stations are still a thing.


> If you want "spies" to use it, you don't want them connecting to known gateways.

The best place to hide a tree is in a forest.

If you have both 'normal' users and spies connecting to this host, who will tell who's the spy?


Do number stations still a thing? Here in Europe there are just some beacons that broadcast the same message daily but no other activity whatsoever.


They're still a thing as recently as a year or two ago when I looked into it. They're "perfect" in that the receiver can't be identified from the message or its channel (other than catching him with his radio), and that the message cannot be reversed (encoded w/ a one time pad). So they're hard to replace.


One time pads aren't perfect. The same secret has to be stored on both sides and can be compromised from either side.

OTP has to be delivered preserving secrecy. Transmitting a public key only needs to preserve integrity.


In regards to your second question, yes, there is I2P.

https://geti2p.net

It's better than Tor in a few ways, in particular how it handles DDOS attacks. I2P is also more focused on facilitating hidden services (eepsites) than being a clearnet proxy.

There's also Yggdrasil, although it doesn't seem particularly concerned about anonymity.

https://yggdrasil-network.github.io/


For i2p, is there something like tails? Like a hardened read-only OS built to avoid the usual client opsec failures?


To answer my own question: Kodachi linux seems to do this.

https://sourceforge.net/projects/linuxkodachi/

Although it's not nearly as minimalistic as Tails.


https://letsdecentralize.org

Here are a few options.


Mesh networks that don't operate as an overlay network could in theory be pretty effective to avoid large-scale traffic correlation attacks. If we assume that the US has effective control over the whole backbone network, and enough control inside the network of most commercial available ISP's, then there isn't much mixing networks can do. An adversary can always observe, inject, throttle, speed up, block and otherwise disturb the network flow in order to determine who is talking to whom.


Not for us common folk, I don't think so.

Sure, they can listen in on you all they want, but what good is any of that if they can't use it against you in a court of law?


Ever hear of parellel construction?

https://en.wikipedia.org/wiki/Parallel_construction


I hope not. Tor being used for whistleblowing and censorship circumvention is one thing, but the onion network is pure anarchy and probably the worst case scenario of what the internet could become.

https://youtu.be/iItLpwkQMUQ&t=277


It is useful as a free-for-all outside of censorship.

You probably don't want an area free from censorship most people don't. I browse with safe images enabled when searching google images. Once in awhile I'll open it up and see a world that didn't exist before. I don't think that world should be removed even if I rarely visit.


"The maximum bandwidth of a Sidewalk Bridge to the Sidewalk server is 80Kbps - total monthly data used by Sidewalk, per account, is capped at 500MB"


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: