The Post Ninja

  • 11 Posts
  • 1.12K Comments
Joined 2 years ago
cake
Cake day: July 8th, 2023

help-circle










  • Browser fingerprinting takes measurement of things the browser exposes. If a browser exposes installed extensions, this can be used to corelate information. If awebsite checks if the browser loaded something or not, that also can be used to corelate.

    Example, you (ip address xxx.xxx.xxx.xxx) visited this website (trackingsite.xyz), with a screen resolution of 1920x1080, using a (Mozilla/firefox) browser. The three trigger pixels did not load, meaning you’re using an adblocker, and the remote font loaded from localhost, not google. Your canvas, microphone, and camera are all blocked. Your browser also responded to an api ping for (useful extension). Interesting. This same configuration was also on (othertrackingsite.xyz) and (definitelyalegalsite.xyz), both of which a browser with the same info navigated to for at least 5 minutes, so we know it wasn’t a mistype. This same browser configuration was seen regularly browsing these sites on [days of the week] at [time of day], indicating a regular habit.

    We know who you are and where you have gone.







  • The Bible’s track of history is unique in that it doesn’t just show when the people written about did good, it also shows when they did bad. David was good, until he got into that affair with Bathsheba, and indirectly got her husband killed in battle. He was called out on that part by a prophet speaking in behalf of God, and the only reason he lived was that he repented, but he still lost their first child because of it.

    Solomon was the king with a thousand wives. He asked God for smarts when presented with an option to ask for anything and be granted it, and he was granted that and more for thinking spiritually and not materially, but then he started getting into the whole wives and concubines thing. Another example of “started out good, but then got sucked into doing bad”, as he was given advance prophecy that Israel would be broken into pieces over this. Which happened when his son took over and made things worse.



  • Blaster M@lemmy.worldtoLinux@lemmy.worldWhy No Hypervisor-Based Security?
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    5 days ago

    Incorrect. The difference is not that there’s a server edition or desktop edition (which for many linux distros, there very much are server and desktop editions, even if the only difference is which packages are installed by default), but that when you properly setup a server with internet-exposed services, you usually are smart enough, have gone to school for this, learned from experience, or all of the above, how to secure a linux system for server use, and should have a configuration setup that would be inconvenient at best for a desktop, but is more secure for the purpose of a server. In addition, when running a server, you stick to what you need, you don’t arbitrarily download stuff onto a server, as that could break your live service(s) if something goes wrong.

    The average desktop user does not have any of that experience or knowledge to lock down their system like ft knox, nor do they have the willpower to resist clicking on / downloading and running what they shouldn’t, so if most of everyone stopped using Windows and jumped to Linux, you would see a lot more serious issues than the occasional halfass attempt at linux malware.


  • If a browserjack malware does a complicated zero-click attack to gain root when you accidently typo a website, unfettered access to the system by root is a big problem. This is why SELinux exists. This is why browser sandboxing exists. This is why virtualization of modules and drivers and so on exists. This “security theatre” as you call it is to provide protection. Is protection guaranteed? No, but it’s the difference between locking your door at night and leaving it wide open.