shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

271
active users

#firewall

2 posts2 participants0 posts today
Dave Mason<p>For the Windows users out there, does anyone use a personal firewall for their personal or work machines?</p><p><a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a><br><a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a><br><a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Ralf Lenz, BOFH Emeritus 🏴‍☠️<p><a href="https://fedi.jrlenz.net/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://fedi.jrlenz.net/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://fedi.jrlenz.net/tags/humor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>humor</span></a></p>
ShawnT 🐀<p>Since <a href="https://mastodon.coffee/tags/Ubiquiti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubiquiti</span></a> has long abandoned its <a href="https://mastodon.coffee/tags/EdgeRouter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EdgeRouter</span></a> Lite products and abandoned <a href="https://mastodon.coffee/tags/EdgeOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EdgeOS</span></a>, what are all the cool kids using for their home <a href="https://mastodon.coffee/tags/router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>router</span></a> and <a href="https://mastodon.coffee/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a>? Is there a community firmware for this? Or should I look around for something just as powerful? A WebUI is great, but I'm also cool with CLI.</p>
Simon Brooke<p><span class="h-card" translate="no"><a href="https://mastodon.social/@glynmoody" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>glynmoody</span></a></span> OK, yes, I definitely don't want this on my computer. But <a href="https://mastodon.scot/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> is my currently preferred web browser, and browsers based on Chromium are undoubtedly less trustworthy.</p><p>So how do I block <a href="https://mastodon.scot/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a>'s API at the <a href="https://mastodon.scot/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a>?</p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Peter N. M. Hansteen<p>Long rumored, eagerly anticipated by some, "The Book of PF, 4th edition" <a href="https://nostarch.com/book-of-pf-4th-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/book-of-pf-4th-ed</span><span class="invisible">ition</span></a> is now available for PREORDER. The most up to date guide to the OpenBSD and FreeBSD networking toolset <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/preorder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>preorder</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> (again for the CEST-ish crowd)</p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>»Wild Wild Web:<br>Wild Wild Web erzählt Geschichten aus dem Internet. Mal Wissenschaft, mal Tech, mal Investigativ-Recherche und mal Tier-Doku. Janne Knödler und André Dér-Hörmeyer nehmen euch mit zum Headquarter von Spotify und hinter die Great Firewall.«</p><p>So alt ist das Web schon und auch deshalb eine eigene BR Podcast Reihe darüber.</p><p>🔊 <a href="https://www.ardaudiothek.de/sammlung/wild-wild-web/urn:ard:page:7c70d6d029ffcb1b/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ardaudiothek.de/sammlung/wild-</span><span class="invisible">wild-web/urn:ard:page:7c70d6d029ffcb1b/</span></a></p><p><a href="https://chaos.social/tags/podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podcast</span></a> <a href="https://chaos.social/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://chaos.social/tags/wordwideweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wordwideweb</span></a> <a href="https://chaos.social/tags/radio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radio</span></a> <a href="https://chaos.social/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://chaos.social/tags/geschichte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geschichte</span></a> <a href="https://chaos.social/tags/spotify" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spotify</span></a> <a href="https://chaos.social/tags/headquarter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>headquarter</span></a> <a href="https://chaos.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://chaos.social/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/greatfirewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>greatfirewall</span></a> <a href="https://chaos.social/tags/medien" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>medien</span></a> <a href="https://chaos.social/tags/recherche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>recherche</span></a></p>
Tech Singer<p>There are allot of people here who understand the world in my particular way, so I thought I'd throw this out and see if anyone has done this sort of thing before and can save me from wheel reinvention. I have a <a href="https://tweesecake.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> machine running <a href="https://tweesecake.social/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> which I want to connect to the internet as follows. It has to be <a href="https://tweesecake.social/tags/portable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>portable</span></a>. It has to have access only to a very specific and limited number of IP addresses and DNS names which I will identify in advance and which I will edit by hand. It has to block access to everything else including Microsoft's machines, Google's machines, Basically, if it's not on my list, the machine will not connect to it. Whether the machine wants to connect to an IP address, a DNS name, or a device on the local network, I want connections to be promptly blocked. By promptly, I mean that I want the machine not to time out trying to connect to the stuff not on my list, I want the machine to be told no as soon as it tries. I want this because the machine shouldn't be waiting to timeout, it should just be doing what I told it without wasting cycles and time trying to talk to devices I don't want it talking to. The obvious solution is some sort of <a href="https://tweesecake.social/tags/whitelisting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitelisting</span></a> <a href="https://tweesecake.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> or <a href="https://tweesecake.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> system, but I have three problems there. First, I'm <a href="https://tweesecake.social/tags/blind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blind</span></a> and need <a href="https://tweesecake.social/tags/a11y" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>a11y</span></a> with <a href="https://tweesecake.social/tags/Jaws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jaws</span></a> and <a href="https://tweesecake.social/tags/NVDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVDA</span></a>. Secondly, as I said, it has to be portable, so I can't carry around a second box with a firewall. Thirdly, the machine has both ireless and ethernet access. I want both ports to have access only to the IPs/names I specify. Whether the machine is connected over ethernet or 802.11, I want those rules to be in effect. I have considered MS' firewall, but am nervous that it will let the machine talk to MS, which I don't want it to. Is any of this even possible? Boosts would be appreciated.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> <span class="h-card" translate="no"><a href="https://fedi.omada.cafe/@fluffery" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fluffery</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@maumau" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maumau</span></a></span> <span class="h-card" translate="no"><a href="https://social.tchncs.de/@BryanGreyson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BryanGreyson</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@fairphone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fairphone</span></a></span> I.e. <span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> could not use any of those because they don't support <a href="https://infosec.space/tags/VoLTE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoLTE</span></a> (not just in <a href="https://infosec.space/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a>) and thus would be blocked by the <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a>-<a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a>!<br><a href="https://www.youtube.com/watch?v=zIJavqEzEIw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=zIJavqEzEIw</span><span class="invisible"></span></a></p>
GNU/Linux.ch<p>iptables-Regeln erstellen und dauerhaft speichern (Iptables Teil 2)</p><p>In diesem Artikel erkläre ich, wie man eigene Firewall-Regeln mit iptables erstellt und dauerhaft speichert. Mit dabei: eine Einführung in die wichtigsten Begriffe wie INPUT, OUTPUT, DROP und conntrack. </p><p><a href="https://social.anoxinon.de/tags/iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables</span></a> <a href="https://social.anoxinon.de/tags/iptables_persistent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iptables_persistent</span></a> <a href="https://social.anoxinon.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.anoxinon.de/tags/Netzwerksicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerksicherheit</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p><p><a href="https://gnulinux.ch/iptables-regeln-erstellen-und-dauerhaft-speichern-iptables-teil-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/iptables-regeln-er</span><span class="invisible">stellen-und-dauerhaft-speichern-iptables-teil-2</span></a></p>
Pseudo Nym<p>It's dangerous to go alone. Here. Take this.</p><p><a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.online/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> </p><p>Note: this is totally how cybersecurity works.</p>
Rynn 🌙 Professional Cyberwitch 🌙<p>Hey other <a href="https://furry.engineer/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> folks I have a weird <a href="https://furry.engineer/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> and <a href="https://furry.engineer/tags/NAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NAT</span></a> question. I'm looking at the firewall traffic log where my work laptop (I'm in the office) is the source, and I'm looking at the traffic connecting to my home plex server. </p><p>The plex server is a private IP behind NAT. In the log I show the putbound traffic from my work laptop to my home router IP, but I also see a following entry with the private IP that my router is forwarding plex's port traffic to. I thought anything done behind NAT wouldn't show up, especially because I'm only looking at the initial communication out, and not the return communication from my server to my me. Is my understanding of NAT wrong?</p>
Linux Magazine<p>Using an SSH credential brute-force attack, Go-based PumaBot is exploiting IoT devices everywhere<br><a href="https://www.linux-magazine.com/Online/News/Go-Based-Botnet-Attacking-IoT-Devices?utm_source=mlm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Online/News</span><span class="invisible">/Go-Based-Botnet-Attacking-IoT-Devices?utm_source=mlm</span></a><br><a href="https://fosstodon.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://fosstodon.org/tags/PumaBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PumaBot</span></a> <a href="https://fosstodon.org/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> <a href="https://fosstodon.org/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a></p>
DXC://0<p>I set up a few honeypots in Europe this weekend mdr.</p><p>My servers found russian unreported, so I guess it works fine. So I feed a list + self-report to AbuseIP every day.</p><p>It's downloadable for everyone for free 😁</p><p><a href="https://github.com/DXC-0/Malicious-Robots.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/DXC-0/Malicious-Rob</span><span class="invisible">ots.txt</span></a></p><p><a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>honeypot</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/blocklist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocklist</span></a> <a href="https://infosec.exchange/tags/robots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>robots</span></a> <a href="https://infosec.exchange/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://infosec.exchange/tags/bruteforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforce</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://infosec.exchange/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> <a href="https://infosec.exchange/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a></p>
🏳️‍🌈🤘 Blain SmithFaster firewalls with bpfilter<br><br><a href="https://lwn.net/Articles/1017705/" rel="nofollow noopener" target="_blank">https://lwn.net/Articles/1017705/</a><br><br><a href="https://snac.rblgk.sh?t=bpfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#bpfilter</a> <a href="https://snac.rblgk.sh?t=firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#Firewall</a> <a href="https://snac.rblgk.sh?t=linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#Linux</a><br>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@n_dimension" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>n_dimension</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@shaknais" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>shaknais</span></a></span> <span class="h-card" translate="no"><a href="https://beige.party/@maxleibman" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maxleibman</span></a></span> what kind of facist policestate has it become?</p><ul><li>Oh nevermind, having an encrypted phone or using secure communications is also illegal, I guess... [1 - 5]</li></ul><p>And to enshure <em>"criminals"</em> can't just order something on ShitExpress, they now have an <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a>-<a href="https://infosec.space/tags/Allowlisting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Allowlisting</span></a> / <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://www.youtube.com/watch?v=zIJavqEzEIw" rel="nofollow noopener" target="_blank">in place</a> that makes the <a href="https://infosec.space/tags/Turkish" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Turkish</span></a> Registration Demands look chill in comparison, [6 - 10] cuz they only yeet devices after 90 days and not <em>preemtively block them from any network!</em></p><ul><li>This wouldn't be such a proplem if Australia was like Germany where the furthest doctor away is 1hr by bike and the worst one could get is a bite from a rabid fox and having to get some post-exposure shots. So yeah tourists are not gonna be able to call for help in down under... </li></ul><p>Seriously, whoever came up with these ideas needs to touch grass, preferablzyin the outback on foot!</p><p><a href="https://www.wired.com/story/australia-encryption-law-global-impact/" rel="nofollow noopener" target="_blank">1</a> <a href="https://www.aljazeera.com/news/2022/4/5/australias-dangerous-encryption-law-in-works-in-2015-document" rel="nofollow noopener" target="_blank">2</a> <a href="https://astorlegal.com.au/are-cipher-phones-illegal-in-australia/" rel="nofollow noopener" target="_blank">3</a> <a href="https://www.kingstonfox.com.au/articles/what-are-dedicated-encrypted-criminal-communication-device-prohibition-orders" rel="nofollow noopener" target="_blank">4</a> <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/data-encryption" rel="nofollow noopener" target="_blank">5</a> <a href="https://istanbul.tips/detailed-manual-on-how-to-unlock-imei-in-turkey/" rel="nofollow noopener" target="_blank">6</a> <a href="https://www.mcks.gov.tr/en/registration-and-matching" rel="nofollow noopener" target="_blank">7</a> <a href="https://ico.ku.edu.tr/resources/registering-mobile-phones/" rel="nofollow noopener" target="_blank">8</a> <a href="https://expatguideturkey.com/how-can-foreigners-register-imei-in-turkey/" rel="nofollow noopener" target="_blank">9</a> <a href="https://www.vartur.com/avoid-penalties-register-your-mobile-phone-in-turkey" rel="nofollow noopener" target="_blank">10</a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@jherazob" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jherazob</span></a></span> <span class="h-card" translate="no"><a href="https://existiert.ch/@leberschnitzel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>leberschnitzel</span></a></span> they <a href="https://infosec.space/@kkarhan/114437851069942896" rel="nofollow noopener" target="_blank">already exist</a>...</p><ul><li>Worst case fork <a href="https://infosec.space/tags/PoWshield" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoWshield</span></a> as used by the fmr. admin of <a href="https://infosec.space/tags/IncognitoMarket" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncognitoMarket</span></a> if you don't want to work with your hoster/upstream to block <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attacks through <a href="https://infosec.space/tags/blackholing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackholing</span></a> and having a proper <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> setup!</li></ul><p>I think it's bad <a href="https://infosec.space/tags/TechPopulism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechPopulism</span></a> to think that <a href="https://infosec.space/tags/Anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anubis</span></a> will fix all the issues.</p><ul><li>It's like <a href="https://infosec.space/tags/KernelLevelAnticheat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KernelLevelAnticheat</span></a>, <a href="https://infosec.space/tags/Antivirus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Antivirus</span></a> and <a href="https://infosec.space/tags/DRM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DRM</span></a>: A hamfisted approach that harms legitimate users more than the bad actors!</li></ul><p>Just block all the <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAFAMs</span></a> ASNs &amp; <a href="https://infosec.space/tags/hosters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hosters</span></a> that host <a href="https://infosec.space/tags/Scrapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scrapers</span></a> so the industry cracks down harder on them than on <a href="https://infosec.space/tags/IRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IRC</span></a>, <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a>, <a href="https://infosec.space/tags/CSAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAM</span></a> &amp; <a href="https://infosec.space/tags/BitTorrent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitTorrent</span></a> combined!</p>
Bundeszentrale f. pol. Bildung<p><a href="https://social.bund.de/tags/Job" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Job</span></a> Zum nächstmöglichen Zeitpunkt suchen wir in <a href="https://social.bund.de/tags/Bonn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bonn</span></a> für das Referat Z/5 „Informationstechnik“ Verstärkung im Bereich <a href="https://social.bund.de/tags/Netzwerke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzwerke</span></a> und <a href="https://social.bund.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a>. Zu den Aufgaben gehören u.a. die Konzeptionierung, Durchführung und Koordinierung von Projekten zur Neu- und Weiterentwicklung von Firewall- und Netzwerk-Infrastrukturen. </p><p>Hier erfahrt ihr mehr: <a href="https://www.bpb.de/561580" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bpb.de/561580</span><span class="invisible"></span></a><br>Kommt gerne auch am 8. Mai um 15 Uhr beim offenen Online-Treffen vorbei, wo ihr das IT-Team kennenlernen und Fragen stellen könnt.</p>
nigelI was trying to use <code>iptables</code> decided that life is too short for this hobbyist to go down that path, so installed <code>ufw</code> and saw there was an XMPP app profile when doing <code>ufw app list</code>.<br><br>Brilliant, this should be easy then!<br><b>WRONG.</b><br><br>This is what <code>ufw app info XMPP</code> gave:<br><br><pre>Profile: XMPP<br>Title: XMPP Chat<br>Description: XMPP protocol (Jabber and Google Talk)<br><br>Ports:<br> 5222/tcp<br> 5269/tcp<br></pre>Which is um... not many ports. And naturally broke things like image uploading.<br><br>So I wrote my own in a new file at /etc/ufw/applications.d/ufw-prosody like this:<br><br><pre>[Prosody]<br>title=Prosody XMPP<br>description=Prosody XMPP Server ports per https://prosody.im/doc/ports<br>ports=5000,5222,5223,5269,5270,5281/tcp<br></pre>Which after saving, doing <code>ufw app update Prosody</code>,<br>then <code>ufw app info Prosody</code> now gives:<br><br><pre>Profile: Prosody<br>Title: Prosody XMPP<br>Description: Prosody XMPP Server ports per https://prosody.im/doc/ports<br><br>Ports:<br> 5000,5222,5223,5269,5270,5281/tcp<br></pre><code>ufw allow Prosody</code> to apply (allow) the rules and all is well again.<br><br>❤️<br><a href="https://snac.lowkey.party?t=xmpp" class="mention hashtag" rel="nofollow noopener" target="_blank">#XMPP</a> <a href="https://snac.lowkey.party?t=prosody" class="mention hashtag" rel="nofollow noopener" target="_blank">#Prosody</a> <a href="https://snac.lowkey.party?t=ufw" class="mention hashtag" rel="nofollow noopener" target="_blank">#ufw</a> <a href="https://snac.lowkey.party?t=iptables" class="mention hashtag" rel="nofollow noopener" target="_blank">#iptables</a> <a href="https://snac.lowkey.party?t=firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#firewall</a><br>
politikal<p>Wie bringt man die Mitmenschen nur dazu, den Mailverkehr zu verschlüsseln? Stöhn... 😵‍💫</p><p><a href="https://mastodon.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unplugtrump</span></a> <a href="https://mastodon.social/tags/pfsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pfsense</span></a> <a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/netcup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netcup</span></a> <a href="https://mastodon.social/tags/vps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vps</span></a> <a href="https://mastodon.social/tags/cloudserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudserver</span></a> <a href="https://mastodon.social/tags/netzwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netzwerk</span></a> <a href="https://mastodon.social/tags/cloudnetzwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudnetzwerk</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> <a href="https://mastodon.social/tags/lineageOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lineageOS</span></a> <a href="https://mastodon.social/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSouveränität</span></a> <a href="https://mastodon.social/tags/SupportYourLocalDealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupportYourLocalDealer</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/linuxmint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linuxmint</span></a> <a href="https://mastodon.social/tags/digitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaleSouveränität</span></a> <a href="https://mastodon.social/tags/digitaleSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaleSicherheit</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a></p>