Water diving?
Anyway I don’t really see Wifi as much of a privacy risk. There are way more concerning things than Wifi. For Wifi to be attacked you need very specific conditions one of those being close proximity.
In the past you could’ve used Wifi for physical tracking when people visited a place but now MAC address randomization is a thing and modern devices do not broadcast discover frames for Wifi.
Silly question but what are you talking about?
Where did you see names?
Fedora did it almost immediately
It is pretty clear Arch doesn’t seem to car about shipping license encumbered software
I am a little concerned about the fact that Let’s encrypt is a centralized service subject to outages. What would happen if they we either breached or had a several day issue.
If you are in the cloud you can use the cloud provided certs
Self signed certs still support longer time frames
If you need to expose a legacy system to the internet we have bigger issues
I think the main idea is to force automation
“You can’t use Let’s encrypt in production!”
Me using let’s encrypt for almost everything
I hate that DOS has been so influential to command lines. SQL and Cisco IOS are both a pain to use.
Generally yes
deleted by creator
It is bold to criticize the system while actively trying to commit fraud.
You are talking about fraud. I’m not about to help you commit a crime. If a company wanted someone from abroad they wouldn’t restrict it to US only.
No SSH?
The Tor browser is designed to appear identical to web sites so it is harder to fingerprint. Combine that with the three hop routing and it is very hard to pin point a user. Tor also has strong anticensorship tools that can be activated with a single click. It also has Onion sites which are extremely hard to track and do not pass over the clearnet.
VPNs are not and have never been particularly useful from a privacy perspective. You would need to trust the VPN provider which is faulty due to the fact that you have no way of knowing what the VPN provider is doing. Also your traffic still passes over the internet after it leaves the VPN provider so there still are ISPs involved. VPNs are really useful for changing your IP address and bypassing censorship. There is no other use case despite all the marketing.
The real way to get better privacy on the internet is to use https only and to setup encrypted DNS.
I don’t believe you can use OPNSense on a switch. Switches are in layer 2 typically and have hardware that switches.
Technically you can run OpenWRT on some switches but it is still experimental and it is very much not enterprise grade
No CLI which is a deal breaker for me
How’s the CLI? I doubt I would ever need a GUI
Did you verify the wiring/fiber? That’s often the sign of a bad connection
I guess you will find out
Its probably fine. Just make sure you have a backup outside of the cloud provider.
All I’m talking about is a simple behind the scenes proof of work. It doesn’t need to be fancy and could implemented with just a little extra code. The user visits a page and the browser does a proof of work at the request of the server.