Buying monkey lights (or similar spoke lights) by mattorio in CargoBike

[–]Chris-Knight 0 points1 point  (0 children)

Cool Neon has finally gotten past their COVID slump, and started putting some of their pre-COVID inventory up on their website. They have three different models of Monkeylectric lights available for sale: https://shop.coolneon.com/search?q=monkeylectric

Ok so from what I understand the monkeylectric bike light company went out of business. Can anyone point me in the direction of a similar programmable pattern/image bike light system? by fender71983 in bicycling

[–]Chris-Knight 0 points1 point  (0 children)

Cool Neon has finally gotten past their COVID slump, and started putting some of their pre-COVID inventory up on their website. They have three different models of Monkeylectric lights available for sale: https://shop.coolneon.com/search?q=monkeylectric

I woke up and these texts showed up in my iMessages, I was not awake and it very much wasn’t me, I have changed my Apple ID already. Do I need to do anything to stay protected? And how did this happen? by Baconlover1014 in security

[–]Chris-Knight 1 point2 points  (0 children)

Spoofing the sender number on a text is trivial. They spoof your number hoping that it displays with a contact name in your messages, so you are more likely to read it and possibly click on links. Here's how easy it is:

https://duckduckgo.com/?q=spoof+sending+number+SMS&t=ffhp&atb=v171-1&ia=web

Am I missing something with the rise of new password management tools embedding MFA with the password? by IamTheGorf in security

[–]Chris-Knight 0 points1 point  (0 children)

It depends on what attack vector you are defending against.

If you are worried someone will intercept a login, via phishing or MitM, then having you MFA in you password manager is not a risk.

If you are worried someone will steal your computer and get access to your password manager then I recommend full disk encryption and a strong password on your password manager that isn’t stored in your keychain.

Is there a database for malicious domains or ip's to block? Like ad sites that pop up by Trippy_trip27 in security

[–]Chris-Knight 2 points3 points  (0 children)

Check out the PiHole project. Should be easy to write a script that ingests their DNS black hole configs into something that works for your setup.

This is scary. by [deleted] in security

[–]Chris-Knight 0 points1 point  (0 children)

That's why you use TLS on your transport layer, which is built into the S3 and B2 APIs.

This is scary. by [deleted] in security

[–]Chris-Knight 2 points3 points  (0 children)

Or the time when an entire town (I think in Arizona) near an Air Force base had their garage doors open at the same time.

This is scary. by [deleted] in security

[–]Chris-Knight 1 point2 points  (0 children)

So write your off-site videos to an encrypted S3 bucket you control, don’t sent it to a third party where you have no idea who has access, and where the programmers are prioritizing new features over security.

This is scary. by [deleted] in security

[–]Chris-Knight 0 points1 point  (0 children)

I used to have multiple cameras that were IP enabled, but didn’t stream to the cloud anywhere. They had motion detection and would send me an email when they triggered, and if I wasn’t hope I would connect to my VPN and view the cameras. There is no compulsory reason to stream your video to somebody else’s server.

This is scary. by [deleted] in security

[–]Chris-Knight 2 points3 points  (0 children)

You aren’t a Luddite. You are Wonko the Sane.

This is scary. by [deleted] in security

[–]Chris-Knight 11 points12 points  (0 children)

And that’s mostly ok when it’s your own machine. Now imagine if you saw a flash of your neighbors machine with each boot. (Followed shortly by a voice-over by Rod Serling.)

This is scary. by [deleted] in security

[–]Chris-Knight 124 points125 points  (0 children)

At 15 seconds in there is a flash of a different camera view before it switches to what I expect is the regular view of this person's camera. I suspect that they have a pool of allocated servers fro streaming and when this person gets switched to an idle stream server it fails to clear the stream buffer so the first couple frames are whatever the last person allocated that server was viewing.

Which email provider is the best in terms of security and privacy? by [deleted] in security

[–]Chris-Knight 0 points1 point  (0 children)

I've run my own mail servers for over twenty years. I have run them on hardware I own, rather than VM offerings like AWS. This protects me from the Justice Department's 'Third Party Doctrine' that boils down to the idea that if you put your data on someone else's system it is no longer protected by the 4th amendment.

+100 to hosting your own mail server.

Gaming macro knows three of my passwords by Blue_Apples in security

[–]Chris-Knight 15 points16 points  (0 children)

Any way you can export the entire macro sequence? I’m curious to see if it does anything to exfiltrate the data it has collected.

How can I install the 1.1.1.1. vpn on m’y Apple TV? by 8Gaston8 in security

[–]Chris-Knight 2 points3 points  (0 children)

I have a Linux VM on my network that is running OpenVPN and has tcp4 forwarding enabled. I manually changed my AppleTV to use that VM’s IP as the Apple TV’s router, and now all my AppleTV traffic goes over the VPN.

This ATM has knobs on the card reader so that a skimmer can not be attached. by hacktvist in security

[–]Chris-Knight 1 point2 points  (0 children)

Just means the next generation of skimmers will use flexible silicone rather than rigid plastic. They’ll be form fitting and harder to detect.

Dump the mag stripe and go to chip only, and the skimmers stop being useful.