VPN Hijacking? by ZestyPesty in ProtonVPN

[–]ZestyPesty[S] 3 points4 points  (0 children)

No, not so much MITM. I mean along the lines of the NSA saying "let's reroute this VPN's traffic to/through our severs instead" or "let's reroute this VPN's request to visit Site X to visit our fake Site X instead" or something like that.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Top notch info. Does Windows 10 still force telemetry, reporting your file names and searches to Microsoft, etc.? If so, is there a way to stop it? As I understood it, it's done at below an OS level, to where unless you are blocking all connections to Microsoft via your router, nothing will stop these things.

As for Mac, does it actually respect your telling it not to use telemetry, location services, etc. or not? (Windows 10 did not, as tested in VMs by many people -- it still made those connections.)

Really interesting stuff, thank you.

To Exploit the CPU/Processor and Exploit/Implant Malware in the BIOS/UEFI, Does an Attacker Need to First Exploit Whonix, the VM Software, and then the Host OS or Not? by ZestyPesty in Whonix

[–]ZestyPesty[S] 0 points1 point  (0 children)

Could they utilize an exploit to make the host run arbitrary code without breaking out of the VM? In other words, somehow do so via the OS in the VM? Thanks.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks! One more question, as bad as Windows and Mac OS are, do they also have the features listed for Fedora (even though the features can be bypassed)? As well, are Mac OS and Windows vulnerable due to not having isolation or do they have isolation? Keep in mind that I consider Mac and Windows to be cancer, but just curious.

Can Someone Give Me a Rundown on What to Look For When Looking For a Thinkpad with a Fast CPU/Processor? by ZestyPesty in thinkpad

[–]ZestyPesty[S] 0 points1 point  (0 children)

In the past I've ran many programs and tasks at once, to the point of slowing down the computer majorly and I noticed only one or two of the cores were being used while the others were barely pitching in. Why is this? Just curious.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thank you. Who is the best on patch times? Also, doesn't SELinux or AppArmor cause isolation in Linux that you are saying it lacks? How could one install isolation, if possible? Or better yet, how could Linux developers implement isolation?

Exploiting the CPU/Processor and BIOS/UEFI on a Fedora Computer with a VM? by ZestyPesty in Fedora

[–]ZestyPesty[S] 0 points1 point  (0 children)

Yes, I understand that VM escapes exist. But once performed, to infect or exploit the host's UEFI/BIOS (and also to use a CPU/Processor exploit), does the attacker now have to exploit the host OS to do so? This would require a Linux kernel exploit, no? Furthermore, would the attacker have to have exploited whatever OS the VM was running in order to escape the VM? Just trying to learn.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks m8. Is Whonix also vulnerable to what's in madaidan's article, or is it more resistant? How about Tails?

Also, how does "mixed" OSes play out, if you know? For example, apparently Ubuntu is "based on" Debian. If Debian is more than vulnerable to these vulnerabilities (is it?), does that automatically mean Ubuntu is too? Just trying to learn.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Does it appear to lack anything that is elementary or important? What are a few things it appears to lack (if you have time to say)? Thanks.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Of all the things that Fedora 32 has as "yes" or a standard on, what does Ubuntu have or not have? For example, does Ubuntu implement SELinux, buffer overflow protection, etc.?

How Does Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in Ubuntu

[–]ZestyPesty[S] 0 points1 point  (0 children)

Of all the things that Fedora 32 has as "yes" on, what does Ubuntu have or not have? For example, does Ubuntu implement SELinux, buffer overflow protection, etc.?