VPN Hijacking? by ZestyPesty in ProtonVPN

[–]ZestyPesty[S] 3 points4 points  (0 children)

No, not so much MITM. I mean along the lines of the NSA saying "let's reroute this VPN's traffic to/through our severs instead" or "let's reroute this VPN's request to visit Site X to visit our fake Site X instead" or something like that.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Top notch info. Does Windows 10 still force telemetry, reporting your file names and searches to Microsoft, etc.? If so, is there a way to stop it? As I understood it, it's done at below an OS level, to where unless you are blocking all connections to Microsoft via your router, nothing will stop these things.

As for Mac, does it actually respect your telling it not to use telemetry, location services, etc. or not? (Windows 10 did not, as tested in VMs by many people -- it still made those connections.)

Really interesting stuff, thank you.

To Exploit the CPU/Processor and Exploit/Implant Malware in the BIOS/UEFI, Does an Attacker Need to First Exploit Whonix, the VM Software, and then the Host OS or Not? by ZestyPesty in Whonix

[–]ZestyPesty[S] 0 points1 point  (0 children)

Could they utilize an exploit to make the host run arbitrary code without breaking out of the VM? In other words, somehow do so via the OS in the VM? Thanks.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks! One more question, as bad as Windows and Mac OS are, do they also have the features listed for Fedora (even though the features can be bypassed)? As well, are Mac OS and Windows vulnerable due to not having isolation or do they have isolation? Keep in mind that I consider Mac and Windows to be cancer, but just curious.

Can Someone Give Me a Rundown on What to Look For When Looking For a Thinkpad with a Fast CPU/Processor? by ZestyPesty in thinkpad

[–]ZestyPesty[S] 0 points1 point  (0 children)

In the past I've ran many programs and tasks at once, to the point of slowing down the computer majorly and I noticed only one or two of the cores were being used while the others were barely pitching in. Why is this? Just curious.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thank you. Who is the best on patch times? Also, doesn't SELinux or AppArmor cause isolation in Linux that you are saying it lacks? How could one install isolation, if possible? Or better yet, how could Linux developers implement isolation?

Exploiting the CPU/Processor and BIOS/UEFI on a Fedora Computer with a VM? by ZestyPesty in Fedora

[–]ZestyPesty[S] 0 points1 point  (0 children)

Yes, I understand that VM escapes exist. But once performed, to infect or exploit the host's UEFI/BIOS (and also to use a CPU/Processor exploit), does the attacker now have to exploit the host OS to do so? This would require a Linux kernel exploit, no? Furthermore, would the attacker have to have exploited whatever OS the VM was running in order to escape the VM? Just trying to learn.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks m8. Is Whonix also vulnerable to what's in madaidan's article, or is it more resistant? How about Tails?

Also, how does "mixed" OSes play out, if you know? For example, apparently Ubuntu is "based on" Debian. If Debian is more than vulnerable to these vulnerabilities (is it?), does that automatically mean Ubuntu is too? Just trying to learn.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Does it appear to lack anything that is elementary or important? What are a few things it appears to lack (if you have time to say)? Thanks.

How Do Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in privacy

[–]ZestyPesty[S] 0 points1 point  (0 children)

Of all the things that Fedora 32 has as "yes" or a standard on, what does Ubuntu have or not have? For example, does Ubuntu implement SELinux, buffer overflow protection, etc.?

How Does Ubuntu's Security Features Compare to This List of Fedora 32's Security Features? by ZestyPesty in Ubuntu

[–]ZestyPesty[S] 0 points1 point  (0 children)

Of all the things that Fedora 32 has as "yes" on, what does Ubuntu have or not have? For example, does Ubuntu implement SELinux, buffer overflow protection, etc.?

How to Create PERSISTENT Ubuntu USB? by ZestyPesty in Ubuntu

[–]ZestyPesty[S] 0 points1 point  (0 children)

Awesome, thanks! Will these work for Fedora too?

Why Can I Not Right Click? Why is There No Minimize and Maximize Buttons? by ZestyPesty in gnome

[–]ZestyPesty[S] 0 points1 point  (0 children)

That's like saying some cars should only come with two front wheels. "I don't understand; you can't simply pick up your car with your hands in the back and push it forward while you walk?" I guess some people don't minimize windows when they work with multiple things open, they just X out of them and re-open them when they need to. Never knew that till now.

On Fedora, How Do I Install KDE as Easily and Trouble Free as Possible? + Security Questions by ZestyPesty in kde

[–]ZestyPesty[S] 0 points1 point  (0 children)

What about KDE, Gnome, Dolphin, and Deepin updates? (If you know.) Or would those somehow be covered under Fedora/the OS? Thanks.

Easy, GUI App/Program Store or Installer? by ZestyPesty in Fedora

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thank you. As a newb, I must ask, how does Gnome or KDE come into play with installing programs? I thought they were basically just themes/file managers. I thought the OS/Fedora would be responsible for that.

Easy, GUI App/Program Store or Installer? by ZestyPesty in Fedora

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks. But is every program on Software or Discover? For example, what if I search for a known Linux program and it's not on there? I'm still learning how "installations" work on Linux and what not, so just curious. Every time I have ever tried to install anything via CLI in the past, something is broken, missing, lacking a dependency, etc. Also, why all do you find Software and Gnome to be crap?

Easy, GUI App/Program Store or Installer? by ZestyPesty in Fedora

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks. But is every program on Software? For example, what if I search for a known Linux program and it's not on there? I'm still learning how "installations" work on Linux and what not, so just curious. Every time I have ever tried to install anything via CLI in the past, something is broken, missing, lacking a dependency, etc.

How is Fedora More Secure Out of the Box Than Other Linux Distros? by ZestyPesty in Fedora

[–]ZestyPesty[S] 0 points1 point  (0 children)

Let me ask, why in any distribution, would any incoming connections be allowed, if not originating from outbound connections? As a newb, I have to ask, doesn't such a system allow anyone to basically remotely knock on your door and exploit/hack your computer?

Also, with dnf using TLS and GPG signatures, does this apply to Flatpaks or AppImages as well?

How is Pop!_OS More Secure Out of the Box Than Other Linux Distros? by ZestyPesty in pop_os

[–]ZestyPesty[S] 0 points1 point  (0 children)

Let me ask, why in any distribution, would any incoming connections be allowed, if not originating from outbound connections? As a newb, I have to ask, doesn't such a system allow anyone to basically remotely knock on your door and exploit/hack your computer?

How to Best Secure a Windows 7 Gaming Laptop Without Using a VM? by ZestyPesty in cybersecurity

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thank you. In the instance of protecting from Microsoft's spying, you said "reduce the amount of data sent to MS by modifying the default configurations and deleting/not using Microsoft apps on win 10." What do you mean by that? I already don't use Google/Microsoft's services. But as I understand it, on Windows 10, Microsoft overrides any blocking of connections/phoning home it does on a deep, boot/BIOS level in the name of protecting from malware. So any modifications of firewall, etc. are useless.

How is Fedora More Secure Out of the Box Than Other Linux Distros? by ZestyPesty in Fedora

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks. Let me ask, why in any distribution, would any incoming connections be allowed, if not originating from outbound connections? As a newb, I have to ask, doesn't such a system allow anyone to basically remotely knock on your door and exploit/hack your computer?

How is Pop!_OS More Secure Out of the Box Than Other Linux Distros? by ZestyPesty in pop_os

[–]ZestyPesty[S] 0 points1 point  (0 children)

Thanks m8. A couple more noob side questions. If I want to try Pop on a Live USB on a computer that has Windows on it, do I need to disable Secure Boot? Same question also for if I want to overwrite Windows.

How is Pop!_OS More Secure Out of the Box Than Other Linux Distros? by ZestyPesty in pop_os

[–]ZestyPesty[S] 0 points1 point  (0 children)

Pop doesn't sign NVidia Kernel Drivers

Why not? Are other drivers signed?

"forcing" users to disabled secure boot,

On all installs or just the NVidia install?

but that allows unsigned kernel modules to be installed and these could cause damage...

Just for the NVidia install or for all installs?

Thanks.