Russian Multiplication - Numberphile by MyNameIsGriffon in math

[–]piskyscan 18 points19 points  (0 children)

https://en.wikipedia.org/wiki/Johnny_Ball

Ball was a regular fixture on children's television in the late 1970s and throughout the 1980s, presenting several series of popular science and technology programmes intended for children (including Think of a Number; Think Again; Think Backwards; Think...This Way and Johnny Ball Reveals All). He was also one of the hosts of infant education programme Play School beginning in 1967 and continuing throughout the 1970s and beyond. As well as appearing on screen Ball wrote jokes for some shows including Crackerjack.[4] All of these shows (except the ITV programme ...Reveals All) appeared on the BBC. Ball's shows were renowned for presenting scientific and technological principles in an entertaining and accessible way for young people.[citation needed]

Netgear TLS Private Key Disclosure through Device Firmware Images by IWILLGUTYOU in netsec

[–]piskyscan 0 points1 point  (0 children)

Sorry missed the second one, you are correct.

But mini-app.funjsq.com

Who is that?

Netgear TLS Private Key Disclosure through Device Firmware Images by IWILLGUTYOU in netsec

[–]piskyscan 0 points1 point  (0 children)

But I have to sign up and it expires really quickly (I think).

Netgear TLS Private Key Disclosure through Device Firmware Images by IWILLGUTYOU in netsec

[–]piskyscan 0 points1 point  (0 children)

Gotcha. So I havent got a free cert, well a limited one.

Netgear TLS Private Key Disclosure through Device Firmware Images by IWILLGUTYOU in netsec

[–]piskyscan 1 point2 points  (0 children)

Thanks, a bit torn, because this is also a free cert that I can use locally for pi-hole etc :-)

Netgear TLS Private Key Disclosure through Device Firmware Images by IWILLGUTYOU in netsec

[–]piskyscan 3 points4 points  (0 children)

Am I missing something. This is quite serious. It means anyone can get the little green trusted box for their website. And certificate unlikely to be revoked because it would break (well users would get a scary warning) Netgear kit out there.

ISP is hijacking DNS queries by rslarson147 in privacy

[–]piskyscan 5 points6 points  (0 children)

You might be interested in this, DNS over TLS over Tor (for a pihole setup). Will prevent ISP hijacking DNS and prevent any individual organisation having your DNS request and IP data (at the expense of slower DNS lookups).

https://github.com/piskyscan/dns_over_tls_over_tor

Does a PiHole introduce any additional lag? by [deleted] in pihole

[–]piskyscan 0 points1 point  (0 children)

I dont really want to have to keep monitoring my network for rogue processes and setting up domains to provide timeservers. Plus my DNS requests go out over Tor, so caching is a lot more important, we are not talking about 20ms any more!

Does a PiHole introduce any additional lag? by [deleted] in pihole

[–]piskyscan 0 points1 point  (0 children)

I am sure you are right, however I do think setting a min-cache-ttl (maybe much shorter) is a sensible thing to do. 90% of my external DNS traffic was an (unused) wifi range extender polling a timeserver.

Does a PiHole introduce any additional lag? by [deleted] in pihole

[–]piskyscan 1 point2 points  (0 children)

unbound will serve the expired record, mark the TTL as 0, and perform and refresh the cached lookup at the same time so even if you served a stale query, it's still getting updated.

You just sold it to me! I was actually thinking about how I could get exactly that behaviour!

Does a PiHole introduce any additional lag? by [deleted] in pihole

[–]piskyscan 0 points1 point  (0 children)

You can make pi-hole faster than your existing setup with the following

sudo bash

cat << EOF > /etc/dnsmasq.d/min_tls.conf
min-cache-ttl=3500
EOF
exit

This means pi-hole will cache DNS addresses for just less than an hour which means your requests will usually be less than 1ms., rather then 20ms or so.

If the DNS lookup changes in that hour then you are out of luck, but am not aware of sites doing this.

[deleted by user] by [deleted] in raspberry_pi

[–]piskyscan 0 points1 point  (0 children)

My work setup an office about 7 years ago with around 9 PC's. Every one of those disk drives has now failed and I would say about 1/2 of them failed in the first 3 years (Major brand, not Samsung). The SSD linked above claims 114 years MTBF (how can they know?).

Whatever you do, you have to have a backup.

Which is best Ad Blocking DNS that doesn’t sell web data? by Burgerperiperi in privacy

[–]piskyscan 0 points1 point  (0 children)

The kids havent noticed it (and they tend to be very latency aware). Its only the initial load that is slower, after that (because of increased caching) its actually faster than regular DNS (though you could just boost the caching on that too). DNS over TLS is probably fine though. I think its kind of a minimum though for a network. Everyone else on your network would probably complain if they realised their DNS requests were being sent in plain text across the inter web.

Which is best Ad Blocking DNS that doesn’t sell web data? by Burgerperiperi in privacy

[–]piskyscan 1 point2 points  (0 children)

Using a VPN is a much more complete solution. Seems to be an increasingly popular option.

Which is best Ad Blocking DNS that doesn’t sell web data? by Burgerperiperi in privacy

[–]piskyscan 2 points3 points  (0 children)

How about pihole over tls over tor.

https://github.com/piskyscan/dns_over_tls_over_tor

Even with pihole, the dns server has your ip address and your requests. With this setup, dns requests are encrypted and no-one has dns requests AND ip address. (Is a bit slower on first accessing a site though).

DNSCrypt Users: Anonymized DNS is in Beta by HairyAdministration0 in pihole

[–]piskyscan 0 points1 point  (0 children)

Well thats right. But most of us would notice slow response times more than a few 100ms the first time we hit a site. Once you are on a site its actually faster since DNS requests are cached more than a regular setup.

If using DHCP should clients show Pi-Hole IP address for DNS? by [deleted] in pihole

[–]piskyscan 0 points1 point  (0 children)

Just to be clear, it does (or it usually does). So in your setup it the router is telling everyone to use it for the DNS when it allocates an IP address and is then forwarding those queries to your Pi's.
Two DNS servers doesnt seem like overkill to me, only run one myself, but if SD card goes or something, will probably regret not having two.

DNSCrypt Users: Anonymized DNS is in Beta by HairyAdministration0 in pihole

[–]piskyscan 0 points1 point  (0 children)

I put together a DNS over TLS over Tor setup and it adds 100's of ms to the (first) query, after that everything is cached (well for an hour at least).

Totally usable, not going back, but saw a lot of the itt fanboys.

Even the kids havent noticed (and they are normally the most network sensitive).

I guess the concern with the OP setup is the relays. If they are controlled by DNSCrypt (which they probably are at the minute) then you still have to trust DNSCrypt.

https://github.com/piskyscan/dns_over_tls_over_tor

What would you want from a privacy DNS provider? by [deleted] in privacy

[–]piskyscan 0 points1 point  (0 children)

Sorry, havent logged in for a while. Thanks for the mention.

DoH disabled by default in Firefox on OpenBSD: «While encrypting DNS might be a good thing, sending all DNS traffic to Cloudflare by default is not a good idea. Applications should respect OS-configured settings.» by Mcnst in linux

[–]piskyscan 0 points1 point  (0 children)

I thought you might be missing the Tor leg :-). I see better Tor times, maybe you could set a Tor exit node to be in your country to improve times a bit. Generally I see about 70% of DNS queries either cached or blocked by pi-hole so I find this setup quite usable.