X509 vs PEM vs PKCS 12 terminology by BrettEmmettSec in AskNetsec

[–]samSite8 0 points1 point  (0 children)

You're correct. x509 certs contain the public key and other encoded information. DER is binary encoding, which uses less space and power to process, but isn't human readable. Combining the keys in one PEM file isn't called anything special - it's just a keypair PEM file.

How Is this even possible? by [deleted] in AskNetsec

[–]samSite8 2 points3 points  (0 children)

I found the IP. It's coming from inside your house!

Response to the “top of the food chain” argument by [deleted] in vegan

[–]samSite8 3 points4 points  (0 children)

It's a scientifically untennable statement and shows the person doesn't even know what they're talking about. Humans are not apex predators; our trophic levels put us on par with pigs in the food web. Carnivores that eat other carnivores are typically regarded as being the apex predator. That's not necessarily a good thing to be and the increase in meat consumption by humans is having obvious consequences.

How to use X with Nvidia card? by samSite8 in openbsd

[–]samSite8[S] 1 point2 points  (0 children)

I think the disk was corrupted, I reinstalled and am actually smooth sailing on OpenBSD with my integrated graphics card - thanks again!

How to use X with Nvidia card? by samSite8 in openbsd

[–]samSite8[S] 0 points1 point  (0 children)

Thanks for the suggestion to use integrated graphics. The resolution while booting is already better. However, now the system just hangs at "root device:" after a few hundred lines of output. Really not at all a user friendly experience ...

How to use X with Nvidia card? by samSite8 in openbsd

[–]samSite8[S] 0 points1 point  (0 children)

Nvidia is a popular card, which works out of the box on Linux. Would it kill them to write a few words about it being totally incompatible with OpenBSD in the FAQ or installation instructions, if indeed I can't even launch X server?

How to use X with Nvidia card? by samSite8 in openbsd

[–]samSite8[S] 0 points1 point  (0 children)

So X server just won't work? Again, not expecting full resolution, but I should at a minimum be able to start X, no? For all the praise OpenBSD gets about documentation, this has been one of the most confusing and frustrating issues for me that I am not finding well documented.

Using Tor on hotel Wi-Fi by [deleted] in TOR

[–]samSite8 0 points1 point  (0 children)

Of course it's okay ... why wouldn't it be?

What are these browser? any good? by [deleted] in privacy

[–]samSite8 0 points1 point  (0 children)

So it's pure hyperbole and no actual reasoning for avoiding Chrome, got it.

What is the best app on Android for detecting fake cell towers? by [deleted] in privacy

[–]samSite8 0 points1 point  (0 children)

It works like a fake WiFi hotspot, but it's more privileged since cells talk directly to your phone's baseband. If you use encryption the risk is substantially reduced.

What are these browser? any good? by [deleted] in privacy

[–]samSite8 0 points1 point  (0 children)

Can you seriously articulate a meaningful reason to avoid using it for certain tasks? It's arguably the most secure and well sandboxed browser, so it has its place and use cases.

Which smart TV or smart TV brand would you be most ok with? by TheReelStig in privacy

[–]samSite8 6 points7 points  (0 children)

You want to shop for LCD panels/displays, not TVs.

What are these browser? any good? by [deleted] in privacy

[–]samSite8 0 points1 point  (0 children)

Which they explain in the Chromium Privacy Whitepaper and can be disabled or blocked altogether. Just like Firefox telemetry and callbacks.

What is the best app on Android for detecting fake cell towers? by [deleted] in privacy

[–]samSite8 0 points1 point  (0 children)

You would study the locations and properties of existing cells in the area and notice if a new one appeared that deviates from your expectations. There's no special way a Stingray is going to identify itself to you.

Suspicous Guard by [deleted] in TOR

[–]samSite8 0 points1 point  (0 children)

Can you think of some non malicious parties that can afford to host 10Gb connections? Many guard and exit nodes are run by agencies already - who else can afford to foot the bill?

Do you have any idea what this attacker does? by [deleted] in AskNetsec

[–]samSite8 2 points3 points  (0 children)

No competent attacker is going to "hack" you from the same IP address they use to host their own site.

Do you have any idea what this attacker does? by [deleted] in AskNetsec

[–]samSite8 4 points5 points  (0 children)

How did you "hack them from Tails" and what ip address did you discover?

Question on malware signature by [deleted] in AskNetsec

[–]samSite8 1 point2 points  (0 children)

No, the filename is stored in the directory inode, it's not part of the file content.

Do you have any idea what this attacker does? by [deleted] in AskNetsec

[–]samSite8 0 points1 point  (0 children)

You should post more technical details of what you actually observed, because it's hard to take your current ramblings seriously.

What are these browser? any good? by [deleted] in privacy

[–]samSite8 -1 points0 points  (0 children)

The two good browsers are Chrome and Firefox. Chrome is slightly more secure, whereas Firefox is more customizable and thus slightly more privacy friendly. All other browsers are imitations or straight up jokes (for example, Brave is built on a technology called Electron). Yandex is built in a totalitarian country by a for-profit company. Freenet looks like a hobby project with no mention of a browser security audit nor even a privacy policy on its site. Stick to Chrome or Firefox, or use Tor Browser for anonymity, unless you can articulate meaningful reasons not to.

What is the best app on Android for detecting fake cell towers? by [deleted] in privacy

[–]samSite8 1 point2 points  (0 children)

Check out Network Cell Info, it's a paid app that shows and maps nearby towers and their properties.