Mikelius

joined 1 year ago
[–] Mikelius@beehaw.org 3 points 1 year ago

What I did was just buy the tv I wanted for the hardware and block it from internet access by Mac address, then plugged it into the network with eth. I then put dns blocks on every request it made (I log things before blocking them, and did this on the scenario a kill switch gets messed up or something) and installed the media software from there. Smart tv made private.

[–] Mikelius@beehaw.org 5 points 1 year ago

I for one hate Microsoft Windows a great amount, yet am in love with C#... Just because a company has one terrible product, doesn't mean everything they make is terrible.

Also... What everyone else here already said. No reason for me to rinse and repeat what's been said lol.

[–] Mikelius@beehaw.org 2 points 1 year ago (1 children)

Man, still need to go finish the 2nd. I stopped playing after a game breaking bug was encountered that was never fixed... Didn't want the start the entire chapter over and never got back into it to finish it. Once I do eventually do that, I might get the 3rd when it releases.

[–] Mikelius@beehaw.org 1 points 1 year ago (1 children)

If you're very technical and understand Linux, security, etc in great lengths (such as how to setup your own iptables rules with looking for help or creating your own scripts), and really know what your doing, a rooted non-gapps lineageos (optionally microg) is a great choice, as long as you install things like AFWall+ and such to lock it down a ton. Heavy emphasis on "understanding" what you're doing here, since if you don't, a rooted device could be bad on security.

If you're not at that comfort level or have the time for that kind of stuff, GrapheneOS (unfortunately on pixel) is the best option.

If you don't want to give Google any of your money, and you don't want to go into the super low level system control with root, the best option is probably still lineageos with microg (or without if you don't need push notifications for anything).

[–] Mikelius@beehaw.org 1 points 1 year ago

Who knows, guess we'll find out. The only point I was trying to make is the title of the article being misleading to an assumption rather than fact. It's very possible what you just mentioned is the case, but we won't know until later. My personal concern is the fact Zoom is used for work for many and getting around that for most folks will be the hard part. I hope the terms for free users vs business agreements differ.

[–] Mikelius@beehaw.org 3 points 1 year ago

96% but it's not accurate. Verified on my DNS logs that the two it claimed weren't blocked, actually resolved to 0.0.0.0 correctly, so I'm actually at 100%

[–] Mikelius@beehaw.org 4 points 1 year ago (4 children)

Title probably needs to be reworded. Terms clearly mention they won't use it without user consent, not that they MUST use it. Doesn't mean it'll stay that way, but just don't consent for it when asked and you're probably okay (I'm mentioning this for those who have no choice but to use it, for things like work)

[–] Mikelius@beehaw.org 1 points 1 year ago (1 children)

If you have geolocation enabled or don't block location requests, that could be another way. VPN can't protect you from geolocation.

[–] Mikelius@beehaw.org 7 points 1 year ago

Probably already said here, but it's going to just come down to your end goal to know what distro fits what you're looking for.

I am personally a huge fan of Gentoo, another distro that's all about "from the ground up" approach. It's actually where I started with Linux and is how I became as proficient in it as I am today. In fact my internal server that does everything is running Gentoo as it's OS... Has never had any problems in the last decade that would require a reinstall or anything crazy like that.

But even as much love as I have for Gentoo, I have Linux Mint installed on my laptop. Why? Because it's just more convenient when I need my full focus on the 10 other personal projects I'm working on... Also amazing on the gaming front. Doesn't have nearly as much bloat as some other Ubuntu-based distros on first install, has a huge community support, and is just great all around to have.

[–] Mikelius@beehaw.org 1 points 1 year ago (1 children)

Why not just self host? What happens when/if their service goes down without any warning? You lose everything?

Got my things all on a server with RAID for redundancy and backup weekly to an external (encrypted) device, monthly to another that doesn't stay at home. Also means I don't have to rely on the Internet to use all my services if the ISP goes down, the firewall explodes, etc. Self hosting is the way to go!

[–] Mikelius@beehaw.org 1 points 1 year ago

I don't, but that's because of how I have things setup around the network. While most people here say it's because they don't need it, I am in a position that I need SOMETHING simply because others in the household could bring in malware and rather than trust them to make smart decisions, I proactively monitor all network activity for anything unusual. That being said, I have clamAv installed and run a weekly scan, but my real "antivirus solutions" are as follows: A syslog server that's connected to grafana/MySQL and alerts me based on very specific criteria. Along this, I've got my network firewall configured to block all "untrustworthy countries" in and out 100%, as well as use an IDS/IPS (also connected to syslog for alerts). Lastly, an internal DNS which grabs from like 20 sources that include some reliable lists with malware domains and such, and a custom list of my own that I add to as useful security news feeds hit my RSS feed with urls in their blog posts.

Actually got a list of other things going on in the network to make it even more secure, but just wanted to list the main things that'll give you a step up in the anti-malware front.

None of this is buletproof without proper care for how you use the Internet, though.

  • Check for router/modem/firewall updates weekly if they can't be auto updated
  • never click any links in an email even if you feel you know you trust it (exception to this would be something you KNOW is coming into your inbox, such as an account registration verification)
  • avoid tiny urls or suspicious looking urls when possible
  • don't open ports unless you really really really know what you're doing. If you absolutely need to open a port, then for the love of god define the source IP address/CIDR. Opening ports to the world includes opening them to cyber criminals
  • turn off upnp, I don't care what that game or service you use says, it doesn't need it

You get the idea. My message got way too long and turned into a rant lol.

view more: next ›