Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices by rugk (rugk@social.wiuwiu.de), page 18

  1. rugk (rugk@social.wiuwiu.de)'s status on Saturday, 06-Apr-2019 07:13:21 EDT rugk rugk
    • Simon Rupf

    @elrido

    "advertise this new name resolution" – specifically declined, because rogue DNS in China/iran/… can just "advertise" security while censoring everything.

    "OSS implementations" – hmm… https://www.aaflalo.me/2018/10/tutorial-setup-dns-over-https-server/ https://doh.defaultroutes.de/#text-5-2 and https://github.com/m13253/dns-over-https is what a quick search tells me. Totally possible to setup your own server.

    DNS stays distributed, just people need to setup servers. And this, is what we need to advertise. (e.g. to Digitalcourage or so)

    In conversation Saturday, 06-Apr-2019 07:13:21 EDT from social.wiuwiu.de permalink

    Attachments

    1. Tutorial to setup your own DNS-over-HTTPS (DoH) server
      By Antoine Aflalo from Antoine Aflalo
      Tutorial to help you setup your own DNS-over-HTTPS server to protect your DNS queries. It also help you to install a DoH client on all your devices.
    2. m13253/dns-over-https
      from GitHub
      High performance DNS over HTTPS client & server. Contribute to m13253/dns-over-https development by creating an account on GitHub.
  2. rugk (rugk@social.wiuwiu.de)'s status on Saturday, 06-Apr-2019 07:10:26 EDT rugk rugk
    • Simon Rupf

    @elrido "where non-public TLDs are recognized and fall back to the OS' resolvers" – already done (not only TLDs, however, AFAIK). You can change that in about:config.

    "run side by side with DNS" –also already implemented (kinda "race" for timing or so). Also about:config.
    This mode just obviously does not help for privacy, but it is possible to enable.

    …

    In conversation Saturday, 06-Apr-2019 07:10:26 EDT from social.wiuwiu.de permalink
  3. rugk (rugk@social.wiuwiu.de)'s status on Saturday, 06-Apr-2019 07:07:53 EDT rugk rugk
    • Simon Rupf

    @elrido
    5. Security of HTTPS is kinda off-topic. As you said "It is much better then no SSL," (thus better than pure unencrypted DNS). Also, this whole PKI/TLS situation has considerably improved over the past, Cert transparency + HPKP are a thing for HTTPS in browsers. But, as said, off-topic. (If you would, you could however somehow manually verify your DNS server's cert.)
    6. Tor: Obviously not. Tor makes the Tor Browsers and they ensure security there. Also, I guess it's disabled there.

    In conversation Saturday, 06-Apr-2019 07:07:53 EDT from social.wiuwiu.de permalink
  4. rugk (rugk@social.wiuwiu.de)'s status on Saturday, 06-Apr-2019 07:05:05 EDT rugk rugk
    • Simon Rupf

    @elrido
    3. pihole: If you can setup pihole, you can certainly disable that option. (And I don't think companies or so use pihole. After all – technically, pihole is a kind of blocking/censorship DoH should protect against. If it is wanted by yourself, you can of course adjust it.)
    4. VPN bypass: Hu? No… HTTPS goes over VPN too. (actually pure DNS requests are more likely to cause issues/bypasses here)

    In conversation Saturday, 06-Apr-2019 07:05:05 EDT from social.wiuwiu.de permalink
  5. rugk (rugk@social.wiuwiu.de)'s status on Saturday, 06-Apr-2019 07:01:56 EDT rugk rugk
    • Simon Rupf

    @elrido Woah, long reply… way too long 😉

    Trying to address them:
    1. DNS censorship: Yes, this si exactly what this protects against. Even stronger, because DNS cannot be manipulated.
    (also AFAIK many OpenNIC servers are not hosted in the US, but that's off-topic.)
    2. Internal company services + webdev (host entries): Yes, it can fallback to resolving these, if the DoH provider does not resolve it. (Currently, that's even the default.) Already discussed here BTW: https://metalhead.club/@kromonos/101840600370718191
    […]

    In conversation Saturday, 06-Apr-2019 07:01:56 EDT from social.wiuwiu.de permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      New status by kromonos
      By Kromonos from metalhead.club
  6. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 27-Mar-2019 12:54:09 EDT rugk rugk
    • Elias Mårtenson
    • peter hessler @openbsd
    • florian :flan_hacker:
    • lastfuture

    @florian @lastfuture @loke @phessler . **Actionable advice:** i.e. what you can do? Go to https://github.com/curl/curl/wiki/DNS-over-HTTPS#publicly-available-servers, choose a server you trust and enter it in the settings (note: no need to mangle with about:config BTW).

    Then you get the best security you can get. Encrypted DNS to a server you trust. This is in 99% of the cases better than to your ISP's DNS or whatever is used by default on some routers or so. (hint: often it's Google DNS)

    In conversation Wednesday, 27-Mar-2019 12:54:09 EDT from social.wiuwiu.de permalink
  7. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 13-Mar-2019 17:11:54 EDT rugk rugk
    • Craig Maloney ☕
    • pzmyers 🦑
    • Aunt Swiggony
    • 🤖 Dan

    @craigmaloney @dconley @pzmyers @sydneyfalk "According to users reports, the new Mastocoains can actually make toot sounds…"

    In conversation Wednesday, 13-Mar-2019 17:11:54 EDT from social.wiuwiu.de permalink
  8. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 13-Mar-2019 17:02:13 EDT rugk rugk
    • Wladimir Palant

    @WPalant link or it didnot happen!

    In conversation Wednesday, 13-Mar-2019 17:02:13 EDT from social.wiuwiu.de permalink
  9. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 13-Mar-2019 16:17:41 EDT rugk rugk
    • Libravatar.org

    @libravatar not really impressive bit works. Honestly looks like any other modern (startup like) website/theme/template.

    In conversation Wednesday, 13-Mar-2019 16:17:41 EDT from social.wiuwiu.de permalink
  10. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 13-Mar-2019 15:22:53 EDT rugk rugk
    • 💟💟💟Khaosgrille💟💟💟
    • vampirdaddy

    @vampirdaddy @Khaosgrille or you use actually (online) dictionaries (Note: there is also #wikitionary)

    Or, at the very last, … use #DeepL!!
    Because they do things properly…

    In conversation Wednesday, 13-Mar-2019 15:22:53 EDT from social.wiuwiu.de permalink
  11. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 13-Mar-2019 14:00:05 EDT rugk rugk
    • Lakini

    @lakini ach,heute hast du deinen Hashtag vergessen zu #fakenews 😉

    In conversation Wednesday, 13-Mar-2019 14:00:05 EDT from social.wiuwiu.de permalink
  12. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 13-Mar-2019 13:58:47 EDT rugk rugk
    • Lakini

    @lakini heute wieder "random attribute quotes" day?

    In conversation Wednesday, 13-Mar-2019 13:58:47 EDT from social.wiuwiu.de permalink
  13. rugk (rugk@social.wiuwiu.de)'s status on Wednesday, 13-Mar-2019 01:58:07 EDT rugk rugk
    • jomo :verified:
    • rugk

    @jomo @rugk hmm yeah, of one really uses this browser in a serious way😉

    Maybe you should really report it😊

    In conversation Wednesday, 13-Mar-2019 01:58:07 EDT from social.wiuwiu.de permalink
  14. rugk (rugk@social.wiuwiu.de)'s status on Tuesday, 12-Mar-2019 19:14:58 EDT rugk rugk
    • liffy 💜

    @lifning why do you think blue is dominant?

    Or is it, actually?

    heyl, studies about this would be funny… 😆

    In conversation Tuesday, 12-Mar-2019 19:14:58 EDT from social.wiuwiu.de permalink
  15. rugk (rugk@social.wiuwiu.de)'s status on Tuesday, 12-Mar-2019 19:12:49 EDT rugk rugk
    • candy purple acid drop :mona:

    @girl make it happen!

    In conversation Tuesday, 12-Mar-2019 19:12:49 EDT from social.wiuwiu.de permalink
  16. rugk (rugk@social.wiuwiu.de)'s status on Tuesday, 12-Mar-2019 19:11:56 EDT rugk rugk
    • jomo :verified:

    @jomo 🤔

    if you cannot steal anything/do anything bad, I guess no 😉

    Bút if the old browser actually did not support JS, then we've got a problem. 😉

    In conversation Tuesday, 12-Mar-2019 19:11:56 EDT from social.wiuwiu.de permalink
  17. rugk (rugk@social.wiuwiu.de)'s status on Tuesday, 12-Mar-2019 18:23:27 EDT rugk rugk
    • j.r

    @jr 🙄

    In conversation Tuesday, 12-Mar-2019 18:23:27 EDT from social.wiuwiu.de permalink
  18. rugk (rugk@social.wiuwiu.de)'s status on Tuesday, 12-Mar-2019 15:44:08 EDT rugk rugk
    • jomo :verified:

    @jomo best thing certainly https://github.com/jomo/bashweb/commit/362f0115e17585591e1b811c2116a0346cff204d

    You should revert that… 😜

    In conversation Tuesday, 12-Mar-2019 15:44:08 EDT from social.wiuwiu.de permalink
  19. rugk (rugk@social.wiuwiu.de)'s status on Tuesday, 12-Mar-2019 15:43:35 EDT rugk rugk
    • jomo :verified:

    @jomo LOOL

    In conversation Tuesday, 12-Mar-2019 15:43:35 EDT from social.wiuwiu.de permalink
  20. rugk (rugk@social.wiuwiu.de)'s status on Sunday, 10-Mar-2019 16:25:33 EDT rugk rugk
    • nuron :Anoxinon:

    @nuron https://gitlab.com/LineageOS/issues/android (?)

    In conversation Sunday, 10-Mar-2019 16:25:33 EDT from social.wiuwiu.de permalink

    Attachments

    1. LineageOS / issues / android
      from GitLab
      LineageOS android bug reports. Please see https://wiki.lineageos.org/bugreport-howto.html. Issue intake is automated by a bot - please make sure to read the directions carefully and follow any directions provided by the...
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.