Living 20 minutes into the future. Eccentric weirdo. Virtual Adept. Time traveler. Thelemite. Technomage. Hacker on main. APT 3319. Not human. 30% software and implants. H+ - 0.4 on the Berram-7 scale. Furry adjacent. Pan/poly. Burnout.
I try to post as sincerely as possible.
They said straight up, “I googled you and couldn’t find a Twitter or Facebook account. What are you hiding?” I had to teach them who Armand Jean du Plessis was.
Opting out of social media these days is considered inherently suspicious. It definitely came up the last time I had to undergo a background check for work.
There are two models I’ve used for this over the years, the Linksys EA8300 and the WRT 1900AC. Here’s how I did it both times (though I only got around to writing up my notes the second time.
Just defining the threat model of hardware addressing, as it stands.
I don’t agree with them sending more than the first half either.
Not that the local DHCP servers falling over has anything to do with it…
A MAC address isn’t really unique. Each has six octets, of which three refer to the manufacturer. The other three octets have at most 16,777,216 possible values. That seems like a lot but it really isn’t; a MAC is supposed to be unique on a LAN, not globally. Rollovers during manufacturing happen, and collisions are rare but happen once in a while.
What do you mean, custom firmware? Are you trying to boot a different distro of Linux?
When you have the USB drive plugged in, how are you booting up? What’s the process you’re using?
The first three octets of a MAC specify the manufacturer of a NIC chipset. That could come in handy for driver debugging.
Manufacturers and firmware versions of storage devices? You can make the argument; perhaps it would have helped figure out the SSD firmware bugs years ago.
But stuff like whether or not you have video capture card or your current system temperature stats? Nah… that’s getting into “identifiable information as toxic waste” territory.
I think I still have a copy of that book in a box somewhere. I know I have a scanned copy in my archive. Lots of fun.
They sure make the task of keeping an eye on the chuds easier. Their OPSEC eats donkey ass.
Why would they hide anymore? They figure they won. No sense in not taking advantage of everything that implies.
I keep a documentation page in my wiki for every thing I set up - how I did it, what I ran into, how I fixed it, and where everything is. Reason being, when it comes time to upgrade or I have to install it again someplace else, I remember how I did it. Basically, every completed step gets copy-and-pasted into a page along with notes about it.
As for watching the file system, I have AIDE on all of my boxen (configured to run daily, but not configured to copy the new AIDE database over the old one automatically). That way, I can look at the output of an AIDE run and see what new files were created where (which would correspond to when I installed the new thing).
This is a thing that folks have done in the past:
The Great Game continues, same as it always has.
You can have them installed next to one another. Just like you can have Firefox and Links installed at the same time. Or twm and gnome3. It comes down to how much work you want for yourself.
Depends on your distro, I think.
If only for the sake of one’s CV. Making your bones by having a couple of 0-days under your belt helps a lot of folks find jobs these days.
It is. That’s why Wayland is being pushed so hard, it’s a codebase that’s actually maintainable, with hopefully some more modern design and engineering principles.
'till all are one. o7