Harrison

joined 1 year ago
[–] Harrison@infosec.pub 3 points 1 month ago

LGR has a Patreon, I signed up and sent over fifty bucks. Least I could do for the many, many years of entertainment.

https://www.patreon.com/LazyGameReviews

[–] Harrison@infosec.pub 2 points 5 months ago

I'm sure the TLAs work closely in conjunction with all companies responsible for internet infrastructure, yeah. That is their mandate.

[–] Harrison@infosec.pub 9 points 5 months ago* (last edited 5 months ago) (1 children)

Remember not to compromise security in favor of privacy. To me they're both important, but security wins every time.

Remember that services directly accessible over tunnels, whether from cloudflare or frp or ngrok or whatever, are directly accessible over the internet. So if any of those various self-hosted services have a remote vulnerability, and EVERYTHING does sooner or later, you will be exposed. This is why I personally WG VPN to my home LAN rather than exposing most of my stuff via any sort of tunnel. Tailscale is another option I often recommend.

I do use CF tunnels for specific purposes; Home Assistant Google Home integration for example, but I secure that via their "zero trust" authentication by validating incoming IP ranges, so only Google can reach the tunnel in the first place, everybody else is stopped by Cloudflare. For other services with human users, I have them authenticate via github or google oauth first. I also run all services accessible by the internet by any means on a restricted VLAN firewalled off from the rest of my LAN.

[–] Harrison@infosec.pub 6 points 5 months ago (17 children)

I'm all for healthy paranoia, keeping my attack surface small. That's just professional IT ops.

Incendiary statements like saying US intelligence compromised the supply chain with hidden backdoors, those really do need to be substantiated to not sound like a crazy uncle. Our adversaries have counterintelligence also, they aren't incompetent, and if Cisco or Juniper or whatever planted backdoors in hardware shipped to China, the Chinese would make a ton of noise about it. And so would we; Huawei was banned without any substantiated proof, out of fears that if used, their 5G infra could have hidden backdoors and the hardware would be so widely distributed that it would be onerous to replace.

[–] Harrison@infosec.pub 11 points 5 months ago (3 children)

Yes there are a bunch of self-hosted options like frp, all of which require an endpoint on the internet somewhere, typically a cheap or even free VM. Here's a pretty comprehensive list:

https://github.com/anderspitman/awesome-tunneling

[–] Harrison@infosec.pub 79 points 5 months ago (17 children)

Cloudflare is a MITM by design. Calling it an attack is disingenuous; you're signing up for the service of your own free will, not a victim.

If a substantiated news article came out showing that Cloudflare shared SSL keys or otherwise gave direct access to various intelligence agencies without a court order, that would essentially destroy the company. So they certainly aren't doing that.

So then the question becomes whether those nefarious three letter agencies penetrated Cloudflare with APT tools and are silently listening to everything. Our adversaries are certainly trying, China, Russia, Iran, etc. If the NSA (which lacks a mandate to act on US soil, and CF is a US company) or perhaps the FBI hacked a US company, particularly one that covers like a third of the internet like Cloudflare, that would be a truly enormous scandal.

But in the end, yes, it is a MITM. If you need your data to be E2E encrypted, don't use it.

[–] Harrison@infosec.pub 8 points 9 months ago (2 children)

Recently they want to throw them out of helicopters like Pinochet. Really, look it up.

[–] Harrison@infosec.pub 5 points 10 months ago (1 children)

Here’s another one— click through on macOS. Coming from other systems I find it infuriating. Not just the click though itself but its inconsistency, where it works in browsers and some other selected programs but not in most.

For those not aware, click through is when you’re focused on another window and click on this one. With click through, it will immediately action what you click without you have to click first to the window then click again. This isn’t inherently inferior, but I really don’t like it personally. And it is absolutely impossible to change this behavior on MacOS by any means. Believe me, I researched this extensively.

[–] Harrison@infosec.pub 21 points 10 months ago

Complete lack of support for clipboard history. This annoys me daily.

[–] Harrison@infosec.pub 1 points 1 year ago

Yeah that'll block all ads and trackers that're possible without severe annoyance with a non fingerprinted browser etc.

[–] Harrison@infosec.pub 1 points 1 year ago (2 children)

Specifically, the way iOS content blocking works is guaranteed safe. All it does is write to a file loaded by the Safari browser to block content, the app can't do anything at all itself. No indication any VPN sold by AdGuard (or the local device-wide fake VPN) is particularly unsafe that I've seen.

view more: next ›