conorab
@conorab@lemmy.conorab.com
- Comment on ISPs seem designed to funnel people to capitalist cloud services 1 week ago:
It sucks that rural Australia’s part of the NBN got kneecapped down to Skymuster. I’ve played with Starlink quite a while ago and unless it’s really heavy rain it works really well up to the point of being able to stream games on GeForce NOW. Obviously a fast wired connection is preferable but as you say Starlink really is the only good option for a lot of people.
- Comment on ISPs seem designed to funnel people to capitalist cloud services 1 week ago:
If you only care about having a static IPv6 address take a look at TunnelBroker by Hurricane Electric. They give you free /48 IPv6 blocks tunnelled through their network. Words of warning though: 1) some ISPs block using this service (prevent the tunnel from working), 2) in my experience I’ve seen high latency due to weird routing, 3) those IPs ending up on blocklists due to abuse and 4) the tunnel is unencrypted so traffic between you and Hurricane Electric is trivially intercepted, though if that was a problem in the first place then you wouldn’t be hosting from your home network anyway so this is mostly moot.
- Comment on ISPs seem designed to funnel people to capitalist cloud services 1 week ago:
IP blocklisting is still very much a thing as well so you can expect any mail originating from a residential IP to be rejected due to their /24 or larger having previously sent spam, and that assumes you can send server-to-server mail (destination port 25/tcp) in the first place since many ISPs and server providers block traffic destined to that port by default to prevent users from getting their IP blocklists. My home ISP blocks outbound SNMP traffic (or at least did 10 years ago) presumably to also prevent abuse. That said, things like blocking inbound port 80/tcp and 443/tcp is purely a measure to prevent people running servers at home which I’m not a fan of.
- Comment on Turning the Tables: How to Make Spammers Reveal Their Own IP Address 5 weeks ago:
Ah you’re right about the GDPR part in the article! My bad. Signing might be the best bet in that case since it avoids storage IF you were to try and implement this kind of system.
- Comment on Turning the Tables: How to Make Spammers Reveal Their Own IP Address 5 weeks ago:
The idea of having them send an e-mail to an address containing their IP is clever, however you need to authenticate that the person who sent the e-mail is either somebody who queried your site, or somebody that got the address from somebody who queried your site or else you could just figure out how to generate that base64 yourself and impersonate somebody else’s IP address which could have catastrophic results if you then fed these IPs into something like a block list and suddenly you’ve blocked Microsoft/Office 365. To be fair, I doubt anybody is going to try and reverse engineer one person’s code to then figure out how to impersonate who sent spam, but if this became a widely distributed program you could just pull off Github then it would be more concerning.
A couple ways to solve this:
- Sign the information before encoding it in Base64 so you can verify it came from your site and wasn’t just spoofed. This has the upside of being stateless since you don’t need to keep a record of every e-mail you’ve generated but comes with the disadvantage of spending CPU time signing the text which could be exploited as a DDoS.
- Spit out a random e-mail address and record which e-mail address was given to each IP. Presumably you wouldn’t hold on to this list forever since IPs change owners frequently and so an IP that was malicious 1 month ago could be used by a completely different person now and so you can trim this list down once a month to avoid wasting disk space. You’d probably also want to keep some amount of these requests in memory (maybe 10Mb or so) to avoid ruining your IOPS.
All this said, I think your time is better spent with the using unique e-mail aliases as the author suggested but with 2 changes: 1) use aliases which are not guessable to prevent somebody from making it look like somebody else was hacked (e.g. me+googlecom@ gets compromised, but the spammer catches on and sends from me+microsoftcom@ instead to throw off the scent) and 2) don’t use me+chickenjockey@, use chickenjockey@ or else the spammer can just strip “+chickenjockey” from the address to get the real e-mail address.
- Comment on Mozilla Thunderbird Challenges Gmail With Its Own Email Service 2 months ago:
Eh it depends. I’m fortunate enough to be in a good IP block so I don’t get my e-mails dropped purely on that. It’s been a good learning experience and I’ve leaned on my own server a number of times for troubleshooting at work since I can see the whole mail flow. The only problem I have is the free Outlook/Hotmail will not accept my e-mails. Everybody else seems fine. All that said, I don’t host anybody else’s e-mail so I haven’t had any spam come out of my IP, and I would never in a million years host e-mail for a customer.
- Comment on Mozilla Thunderbird Challenges Gmail With Its Own Email Service 2 months ago:
The spam filtering is painful. I kinda work around it by giving a unique e-mail for everything and of one starts getting spammed I just rid of that e-mail. Tends to give you advance warning of data breaches too since you’ll start seeing the spam come in before the announcement.
- Comment on Mozilla Thunderbird Challenges Gmail With Its Own Email Service 2 months ago:
It’s a colocated server. I provided the physical server and they put it into a rack in a datacenter with power and networking (static IP).
- Comment on Mozilla Thunderbird Challenges Gmail With Its Own Email Service 2 months ago:
If this works out it might be a nice place to migrate to away from my self-hosted e-mail provided they eventually let you bring your own domain. Just sucks that e-mail is essentially the most secure thing you need to have since compromising that can compromise every account attached to the e-mail. That’s a lot of trust you need to instill in your e-mail host.
- Comment on Windows 11 is closing a loophole that let you skip making a Microsoft account 2 months ago:
This forced account shit is infuriating. I’d see students with computers that cannot get to government-provided education sites because they are forced to sign up with a Microsoft account to use their PC, which forced them to setup a child account because of their age and therefore be under a parent account, which means the child account can only use Edge and can only go to whitelisted websites, which blocks some government education sites unless the parent account allows it through which they can’t until the student goes home.
- Comment on Whistleblower Alleges Meta Was Ready to Censor Content for Chinese Government 2 months ago:
I’m curious if this was going to apply to content on non-Chinese Facebook. Another part of the article referring to hiring a “chief editor” explicitly says that the editor part would apply to the Chinese version only, but at the same time, Facebook removed content posted by a person in New York from Facebook at the request of the Chinese government, so it could go either way.
If somebody is decrying the state of free speech in their podcast, show or in the campaign trail you can be pretty confident it’s an empty platitude. That said, you probably won’t find many examples of people willing to defend free speech or any civil liberties the moment their freedom is on the line. That’s not Zuck though. He’s just full of it.