Jerry on PieFed

Just a techie guy running feddit.online to allow people to communicate, make friends and acquaintances. Odd coming from a happy introvert, right? (https://jerry.hear-me.blog/about)

I also own these publicly available applications:
Mastodon: https://hear-me.social/
Alternative Mastodon UI: https://phanpy.hear-me.social/
Peertube: https://my-sunshine.video/
Friendica: https://my-place.social/
Matrix: https://element.secure-channel.net/
XMPP/Jabber: https://between-us.online/
Bluesky PDS: https://blue-ocean.social/ (jerry.blue-ocean.social) Mobilizon (Facebook Events Alt): https://my-group.events/
and more…

  • 20 Posts
  • 100 Comments
Joined 1 year ago
cake
Cake day: September 29th, 2024

help-circle


  • You have to trust someone. There’s no way around this. But trusting some app written by some unknown person that has nobody overseeing it is probably the worst place to put your trust.

    So, decide. You either trust some unknown app developer, your ISP, or a VPN provider. You must choose one. Which one do you choose? Choosing none means you are off the Internet.

    I have more trust in Proton VPN, Mullvad VPN, Mozilla VPN, and some other reputable VPN providers than I do in my ISP, some cheap VPN run by unknown people, or some app making crazy claims. I strongly doubt that a reputable VPN provider is doing any tracking of user traffic. But I bet MockTraffic is telling someone all the websites you’re visiting.

    I think if you are worried about your traffic being tracked, you are safest with a reputable VPN provider.


  • I see so much wrong in these claims.

    1. Anyone analyzing your traffic is not just doing so based on DNS queries. They use Deep Packet Inspection (DPI) and they track packets across the Internet to find out what you’re doing. A fake request won’t fool them.
    2. Similarly, they use machine learning and behavioral analysis, which won’t be fooled either by a bunch of DNS queries.
    3. The increased noise could be detected as malicious activity, like a DDOS attack. You can find yourself rate limited, and your network performance can drop substantially.
    4. If the fake requests are real websites, your IP address can become associated with a wider range of interests, leading to more targeted advertising.
    5. Instead of using a simpleton’s approach that won’t work, use real protection. Use a paid-for VPN, or at least a reputable free one (not many) with built-in ad and tracker blocking to bypass your ISP.

    **The App sounds fishy, actually. ** Many apps come out claiming to provide some unique security, and they eventually turn rogue and start stealing information. This one sounds ripe to go rogue, especially since it can’t make it into the standard store. I expect to read about MockTraffic someday being caught stealing information.

    I wouldn’t go near it.




  • Peertube is run by volunteers who pay with their own money and time for the convenience of others to use it for free. People generally run it to give people social media options outside centralized corporate control.

    Why would someone put themselves in legal jeopardy and host pirated content, knowing their arrest is imminent? You can’t hide your site easily.

    Porn would be overwhelmingly expensive to run because of the sheer amount of traffic, storage, and numbers of people. It would have legal exposure too and require huge moderation problems, with no return for the effort.



  • It’s worse than you think. An IMSI catcher is not even needed to find out what phones are in an area:

    Section 3.4.1: Presence Testing in LTE
    https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks

    Passive Presence Testing

    The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).

    RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area . In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.

    There are descriptions in the article of other ways to find phones without using an IMSI Catcher or fake tower.



  • I see good points in this comment, even if the analogy of their being like hashtags might be a little off.

    gup.pe groups have a 1-word description. Most of them I’ve been unable to assign a topic to because I didn’t know what the word means or it has ambiguous meanings. Most have no posts. So they land in the “unknown” topic.

    I always wondered what I would do if someone started posting porn or hate to them. It would be a nightmare. I’d just have to block the group, I suppose.

    Frankly, instead of someone creating a gup.pe-like group, I think they ought to create a community in PieFed, MBIN, or Lemmy. gup.pe was an early experiment when there wasn’t a threadiverse.

    I’m fine without gup.pe or gup.pe replacements.