Yup. A variation of the quote (basically capitalists instead of American businessmen) is commonly attributed to Lenin instead of Khrushchev. But that, too, can't be verified and is said to be fake.
Emotet
Instead of waiting for a zombie fungus to evolve into something that can infect humans, they decided to cut out the middleman and made cyborg mushrooms.
Buying a domain. There might be some free services that, similar to DuckDNS in the beginning, work reliably for now. But IMHO they are not worth the potential headaches.
DuckDNS pretty often has problems and fails to propagate properly. It's not very good, especially with frequent IP changes.
Damn, that's wild. Cheers for sharing!
I have an understanding of the underlying concepts. I'm mostly interested in the war driving. War driving, at least in my understanding, implies that someone, a state agency in this case, physically went to the very specific location of the suspect, penetrated their (wireless) network and therefore executed a successful traffic correlation attack.
I'm interested in how they got their suspects narrowed down that drastically in the first place. Traffic correlation attacks, at least in my experience, usually happen in a WAN context, not LAN, for example with the help of ISPs.
Sounds interesting, got any links for further reading on that?
I can't quite connect the dots between wifi/internet traffic spikes when IRC is so light on traffic that it's basically background noise and war driving.
Windows, as any operating system, is best run in a context most useful to the user and appropriate for the user's technical level.
- Need to run Windows apps/games and aren't afraid to tinker around if and when something doesn't work as expected or your software simply isn't supported? WINE/Proton.
- Need to run mostly light Windows apps and don't want to tinker around? VM.
- Need to run Windows apps/games that don't rely on Kernel-Level Anti-Cheat, want direct hardware access and aren't afraid to tinker around, especially if you only have one GPU, and when something doesn't work as expected? KVM
- Need to run any Windows app/game without things constantly breaking or the need to tinker around and staying on top of things? Dual-Boot from different disks, utilize LUKS/FDE and be done with it.
Why do you keep stating blatantly false info as facts when it is obvious that you're knowledge of the topic at hand is superficial at best?
In this comment thread alone you've stated that:
- to avoid "Google Android", one should use Lineage OS (?)
- Apps on Lineage are some kind of separated on Lineage OS and not abandonware (??)
- Lineage OS is not terrible for security, because you haven't found anything wrong with it besides that small little, insignificant detail of an unlocked bootloader (???)
- DivestOS has "all the same issues" as GrapheneOS(????)
Genuinely not trying to stir up shit, I'm curious. Why?
It's great that it works for you and that you strive to spread your knowledge. Personally, I'm quite happy with my DNS filtering/uBlock Origin and restrictive browser approach and already employ alternatives where feasible in my custom use case.
Thanks for your offer, though!
Das stimmt bei richtiger Verwendung schlichtweg nicht und es nützt niemandem, wenn man falsche Informationen herausposaunt. Wie auch im Artikel zu lesen, fand die timing attack auf üblichem Wege, gerade fürs deutsche Rechtssystem aber äußerst kontrovers statt:
Bei einer Timing Attack werden, wie der Name schon sagt, Zugriffszeiten und möglichst viele (Meta-)Daten zu bestimmten Paketen statistisch abgeglichen. So kann man auch ohne direkten Zugriff auf die Daten bei ausreichender Datenlage feststellen, wer mit wem kommuniziert.
Hier wurde schlichtweg jeder o2 Kunde in Deutschland erstmal pauschal überwacht, ob er nicht mit einem bestimmten Server Kontakt aufnimmt. Um dem entgegenzuwirken, kann man natürlich erst einmal über einen (no log) VPN Provider gehen, um gar nicht erst zugeordnet werden zu können.