It’s technically viable, using a distributed hash table for example. But I’m not aware of any solution that does it.
- 0 Posts
- 8 Comments
Daklon@beehaw.orgto
Privacy@lemmy.ml•'Pay or Okay' explained: Why more and more websites make you pay for your privacy - noyb
1·2 years agoThis link probably will explain it better than me: https://www.engage.hoganlovells.com/knowledgeservices/news/new-guidance-on-cookies-in-spain
Daklon@beehaw.orgto
Privacy@lemmy.ml•'Pay or Okay' explained: Why more and more websites make you pay for your privacy - noyb
3·2 years agoSadly, they are doing it in spain, the judges recently stated that they can do it, and few days later almost all of the spanish newspappers had it.
Daklon@beehaw.orgto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•I'm looking for a TOS-breaking telegram client that strips out all the premium shitEnglish
2·2 years agoYes, you can only use it if you where using it in the past, sadly the project seems to be abandoned.
Daklon@beehaw.orgto
Linux@lemmy.ml•ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH Servers
1·2 years agoIf I’m bruteforcing a server and each time that I try an username/password my IP gets banned but suddenly one combination allows me to do 4-5 test ( any bigger number than previously) you are potentially telling me that this user is different (it exists) than the previous ones. Therefore you are doing the attack easier for me because now I know which users actually exist in the machine. It doesn’t matter if you are locking the attacker after the password was given.
As others told you, using public key auth, non standard ports or even port knocking will be much more useful.
Daklon@beehaw.orgto
Linux@lemmy.ml•ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH Servers
11·2 years agoI think is better to not use an standard port and using fail2ban at the same time to avoid automated attacks. If you manage to implent what you are looking for, you are potentially telling an stacker which accounts exist and which not, allowing him to do an easier brute force attack. A typical attacker using a botnet will not be stopped by a single IP being baned, and as son as an IP is banned he will know that this account doesn’t exists. Another option is enabling port knocking.
Daklon@beehaw.orgto
Free and Open Source Software@beehaw.org•Invidious: "YouTube legal team contacted us"
1·3 years agoAs far as i know, they don’t use the youtube api. Therefore they don’t have to be compilant with any api policy or tos. They just connect to YouTube like any browser do and then show that information(with modifications) on the invidious app.
Google can try to modify the code faster than the developers try to update the app since they expect the data to be in an specific format, but that’s all, they aren’t using the api… There is nothing to be closed.

I’m using simplex without problems. I get all notifications and didn’t notice an increased battery drain.