• 0 Posts
  • 49 Comments
Joined 1 year ago
cake
Cake day: July 2nd, 2023

help-circle
  • Have you searched online at all?

    I think copy pasting your post literally to the dot on Google gives the result. (CBS news) :

    Harris and Trump have competing tax plans. Here’s how your paycheck would change under both.

    First result too. Amazing.

    Sometimes I wonder if people like you don’t see the disrespect in asking other people to do things you could do in a matter of seconds out of pure laziness.

    I obviously won’t link the article because I’m too pissed and I think you need to learn that people here are not working for you. This post is a literal waste of space and time.








  • Do you have any documentation on how this work ? Is there a name to this special protocol? Is it a recent addition to the wifi standard ?

    Again a wifi AP doesn’t send data to a specific client. So how does an AP can enforce that one client can’t read a frame for someone else that is properly authenticated? How would an AP prevent someone spoofing mac addresses from receiving that data ?

    I’m really confused by this feature I never heard of even when I was playing with aircrack and so on. Yes sometimes your mac address can get filtered but even that is not really difficult to avoid.

    Sorry I have so many questions but I honestly did quite some “tinkering” with wifi years ago and none of this sounds familiar.







  • Not OP but everytime I used the verbose output of ssh it didn’t help me one bit. Even adding outrageous verbosity I was still quite confused on what step failed and which didn’t.

    I’m probably just bad at understanding SSH but i don’t know it seems like ssh workflow includes many trial and error until it finds a way to connect.

    Imo the verbose output of SSH is often not very helpful if you don’t know very well ssh in the first place. Obviously it is still worth a shot and a good advice but don’t expect ssh to clearly state what is going on :)






  • Is it possible that this password was really your gf’s password in the past ? It could have leaked long ago and the hacker just decided to use a previously leaked pass to be more inconspicuous.

    I don’t think this whole story is so wild, it could be just coincidental. The hacker knew somehow about her DOB and thought this would be an easy password.

    Rest assured a hacker wouldn’t want to use their own password or reuse even one as that could link to previous nefarious activity. So they had to set up a brand new password just to move forward. So they set up anything personal they could get their hands on.

    PS: you should check haveIbeenPwned for the address of your gf.


  • Also as DDG is based in the US it is most likely legally bound to give your informations to any agency with a nice gag order on top of it.

    I can’t imagine any serious privacy oriented business to be headquartered in the US.

    The whole better privacy is true with DDG but certainly not to the extent people would like to think.

    That being said DDG has decent search results and is slightly better than Google for privacy. Google is an ecosystem so every little bit you don’t give them is a success.

    It’s really too bad we don’t have good private search engines…