[-] just_browsing@reddthat.com 5 points 1 year ago* (last edited 1 year ago)

And yet somehow the head office with total power is hereditary just like a monarchy.

[-] just_browsing@reddthat.com 13 points 1 year ago* (last edited 1 year ago)

Some are, but not all. The point here is building entire towns or entire new city sectors in one fell swoop instead of planning them out and building them in stages so plans can be adjusted as needs inevitably change is a bad idea. It's things like this that have directly led to the current property market crisis.

Of course if buildings are already there it makes sense to use them, but they might have been able to put something better suited or more economically viable there if they had staggered the construction.

[-] just_browsing@reddthat.com 32 points 1 year ago

CTO material right there.

[-] just_browsing@reddthat.com 35 points 1 year ago

The guy who runs the site literally works for Brave. It says so in the about page.

[-] just_browsing@reddthat.com 2 points 1 year ago* (last edited 1 year ago)

Deep packet inspection by definition requires the ability to see inside the packet, which if using HTTPS wouldn't be possible for your ISP.

They can still see the destination IP, return IP, and port number, but that's it. It would take a ton of storage to log all of that packet data though, and it'd be difficult to come up with a way not to double count it if it's going through multiple hops on the ISP network.

Logging DNS requests on the DNS server would be a much easier way of collecting that data if they wanted it. I know cloudflare collects aggregate DNS query data through their public DNS server, and Google likely does too.

[-] just_browsing@reddthat.com 6 points 1 year ago* (last edited 1 year ago)

I'm familiar. Other than key exchange for encrypted connections, the whole point of HTTPS/TLS is establishing who you're connecting with is who they say they are and preventing man in the middle attacks just like you described.

If your traffic was being intercepted by something like Zscaler it wouldn't be able to provide the proper signed certificate of that web address and your browser would throw a mismatch error. IT departments using such intermediaries for https traffic inspection only get around this by installing the intermediaries' root CA on your system so it's not flagged by your browser or whatever you're using for TLS traffic.

The only way someone could intercept your TLS traffic and then pass it onto you without you knowing is by having that website's private key to sign the traffic with, which is a major security breach. As soon as something like that is discovered the certificate is revoked and a new one is issued with a different private key.

So, again, that's just not how TLS works.

https://en.m.wikipedia.org/wiki/Public_key_infrastructure

[-] just_browsing@reddthat.com 2 points 1 year ago* (last edited 1 year ago)

Yup. An ISP could potentially gain some information based on the IPs you're hitting and the number/frequency of packets sent and received, but that would take serious logging and analysis on their part. It's much easier to collect data through DNS requests.

[-] just_browsing@reddthat.com 5 points 1 year ago

Yeah... that's not how TLS works.

[-] just_browsing@reddthat.com 46 points 1 year ago

A big English speaking population, it's small enough that people have a sense of national pride but still large enough to have plenty of users, and most importantly a 3 color flag that's easy to draw with no outside coordination.

[-] just_browsing@reddthat.com 5 points 1 year ago

Oftentimes it's done because it's cheaper, though oftentimes it's actually more expensive but they calculate that money from licenses post initial sale gets them more revenue and margin in the end anyway.

Still, even if it always was cheaper for the manufacturer this way, the point here is companies should not be able to control something you physically own once you have purchased it. It's a dangerous precedent to set and things like this will creep into more and more products if we let it.

[-] just_browsing@reddthat.com 12 points 1 year ago* (last edited 1 year ago)

Firmware doesn't run on an OS, you're probably thinking of drivers which are different. Drivers are software that tell the OS how to interact with specific hardware.

Firmware is software that's baked into specific hardware components and it exists outside of the OS. A visible example most people are familiar with would be the BIOS which is firmware for the motherboard. Hard drives, graphics cards, RAM, etc all also have their own firmware.

Other devices such as microwaves, washing machines, cars, or anything using microprocessors (so pretty much everything these days) also have components with their own firmware. It is true that device firmware can drive a UI on some devices such a as a microwave, but most people today wouldn't consider that to be an OS (semantics, I know).

[-] just_browsing@reddthat.com 1 points 1 year ago

It's not like he just wrote a check. He took out loans and got other investors to sign on to fund the Twitter purchase. Even someone as wealthy as him has to answer to others.

view more: next ›

just_browsing

joined 1 year ago