@groet - eviltoast
  • 0 Posts
  • 55 Comments
Joined 10 months ago
cake
Cake day: November 10th, 2023

help-circle
  • What do you gain by doing this? I trust both proton and mullvad to not fuck up their encryption so attackers can’t read your traffic even through one VPN. The second one doesn’t offer additional security here.

    In your setup, proton will only know you use mullvad but not know which sites you visit in the end. Mullvad knows everything just the same as without proton. So the outer VPN doesnt add privacy either.

    If you are suspected of a crime, forcing mullvad to disclose your identity/IP is enough and proton doesn’t help.

    If you are worried about traffic correlation analysis, then yes 2 VPNs will help. But honestly for normal usage I don’t see the point of 2 VPNs.

    And about the DoS fear. Just do it the other way round? Mullvad on the router, proton on the device? From protons perspective you produce the same amount of traffic, it just comes from a mullvad server. The outer VPN is the one where you have increased traffic due to 2 VPNs. But I am pretty sure neither will be a problem and tunneling a VPN through a VPN is not a TOS violation


  • groet@feddit.detoComic Strips@lemmy.worldI'm in!
    link
    fedilink
    arrow-up
    11
    ·
    4 months ago

    You DONT want to turn it off. Digital forensics work WAAAAAAY better if you have a memory dump of the system. And all the memory is lost if you turn it off. Even if the virus ran 10h ago and the program has long stoped running, there will most likely still be traces in the RAM. Like a hard drive, simply deleting something in RAM doesn’t mean it is gone. As long as that specific area was not written over later it will still hold the same contenta. You can sometimes find memory that belonged to a virus days or even weeks after the infection if the system was never shut down. There is so much information in ram that is lost when the power is turned off.

    You want to 1: quarantine from network (don’t pull the cable at the system, but firewall it at the switch if possible) 2: take a full copy of the RAM 2.5: read out bitlocker keys if the drive is encrypted. 3: turn off and take a bitwise copy of the hard drive or just send the drive + memory dump to the forensics team. 4: get coffee














  • Can you verify the software running on an instance is the same as the one in the source code repository? You can’t. Can you verify the instance isn’t running code to read passwords from your login requests even if the code is the original open source code? You can’t.

    That’s why (and for other reasons) you should never use a password for more than one site/service/instance.

    Lemmy admins (admins in the Lemmy application) probably can’t read your password. But everyone with admin rights on the server operating system can.



  • groet@feddit.detoMemes@midwest.socialQuality of Life ☭
    link
    fedilink
    arrow-up
    11
    arrow-down
    2
    ·
    6 months ago

    Corporations are doing a bad job at it as well. While Gouvernement standards tend to be slow and stagnant, the free market produces an incomprehensible sea of standards. Like with USB, HDMI, 3/4G signals, cat-X Internet cables. If a single global manufacturer decides to do things slightly different you get a new version of a standard that everybody has to be compatible with.