MFA - 1 = SFA
aka password login
MFA - 1 = SFA
aka password login
Since its servhold, you may be able to remove the offending content (for a short time, anything public-facing) and then contact reg.xyz to get it unsuspended. You’re right though that’s not very good customer service.
On a related note, it’s possible a misconfiguration allowed some of the contents or index to be shown publicly and it got caught in a search engine and was taken down in an automated DMCA sweep. I believe .xyz is an American registrar so have to respond to DMCA but could be wrong on that. I like to stay with any .TLD that archive uses… md, ph, etc.
https://help.sav.com/hc/en-us/articles/11933048624923-Resolving-serverHold-on-Your-Domain
Njalla just buys domains from major registrars on your behalf and owns them on your behalf. Godaddy, Tucows, etc. It was the owner of the entire .xyz space (gen.xyz) who shut your domain down. Njalla is just passing along the info. Porkbun will do the same.
deleted by creator
That’s a good idea. Send message > Message signed and sent > Receiver opens message, signature bits are hidden, but clicking report sends plaintext with signature included. Only ends up in report queue if signature is valid.
Or a big stash of DMT
Thanks for the correction.
I believe that is the case, if you inspected the HTTP headers and found if to show Linux instead of Windows. my last experience with that would have been years ago. Arch does like to compile things from source instead of using binary blobs, and compilers and configs can undo a lot of the work the torproject has done to combat fingerprinting, which is why it’s recommended to run the pre-built binary and install no plugins. However it’s important to note that it ALSO gives you a unique JavaScript fingerprint every time, when tools use as much information as possible to generate a fingerprint, because it generates new information on every reload. That’s why OPSEC is important and for can’t help you if you use it wrong. If you login to 2 different unlinked sites in the same session, and you don’t want them to be linked, too bad now they’re linked via JS fingerprinting. JavaScript is more or less a programming language within the browser, and you’ll never escape JavaScript fingerprinting. Which is why it’s important to learn how to use tor properly, and leave JS disabled as much as you can.
One thing you can do with your arch build is use the fingerprinting tool to see how unique you are, then get a new identity, then go back and do it again. Does it now say you’re one of 2 people who have used the tool, or does it show you’re (again) unique? If the latter, then it’s working (at least enough) properly.
Tor browser from the arch repos is not stock torbrowser. Add repos for torproject/guardian project/whatever it’s called now, or use the torproject.org installer.
Who was that guy that discovered something very important in physics, and he said the elves told him about it? The elves that were in the massive holes/caves he would dig in his back property, as his outlet. I forget how large his friends said the tunnels were, but he clearly spent a lot of time digging tunnels.
Edit: Seymour Cray, of the Cray supercomputer. AKA The Father of Supercomputing.
John Rollwagen, a colleague for many years, tells the story of a French scientist who visited Cray’s home in Chippewa Falls. Asked what were the secrets of his success, Cray said “Well, we have elves here, and they help me”. Cray subsequently showed his visitor a tunnel he had built under his house, explaining that when he reached an impasse in his computer design, he would retire to the tunnel to dig. “While I’m digging in the tunnel, the elves will often come to me with solutions to my problem”, he said.
Cray has been called solitary, uncommunicative, secretive, and difficult to get on with. Frank Sumner, Professor of Computer Engineering at the University of Manchester, met Cray on several occasions and refutes suggestions that he was a prickly character: “He was a very friendly man, and perhaps the greatest all-round computer scientist ever”, says Sumner.
There are many things you can do with JavaScript, and tor can only protect against so many without completely breaking many sites. Set your slider all the way to maximum and it will no longer detect windows, but it will very likely also no longer run.
Make sure you take a big deep breath when testing the bag of ginger dust.
It’s a unique experience.
They make it a whole lot harder, asking for photos of ID and selfies and bank statements directly from your bank, etc.
Amazon specifically. Unsure about other sites.
They can, but before (we learned from the Snowden docs) they had to have a legal reason and request a warrant if it was an American citizen, unless there was imminent harm. Now they don’t require that warrant.
It’s much better to go through the list of data brokers manually and submit your information twice a year, if you have the time. Like doing taxes, but for privacy.
There’s a whole lot of caselaw surrounding this, and they will get someone to destroy the pipes to find out when they were flushed (their word goes, good luck finding someone impartial to say that wasn’t what happened). I wish court cases were built on 1’s and 0’s like computer code but that’s just not the way the world works.
That’s not completely true. In most states if they are knocking down your door with a search warrant and you flush a kilo of heroin down the toilet, you’re getting an evidence tampering charge that will hold up in court.
Source: his arse?
Even then, in his arse, they’d have to prove the person locked it.
But what’s worse, getting a tampering with evidence charge, or giving them everything?
Still would like to see his source.
Another day, another database.
Sucks that I have to preface but people can be jumpy here. This is genuine curiosity, I’m actually asking, because it’s really probably something I should already know. Can you explain the nuance to me please?
My understanding, speaking mostly of apps/websites, I know jobs can be much different:
Most places have the first factor as a password.
First factor (or “login”) = username+password pair.
For the longest time that was all there was, “your login” was just a login, which meant a username and password combination. Then 2FA/MFA (“2 factor authentication / multi-factor authentication”) came along in the form of username+password combo plus SMS/email/Google Authenticator/Yubikey/etc to verify as the 2nd form of authentication. You can have 3FA 4FA 5FA whatever if you want and if it’s supported by the app/website. So 2FA is MFA, but MFA is not necessarily 2FA.
I know jobs can be set up a lot differently.