• 4 Posts
  • 20 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle


  • I’ve built myself a Redox (Open Source split keyboard).

    That one has a number row. Also due to the possibility of programming multiple layers I can hold down a key on the left half, then use the right half as a numpad.

    It would also be possible to program it as a toggle button to switch to jumped more, so you don’t have to hold it down, but I prefer not having some kind of invisible state in my keyboard that I have to keep track of.





  • Mostly no. PiHole works by providing a DNS server.

    A DNS server is responsible for turning domain names such as en.wikipedia.org into internet protocol addresses such as 185.15.58.224.

    PiHole has a list of known ad serving domains and when asked to resolve one just replies with an invalid address.

    Running the DNS server itself would only give them access to the above mentioned data. However, they could respond with wrong addresses to redirect all traffic over a man in the middle proxy.

    For an https secured connection this would just result in a certificate error, warning the user to not proceed. Https secured websites have a certificate electronically signed by a trusted outside party, that verifies that they really are the owner of a specific domain.

    Another option would be to redirect the user to a man in the middle proxy that pretends to not support https in order to trick the browser and server into opening an unencrypted connection. This works on some websites, but can be noticed by the user (as the browser now displays “Not Secure” and “http://”) in the address bar) and is protected again by newer security mechanisms like HSTS that allow websites to tell browsers to always contact them over https in the future.

    Basically if the site supports HSTS and you have visited it before this also won’t work.





  • They recently announced that they will publish new exploits at DEF CON next week and recommend owners to not update their firmware if they want to take advantage of that.

    So depending on how the exploit works installing Valerie might get a lot simpler. It usually takes quite some time until such exploits are not only fixed, but then also for devices with fixed firmware to hit the shelves.