Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IP
Posts
3
Comments
885
Joined
2 yr. ago

  • Exactly. The only truly effectively way I’ve ever found to block bots is to use a service like Akamai. They have an add-on called Bot Manager that identifies requests as bots in real time. They have a library of over 1000 known bots and can also identify unknown bots built on different frameworks, bots that impersonate well known bots like Googlebot, etc. This service is expensive, but effective…

  • Not to mention that if he sells enough Tesla shares he could lose majority control of it. If that happens and enough shareholders band together they could force all the Elon sycophants off of the board of directors, then the new board could force him out as CEO.

  • Not easily. The scammer likely has your current address & contact info, but knows nothing about your history.

    To confirm your identity when you contact these reporting agencies they will use details from your credit history by asking detailed questions the scammer likely won’t know. For example it might be questions like these:

    • What kind of car did you purchase in 2005?
    1. Honda
    2. Ford
    3. Saab
    4. Jeep
    5. None of the above
    • Which one of these companies did you work for previously?
    1. IBM
    2. Pizza Hut
    3. Macy’s
    4. Jiffy Lube
    5. None of the above

    They’ll throw 3 or 4 questions like these at you that you’ll have to answer correctly. They might involve places you used to live, banks you have had accounts with, etc. The chances of a scammer with your SSN knowing all these details about you is pretty tiny.

  • The credit monitoring companies have your up-to-date contact information (and verified) when you put the freeze in place. Now, should a third party try to open an account, etc. in your name it should be blocked from happening and the credit monitoring company should contact you.

    If a scammer tries to unfreeze or otherwise modify your account with them they should also contact you.

    If/when they contact you or you request your account be unfrozen then they’ll use old credit history to confirm your identity. These are a series of three or four random questions that a scammer is unlikely to know. For example they might ask you what kind of car you purchased in 2005, then give you 4 options, like Ford, Honda, Jaguar, or BMW, and then also a “nine of the above” option. Then they might ask you which of the following street addresses you used to live at, and list 4 seemingly random addresses, one of which you might have lived at.

  • My wife and I met through eHarmony about 15 years ago now, and have been happily married over 10 now. Prior to meeting her I’d tried a handful of other dating apps but never had any luck. I had very similar stories about ghosting, unmatching, etc.

    I have no idea if eHarmony still works the way it used to, but back when I met my wife it was fairly different from the likes of Match.com, Tinder, etc. When setting up your profile you had to answer a bunch of fairly specific questions that covered everything from if you were looking for casual dates, long term, marriage, if you have/want kid, etc. to things like activities you enjoy to how important things like family, religion, career, etc. are to you.

    When they show you a potential match you get to see how they answered those questions along with a more open profile. If both of you indicate interest in communicating with each other then you’re first led through some rounds of guided communication to begin with. As I recall you would both pick 3 or 4 multiple choice questions from a list of 30 or so to ask the other person, and they would do the same. After you both answered those questions then you would do the same with more open-ended questions and so on. Only after a few rounds of that would you be able to chat/email with the other person.

    What I realized while using eHarmony is that it kind of forced you to invest time & some conscious effort to communicate with potential matches. That resulted in more of them being open to proceed further. I went on dates with a few women I met on eHarmony before I met my wife.

    As I said before I have no idea if eHarmony still operates this way or not. That’s how they did things 15 years ago and it could have changed a lot since then.

  • Years ago I worked at a company where they based server root/admin passwords on song lyrics. The person who came up with it clearly liked classic rock. I still remember at least one of them:

    4ThoseAboutToRockWeSaluteYou!

  • Fuck private equity firms in general. They just ruin businesses by squeezing every penny out of them, saddling what remains with huge debt, the sells off the husk that remains.

    My brother owns a franchise that started out great, but then the founder retired & sold. Two owners later and now a private equity firm owns it and is trying to squeeze all the franchisees with unrealistic demands. My brother is already working on his exit strategy while trying to avoid declaring bankruptcy.

  • Not at all. Those billionaires will still have massively huge egos that will prevent them from recognizing their own futures will be incredibly shitty.

    They’ll use their wealth in the short term to build bunkers, etc. where they think they’ll be able to continue to live in luxury while the rest of the world burns around them. But no matter how good the bunker and how many supplies they squirrel away, they’ll eventually be forced to return to the real world, and won’t be prepared for the fact that their piles of money will be worthless if the planet is largely uninhabitable.

  • Our web servers are locked down in such a way that you can’t copy data off of them using standard protocols like scp, ftp, and even http, etc. Our firewall blocks all such outbound traffic.

    This hacker found a bug in a framework used on our web servers that let him execute commands remotely. When commands to copy data off the server failed using those more typical methods he switched to a more novel (and difficult) method of leveraging DNS instead. He discovered we weren’t locking DNS down the same way we were locking other protocols down and used that as a way to extract data from our server.

  • I never would have thought of it but I recently saw a novel use of DNS to exfiltrate data from a compromised server.

    My employer takes security very seriously. Our public facing web servers are very thoroughly locked down, or so we thought. We contract with companies like HackerOne to perform penetration testing etc. One of their white hat hackers managed a remote command attack, and copied data off of the server via a string of DNS queries.

    Suppose the hacker owned the domain example.com, and he had his own authoritative nameserver for it. He just ran a series of commands that took, for example, a password file, and ran DNS queries for line1.example.com, line2.example.com, line3.example.com and so on for each line in the file. As a result the log file on his DNS server collected each line of the password file as it responded to each query.