Clusterfck

joined 2 years ago
[–] Clusterfck 74 points 3 weeks ago (12 children)

I’m not sure if it’s crazier that statement was made or the fact that I read it and agreed with it before I even thought how crazy of a time this is.

[–] Clusterfck 4 points 1 month ago* (last edited 1 month ago) (1 children)

lol this same post was on the NYC community. Robert gets around!

Edit: lmao it’s all the same guy!

[–] Clusterfck 4 points 2 months ago

Reminds me of Motherlode back in the online flash game days

[–] Clusterfck 1 points 2 months ago (1 children)

Can someone prove me wrong, I thought Crucial was a big deal in consumer memory upgrades?

[–] Clusterfck 4 points 2 months ago

Yeah, by virtue of not owning the entire connection (which is impossible unless you own the ISP, intermediary providers, and the service you’re connecting to) somebody somewhere is going to see something that may be identifiable to you. There are services that are offered by many companies for huge enterprises that give you basically a direct connection to a data center and a lot of times that traffic can be totally encrypted, but it’s usually for very big enterprises and isn’t cheap to get.

And you’re definitely helping the privacy part running a VPN on the router level, but still, there’s always a chance of something getting leaked. It’s pretty low and gets better all the time, but that chance always exists. It’s the reason why air gapping is still a thing for things that ABSOLUTELY cannot be attacked/compromised/viewed by some random person.

Again, if you’re going off of a privacy stance, you’ve made things hard enough that unless a huge ISP has some kind of agreement to sell data to advertising companies and spending the time to implement services to get you and the 2 percent (which is probably a huge overestimate) of customers taking similar steps, it’s just not worth them making the effort.

[–] Clusterfck 6 points 2 months ago (1 children)

For whatever it’s worth, that’s not a huge privacy violation. Most routers auto-identify devices. Most IP scan tools just identify the device by default too.

If it’s a good enough public/hotspot network, they will have “client isolation” turned on and it’ll keep you from seeing any other devices but the actual network equipment.

[–] Clusterfck 3 points 2 months ago (2 children)

Some of that is built in (mostly if it’s an ONT/router combination unit). And a lot of what they can see is just because you’re sending all of your traffic through them no matter what VPN you’re running. Knowing MAC addresses is pretty much a requirement for “the internet” to work correctly and, while you can obfuscate a MAC address on some devices, there is a (small) chance that can cause problems too.

I know hearing from someone that actually works for one may not be super convincing, but if your ISP is a smaller provider than like AT&T/Spectrum/Cox, they are almost certainly not going to spy on you just because they want to. I’m a customer of the ISP I work at. If I was told tomorrow I had to turn on some kind of deep packet inspection/intercept/spying service, I’d resist it as much as possible simply because I don’t want to see that and I don’t want someone to see what I’m doing. I can only assume that other companies have similar positions on the matter.

[–] Clusterfck 11 points 2 months ago (4 children)

I work for an ISP. There’s a number of ways that that they could have figured it out and probably 98 percent of them are genuinely there as a troubleshooting method and nothing more.

As another user said, if it’s a fiber connected ONT, there’s some remote management tools we can use to see what’s there. Some ONTs have a router built in as well and in some cases, we’ve actually done a site scan of WiFi networks for customers set up like you. We can see all the WiFi devices nearby and pretty quickly tell you “yeah, your speed/connectivity issues are because you have about 80 2.4ghz networks being broadcast around you.”

If they offer their own routers, someone could even do a site scan off of your neighbors routers and get an idea what’s around. If most of your other neighbors are using their own routers ISP provided router and you’re the odd one out, odds are that non-ISP device they’re seeing is you. This one is the least likely though, there’s a number of easier methods to see what’s the device is besides using other devices in neighboring houses.

Additionally, there’s a chance they did document something like “customer is using their own Asus router, not ours” and they just checked ticket/service order history. They could have got this from you telling them in the past, a technician being onsite and seeing this, or as the other comment mentioned, you’re connected to their network, they’re going to see the MAC address of the device plugged into their equipment in a few places pretty easily.

[–] Clusterfck 1 points 2 months ago

Because you weren’t going to pay. The people that don’t know any better/have the money to spend on a subscription would just as soon pay for the convenience of not doing everything above.

[–] Clusterfck 8 points 3 months ago

I’d tell you why that is but due to some vague, shadowy group that I won’t ACTUALLY name but give vague hints about, I can’t tell you.

[–] Clusterfck 1 points 4 months ago

I think it has a lot to do with what you’re comfortable with.

Are you going to store just movies and TV shows? Then yeah, a RAID failure that can’t be recovered from for one reason or another won’t be the end of the world.

Storing priceless family photos that for some reason you’re ONLY storing here? Maybe go to the extra expense and do it “right.”

You’re introducing multiple points of failure to a system designed around protecting against failure. Everyone is going to argue against it because it’s additional risk that can be avoided. There’s also a chance of the host computer chipset going wonky and disconnecting the devices (I’ve seen it enough times it IS possible. Usually a reboot fixes it, but odds are the RAID would still need rebuilt), or a bad USB cable, or you forget that it’s in a RAID and plug it in to another computer, or any other hypothetical that seems unlikely but could happen.

If you want my advice that you didn’t ask for, plug them both in and mount them separately, put all data on one of the drives, then use a tool like FreeFileSync to copy all data over to the second drive drive. You’ll miss out on the theoretical 2x read speed, but this way if one or the other DOES come disconnected, you just need to plug back in and you’re back working without a chance of a RAID needing rebuilt.

[–] Clusterfck 6 points 4 months ago

A much better way of putting my point.

The fact that someone like him was elevated to the status he was coupled with someone feeling they needed to go as low as killing another human to make things better is insane. I hope American history (as long as America still exists long enough for this to become history) looks back at this like we looked back at other huge events in American history and some 4th grade teacher someday has to try to explain to our great-grandchildren how we let things backslide to this point followed immediately by a chapter on the first presidential debate held entirely virtual with augmented reality and holograms.

view more: next ›