Probably not. It was almost certainly the case that these pagers were already connected to explosives, probably to be IEDs. All Israel would have had to do is page the pagers to detonate them. I can’t think of any other logical explanation.
Probably not. It was almost certainly the case that these pagers were already connected to explosives, probably to be IEDs. All Israel would have had to do is page the pagers to detonate them. I can’t think of any other logical explanation.
Oh no you don’t, not likewise. There’s zero chance you have any real world experience under your belt, that much you’ve made very clear. You’ve already let it slip that you’re just a consultant lol. A glorified salesman playing around in SMB land no doubt. At best, maybe an old fart who actually dipped his toes into IT generalism two decades ago before getting out of the game and into consulting? I know the type lol.
It’s probably best if you were to stay in your lane and let the professionals worry about security.
So how did those laptops get stolen? Would that have been possible if their users worked on a local client at the office?
Yes laptops can be stolen from offices. It would be pretty trivial to do so in fact in most cases. In an all on site office it’d be a juicy target too because now all these laptops are in the same place.
Rocket science is a fucking joke compared to secure IT practices. You saying that, proves that you know neither well enough to participate in this discourse.
It is abundantly clear that you have little to no knowledge or experience in modern IT security practices. And before you ask, no, having watched Mr. Robot all the way through does not count.
There are highly capable technical people that can securely work from home, but this is not the average user.
You absolutely do not have to be highly technical to work securely from home. That’s just silly. You only need highly technical people to ensure the people who work from home can do so securely.
It’s the type of confidence that comes with years of experience in IT security and compliance for global enterprises.
But I also understand IT security is dramatically complicated by user’s working on their private network connection.
It really isn’t.
I mean if you want to build something around Unbound to do ad blocking and set up a monitoring stack for metrics and all that jazz that’s great, more power to you. But you already have two things built for purpose, there’s no reason to go out of your way to do that. And I don’t think OP here is prepared to do all that.
If you want to run your own recursive DNS server, why would you run two separate DNS servers?
I’m not sure I understand your question. A recursive DNS server and a local DNS cache/forwarder/are two different things with two different purposes. You will always need both. You yourself are using AdguardHome and that is just connecting to recursive DNS server upstream. In my scenario you’re just running both yourself instead of you running one and then letting a 3rd party run the other for you.
Your outbound queries will still be unencrypted, so your ISP can still log them and create an advertising profile based on them.
You can encrypt the recursive queries through your ISP if you want to. Though the effectiveness of any profiling your ISP would do to you are minimized by Qname minimization that Unbound does by default.
If you’re just using DoH then you’re just shifting who’s making that advertising profile on you from your ISP to whoever is hosting your upstream recursive DNS server. It doesn’t matter how much encryption you do because on the other end of that encrypted connection is the entity who you’re giving all your queries to.
I would say Pihole is a better choice than AdGuard home because PiHole just runs on top of dnsmasq. Throw Unbound on there too as your upstream recursive resolver and you’re set. You don’t even need to worry about an encrypted session to your upstream anymore because your upstream is now your loopback.
Yeah, why not? A quick look at Best Buy and I can see that the Apple USB-C cable is $15.99 and the cheapest reputable third party USB-charger is $13.99. You save a whopping $2.
So if you’re a deal-oriented shopper you’re probably not even going to buy from a reputable third party, you’ll probably go with the $6 one from the gas station of dubious quality. And you’ll probably be fine. Or maybe after 3 months it causes a short and burns your house down. Best $10 you ever saved.
Or you can take literally all of the guesswork out of it and just go with whatever manufacturers cable, spend the extra $10 on a cable that will last you years. The point isn’t buying something Apple branded, they don’t even brand it physically. The point is to just buy something guaranteed to work.
Because you’re getting a product that you know isn’t a cheap knockoff that will burn your house down, and you know it will charge your phone at the fastest speed it’s capable of.
You can of course get the same experience buying third party, but then you have to spend time doing research on which one to buy for your device, and the reputable third party brands can cost just as much as the Apple ones anyway.
God just imagine the racism.
You do not know for absolute certain fact, which I know for absolute certain fact because the likelihood of your claim is incredibly low.
Are your friends phones running Android 5.0 or later? (I’m sure they are) they have RCS. End of story. This is not something you can dispute, you’re just wrong.
You can be in denial about it, but your friends have RCS.
You having no clue is not the same thing as being absolutely positive.
It’s more than likely that every single one of your Android friends have RCS on their phones.
Perhaps the latter? My first thought is still that the pagers intended use was for triggering explosives, and they were simply triggered early by the other side.