Jump to content
Search In
  • More options...
Find results that contain...
Find results in...


  • Content Count

  • Joined

  • Last visited


This user doesn't have any awards

About Sooneung

  • Title

Profile Information

  • Gender
  • Location
    Seoul, South Korea


  • CPU
    Intel Core i5 6200U (Skylake)
  • Motherboard
    (LAPTOP) 35Wh Battery
  • RAM
    DDR3L 4GB
  • GPU
    Intel HD 520
  • Case
    (13" Laptop Enclosure)
  • Storage
    Samsung Evo 120GB (SATA3) x2
  • PSU
    (LAPTOP) 65Wh Charger
  • Display(s)
    12.5" FHD IPS
  • Cooling
  • Keyboard
    (LAPTOP) White LED Backlight
  • Mouse
    Horrible touchpad
  • Sound
    Horrible Downfiring Speaker
  • Operating System
    Windows 10 RS4 Education License
  1. Do you know what's hilarious? They didn't block some of the adults manga sites which has child pornography contents thing. Also the site admins keep changung urls. Even if its blocked, we can still visit the sites using free vpns, browser integrated vpn(like one in opera), proxys, google data saver and someone even came up with the idea of putting blocked url in google translate! Smart kid lol And it didn't solve the fundemental problems. I mean we all know about tor network and torrents and the fact that there is some sort of propritary protocols used to sell and buy drugs, hire someone etc. lol
  2. Good for you... I agree that government should block illegal drugs, crimes(like assassination) or child pornography but we are blocking even the torrents sharing sites and manga sharing sites. Now I have to wander around bit more to get xp iso.
  3. I already have it on my pc and android phone and tablet. I'm using cloudflare's dns service. (The I've also installed vpn server on aws instance (what a impractical use of aws lol)
  4. Oh speaking of dns, the Korean goverment is now sensoring out illegal contents both over http(using dns) and https(via listening to sni field and packet intercepting). This can't be solved unless we use vpn. This applies to all isp (i think only on consumer ones) and forced by governments. It's hard to explain with my english skills but it's like having a great firewall of china in korea. (Except we don't sensor out the political opinions.....YET)
  5. Yeah i use vpn from time to time because of this. Btw, some said changing the dns didn't work
  6. This is the log. Red box is user, blue box is the isp monitoring server, and green is the original destination (like google.com)
  7. I use the router ap hub combo unit from isp, but this applies even if we use other routers from... say asus, dlink etc
  8. I know! It's normal for them to not be able to see whats connected. Some guy analyzed the packets and he found out isps actually intercepts the webpage, sends the client some code. Client calculates the unique code and sends it to isp (the intercepted server) thinking they are sending data to real server. Then isp uses this info to distinguish clients and redirect client if they exceed the limit of connected devices. This doesn't work on https (i think) , other protocols such as ftp. They allow mobile agents to connect and communicate freely even on http. It's kinda insane to see isp actually intercepting the webpage (this is mitm attack after all) and collecting user data. The data being collected are: - OS information - Browser info - Network (ip address) info using WebRTC vulnerability (to see if user is on private ip or public ip) - GPU info using WebGL (this is just an assumption) - Some other info he couldn't find out https://gist.github.com/HelloKS/6631237f7f8f51bbd8c0b3e31b022854 This is raw data with sensitive info hidden. Does your isp do this to you?
  9. I forgot to mension this. WE ARE BEHIND THE ROUTER. Our devices get private ip addresses from the router(ap hub combo thing) and the router gets one public ip address.
  10. Hope nobody thinks i live in NORTH KOREA
  11. Does your ISP limit the devices connected to the internet? I live in SOUTH Korea, and it's kind of a norm for the isp to block the internet if too many devices are connected simultaneously. They usually allow upto 2-3, but starts to block the device starting from the 3rd or 4th device. This doesn't botter me very much since this usually happens on pc. And even if you are on a pc they only blocks http protocols so you can still surf the web with https protocol or use other protocols to communicate. I think they are intercepting the plain http connection, monitor the mac or user agent or something to distinguish the users and block if they reach certain point. I'm not very angry about them because the internet subscribtions here are sooooo cheap (you can get 10gbe lane for 80bucks a month if you have access to ftth lane or 27 bucks for full gigabit internet. Yes these both are consumer subscribtions) but still annoyed a bit. Do you have some kind of limitations from your isp?
  12. This is what I think. Key management should be the only way to controll complexness of security or recovery process. No backdoors should be enabled. We can't really do much about unintended backdoors (or securoty holes). Instead, we should take a deep look of codes and improve security as fast as possible.
  13. For normal people, standard encryption WOULD be enough. Personal photos, videos etc. Afterall, who cares about my family photos anyway? But you don't use your external drives for only that purpose. You could be carrying some company's top secret documents. (In this case, most of companies provide their own encryption method to secure their properties, though) You could be carrying some exgirlfriend pictures. Even some nasty videos you don't want to be known in public. Whatever it is, I think you should use decent encryption. Store your recovery keys somewhere safe. The flexiblility is up to your key management. That's what sould be controlled, not the backdoors. The moment you enable backdoors, that ata are no longer protected. You mentioned server security. Google and facebook has THE MOST SECURE INFRASTRUCTURE in the world. But it is the BACKDOOR or SECURITY HOLES that's leaking the personal informations and make up the headlines. The possibilities of cracking in should be removed as much as possible. If you want flexible security, than store your keys and backupkeys in multiple locations. Store it on your phone, cloud, stucky notes, whiteboard, you name it. It is up to them. Purpose of recovery keys is to make your life bit more easier when you loose password. You shouldn't compromise the security and make it easier to break into your data. No matter what you are storing, this should be clear. Hardwhere compromise. Sure. This is big thing. Than shut it down. No one except for goverment won't be able to extract password from your ram. Encrypt your hard drive. Enforce selinux. Disable recovery pins. There's so much things you could do to make your data more secure.
  14. Hm... thought trucrypt is safe. Maybe forks aren't safe anymore....
  15. Whoa thats long. Perhaps I really am being too serious about this thing. Maybe I really overlooked the advantages of backdoors.