fuzzychef, to random
@fuzzychef@m6n.io avatar

If you have hosted with , you need to check your mail from them. They are eliminating the mailbox service at the end of this month; any domains where you were hosting email at Gandi, you need to get an email account elsewhere.

sebsauvage, to random French
@sebsauvage@framapiaf.org avatar

#DNS #arnaques
Exemple d'arnaque basée sur la ressemblance de caractères dans Unicode:
https://sebsauvage.net/links/?I68Xzg

Vous voyez la différence ?
keepass.info
ķeepass.info

Présenté comme ça c'est facile à voir, mais dans une utilisation quotidienne on peut facilement passer à côté.
Surtout quand c'est le premier lien renvoyé par Google quand vous recherchez Keepass (merci Google ! :blobglare: )

jschauma, to random
@jschauma@mstdn.social avatar

Here's your regular reminder that by picking a cutesy name under some #ccTLD you are necessarily relinquishing full control to the ccTLD owner. @violetblue found out about that when Lybia shut down her vb.ly back in... 2010 or so? Now here is @GossiTheDog noting that queer.af was suspended by the Taliban.

Don't register your domains under a repressive regime's #TLD.

https://mstdn.social/@GossiTheDog@cyberplace.social/111918426534026789

#DNS #censorship

pgl, to random

40 years ago in November 1983, RFCs 882 and 883 were published.

Happy birthday #DNS.

https://datatracker.ietf.org/doc/html/rfc882

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Microsoft wants to lock your #DNS resolution to Microsoft-only and Microsoft-approved systems. https://arstechnica.com/security/2024/05/microsoft-plans-to-lock-down-windows-dns-like-never-before-heres-how/

rysiek, to random
@rysiek@mstdn.social avatar

If #DNS is so great, why is there a .int, but not a .float, .char, or .double? 🤔

huguei, to random

We have new KSK for the root!
Today a mega ceremony was held where new HSMs were introduced and a new root key was generated in them. This key will be pre-publicated at the end of this year, and the rollover will be at the end of 2026. It'll be the third in the history of the DNS. The first was in 2010 and the second in 2017. #dns #dnssec

A TV screenshot of two HSMs
A person holding a box with cryptographic keys inside.

nlnetlabs, to security
@nlnetlabs@fosstodon.org avatar

Coordinating and responsibly disclosing today’s two #DNSSEC #security vulnerabilities has been a huge coordination effort amongst researchers, #DNS implementers and early-access testing by our collective customers. It is a true testament to #OpenSource security and resilience. Our thanks go out to everyone involved! 💚🛡️💚 https://nlnetlabs.nl/projects/unbound/security-advisories/

nygren, to random

Woohoo! #IETF #RFC9460 has been published: "Service Binding and Parameter Specification via the #DNS (#SVCB and #HTTPS Resource Records)". https://www.rfc-editor.org/rfc/rfc9460.html

Thank you to everyone has supported and contributed to this over the past almost nine years since the initial seeds were planted during discussions at a TLS 1.3 interim meeting.

SVCB has potential to have substantial impact across a wide range of Internet protocols. I'm thrilled to see how many drafts are already building on it.

mro, to random German
@mro@digitalcourage.social avatar
sebsauvage, to random French
@sebsauvage@framapiaf.org avatar

#dns #censure #copyreich
Bonne nouvelle !
Quad9 a fait appel au jugement et a gagné. Ils n'auront pas l'obligation de filtrer.
https://sebsauvage.net/links/?g2VZdg

mahtin, to random

Still funny. #DNS

InfobloxThreatIntel, to Cybersecurity

Hi. This is Renée, the head of Infoblox Threat Intel (@knitcode). Myself and a few of my researchers are sharing this Mastodon account. Our plan is to toot about suspicious and malicious activity in DNS. Our team tends to write very in-depth papers and want to use Mastodon to complement that with nuggets we've seen, updates on the DNS threat actors or TTPs we are seeing, and articles we are reading. Here goes!

kuketzblog, to ads German
@kuketzblog@social.tchncs.de avatar

Tipp Nr.18: Eine einfache Möglichkeit, Werbung und Tracker auf Android bzw. iOS systemweit (in allen Apps) auf Eis zu legen, ist die Blockierung über einen DNS-Anbieter. Das geht ganz einfach und ist gerade für Anfänger/Einsteiger super geeignet. In 5 Minuten ist alles erledigt (inkl. Lesen).

https://www.kuketz-blog.de/fuer-anfaenger-bequeme-werbung-und-tracker-unter-ios-android-systemweit-verbannen/

TheFederatedPipe, (edited ) to technology in YouTube can't stop showing me AI deepfake ads

@McDropout

How to block #ads on #Android

Block ads on the web: Firefox + uBlock Origin.

A must have, if you want to browse the web without ads, trackers, malware and more. There are other browsers you could use, but with #firefox, you can install add-ons to help you mitigate all the tracking and ads. You can even install desktop only add-ons now, and supporting a engine which is not #chromium (controlled by Google) like every other major browser.

There are multiple forks available on the F-droid if you don't want to use plain firefox. This works on desktop too, I recommend #LibreWolf.

Block ads on any app with: #TrackerControl.

My favorite way of blocking ads, you have control over which domain the app can connect. It works like a VPN, but it does not make any outgoing connection. The bad thing is, if you want to use an actual #VPN, you can't have both at the same time and you need to disable your custom DNS.

I recommend to enable in settings > advanced options > block system apps, and individual domains too. When you open the app for the first time, it asks you if you want to block essential request for the apps to work, I recommend to enable this if you don't want apps breaking.

You android vendor may be killing the app, for this reason is necessary to add the app in the list of apps not be optimized by the system. If this issue keeps happening follow the guide from dontkillmyapp.com (advanced)

Official website: TrackerControl.org

Set a custom #DNS in the settings.

A DNS works like a translator, computers are good with numbers, but we are not good at memorizing long numbers. Computers communicate with each other using the Internet Protocol (IP), which are pure numbers. For example, your instance #IP is 104.26.8.209 but is easier to us just type lemmy.world.

A DNS is like a table where it has a relationship between keys pointing lemmy.world to 104.26.8.209, so your computer knows where is the computer is trying to connect.

Let's imagine an app is trying to connect to "https://ads-from.company.com", if you are using a DNS which blocks known domain ads it will redirect that request to "0.0.0.0" which is like sending it to a black hole. There are multiple DNS available, which different purposes, for ads, malware, porn, gambling, etc.

#Mullvand VPN has a guide in how to use their DNS for multiple devices.

Alternative front-ends.

Have in mind that these are not full bulletproof protections, one may work better than the other, and can break from time to time. With popular services with ads, like social media, you could use alternative front-ends to their official client or website.

Here is a list of alternative front-ends and an add-on to automatically redirect to them, you have to use it with a browser and you can add as a shortcut to the home screen, better if it works like a #PWA https://libredirect.github.io

Alternative apps

  1. YouTube: NewPipe, LibreTube, NewPipe x SponsorBlock
  2. Twitter: Squawker
  3. YouTube Music: Harmony Music
  4. Twitch: Xtra, Twire
sebsauvage, to random French
@sebsauvage@framapiaf.org avatar

📛 Liste de blocage DNS
⚠️ CHANGEMENT IMPORTANT.

Une des listes constitutives n'étant plus maintenue (merci à @jbs131 !), j'ai dû trouver de nouvelles sources.

Le contenu de la liste a donc pu substantiellement changer (même si on reste aux alentours des 469000 hosts).

La nouvelle liste a été publiée il y a quelques minutes.

Si vous découvrez des problèmes avec certains sites ou applications, n'hésitez pas à me prévenir.

https://sebsauvage.net/wiki/doku.php?id=dns-blocklist

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

We're happy to introduce Unbound 1.9.3. This a bug fix release of our resolver, fixing a smörgåsbord of small issues. https://nlnetlabs.nl/news/2024/Mar/14/unbound-1.19.3-released/

ianonymous3000, to privacy
@ianonymous3000@mastodon.social avatar

🔒 #Privacy enthusiasts, take note!
@privacytests has released a new category in its evaluations: 'DNS Privacy Tests'. Most browsers fail to encrypt DNS queries, leaving user data exposed in many countries - exceptions: @mullvadnet & @torproject

Again, both are Firefox-based.

#opensource #privacytests #firefox #dns #mullvad #tor

booteille, to random French
@booteille@framapiaf.org avatar
Grausicht, to random German
@Grausicht@mastodon.social avatar

Weil die deutschen Netzbetreiber in vorauseilendem Kadavergehorsam #scihub blocken:

Quad9 | A public and free #DNS service for a better security and privacy
https://www.quad9.net/

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

Leading up to a major announcement, @alexband and @benno want to set the stage by laying out our vision for #DNS and our #OpenSource product strategy for the next five years. #Rust #rustlang #MemorySafety https://blog.nlnetlabs.nl/the-next-five-years-of-dns-at-nlnet-labs/

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

Today we released Unbound 1.20.0. This release has a fix for the DNSBomb issue CVE-2024-33655, which had a low severity for our #DNS resolver. https://nlnetlabs.nl/news/2024/May/08/unbound-1.20.0-released/

kuketzblog, to android German
@kuketzblog@social.tchncs.de avatar

Die Empfehlungsecke wurde sprachlich und inhaltlich komplett überarbeitet. Schaut doch mal rein und hinterlasst euer Feedback. Boost gerne, damit sich das Wissen um die Existenz der Empfehlungsecke weiter verbreitet.❤️

https://www.kuketz-blog.de/empfehlungsecke/

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

We plan to implement #JSON output in our #DNS investigation tool dnsi. There is informational RFC 8427 for representing DNS messages in JSON, but we’d like to see if there is a more ergonomic way of representing such a format. We'd love to hear about your use cases and wishes. https://github.com/NLnetLabs/dnsi/issues/12

status_updates, to random

The problem where unresolvable DNS records were still resolving has been resolved. Unresolvable records now remain unresolved so this is now solved.

#dns #itsalwaysdns

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines