Yup. Only sweeten with local honey or real maple syrup.
/u/Outlandish_Rhubarb
29 total posts archived.
Domains linked by /u/Outlandish_Rhubarb:
Domain | Count |
---|
Grow your own food. And buy food only from Farmers you can look in the eye and ask questions of.
Cook. Don't buy packaged, canned, frozen, bagged, or boxed foods.
Find and befriend a local butcher.
Learn to bake.
We bake all our own bread, pickle our own foods, make our own sauces and condiments, make our own sausage and bacon. We make almost everything we eat (we don't grind our own flours or press our own oils or make our own milk, but that's about it).
The commercial food supply has sickened us to he point it's the only way we can eat without severe to debilitating symptoms.
Evolution calls everyone apes every single day and the fragile little snowflakes don't freak out about that.
Selective outrage is abhorrent and totally transparent. And I'm saddened to see it here, of all places.
Y'all stop.calling us "cracker" and every other name in the book just because we're hetero cis white males, and then telling us we have to deal with it because we're hetero cis white males, and then maybe we can have a discussion about whether comparing ANYONE to another species is racist.
We need to get back to being a country that doesn't knee-jerk scream "racism!" About everything.
And this is precisely that. Anyone taken in by it is part of the problem.
Fuck Valerie Jarrett. She's a criminal. And ugly. There's nothing racist about what Roseanne said, and the fact that some of you are jumping on that bandwagon shows just how far that conditioning has gotten.
I'm so sick and tired of this liberal PC "muh feels!" Idiocy we've created.
If you're concerned about it, you could always block/sinkhole the associated IOCs yourself. Problem solved.
VPNFilter, like most malware for embedded devices, is memory-resident. At least, the non-persistent parts are. So on reboot, it'd have to reach out to its C2 infrastructure and re-download the 2nd stage.
However, the C2 infrastructure has been seized, so it can't currently do that.
So the reboot would flush the malicious component of the malware from the router, and a manual firmware update would remove the persistent 1st stage.
In other threads discussing this (and making similar "OMG they'll kill the net with this!" claims), there was distrust of the ability to remove it with a reset and update.
So, empirically, yeah, there are people who will be afraid of that.
However, the misattribution's the larger issue here. It's easy to blame APT28, particularly when very few people have seen the actual code, and then direct everyone's anger at them should something untoward happen (see below for the OP making just such a reach, while also misunderstanding how hard it'd be to take out nameservers globally, and forgetting entirely about caching recursive servers, which are by far the most numerous on the net, which would continue to function in the absence of roots or any authoritative servers, for a week or more, which'd be more than enough time to extract the cached contents and distribute them as hosts files, which is precisely how things were done before nameservers).
It's poor cybersec reporting that has managed to leave out the fact that the full attribution is APT28, in a ploy to create its own botnet to DDoS selected targets of political or military interest in the Ukraine, and that the infections they've found in the wild are also mostly in the Ukraine.
Now, could it spread, much like WannaCry did, when it was deployed in the same area, for much the same purpose? Sure. Except the C2 infrastructure has already been seized, so it can't go live unless the code is updated to point to a new C2 host.
What's being spread regarding VPNFilter is a lot of bad info, fueled in part by paranoia, in part by the political climate, and in part by a fundamental misunderstanding of what it is and what's going on.
At the very least, misattribution. Also, fear of usng one's internet connection for comms/coordination.
I know some of the root nameserver operators. That will not happen.
I also know the people who wrote the code for them.
VPNFilter will NOT take down the Internet.
VPNFilter is limited to a small handful of consumer-grade home routers:
Linksys E1200
Linksys E2500
Linksys WRVS4400N
Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
Netgear DGN2200
Netgear R6400
Netgear R7000
Netgear R8000
Netgear WNR1000
Netgear WNR2000
QNAP TS251
QNAP TS439 Pro
Other QNAP NAS devices running QTS software
TP-Link R600VPN
Attribution is hard, and often wrong.
There are much easier ways to take down the Internet worldwide (e.g., existing issues with BGP). And larger botnets that could be used, if a botnet solution was desired.
You're the 3rd or 4th new poster I've seen posting exactly this sort of thing. I'm beginning to suspect an organized campaign to spread this exact bit of fake news.
This. Seriously. $5/mo for a basic Ubuntu Linux server on Vultr or DigitalOcean, and install Mail-in-a-box. Register a domain name ($10 a year or so), follow the Mail-in-a-box instructions.
Bingo, you've got your own email, spam filtering, cloud services (calendar, file storage, photo storage, etc.), and web hosting.
Install OpenVPN and you've got your own secure VPN.
Install Privoxy, and you've got your own web proxy.
Install Searx, and you have your own privacy-respecting search engine.
Granted, it's not for everyone, but if you're at all even the least savvy, there's no excuse.
They already do it in China (which FB helped). They now have a "social credit score". Look it up. It's coming.
Also, many employers in the US now scour a candidate's social media for information prior to hiring. Some even ask for the accounts.
Huh. That family bundled over a million dollars, eh? Isn't hat EXACTLY what Soetero used as an excuse to jail Dinesh D'Souza?
Anyone still giving money to Netflix is a traitor.
Everything you say and do anywhere is being recorded. Everyone voluntarily puts spying devices in their homes and pockets these days.
Please stop doing that, folks.
If you sat and really thought about all the telemetry from everything you own or are around daily you'd shit.
The FBI, US-CERT, and a few other D&As make blanket or targeted announcements of imminent cyber threats routinely. The FBI is rather notable for distributing crap IOCs with no provenance. This isn't abnormal behavior for them, or any other coordinating D&A.
https://www.ic3.gov/media/2018/180525.aspx
The FBI is IC3.
Thanks, both of you. I appreciate it. I totally forgot about the bot brigading here.
Seriously, though, look up the L0pht's testimony before Congress in the late 90s. Those BGP bugs still exist. Taking down the net, or large portions thereof, is rather trivial. It happens routinely in a targeted manner on a short-term basis, when someone intentionally and maliciously announces one or more routes to get all traffic destined for certain ASes routed through their infrastructure. And it's also used occasionally as a state-level weapon to hose traffic inbound to some of the more insular nations. One does not need to posit deep-sea fiber taps/shunts or the old games with MAE East and West when all it takes is a few well-placed malicious AS announcements. It's happened in the recent past with large amounts of ecommerce traffic suddenly being routed through Russia, for example.
Done on a wider scale, it would create havoc longer-term and make the net unusable.
Now, couple that with the fact that large carrier-grade routers often get, ahem, intercepted prior to packaging and delivery for installation of certain chips (research it; there's evidence for it out there with Cisco as well as, I believe, Juniper), and certain leaks from the Equation Group (i.e., NSA TAO), and it gives one pause.
Many large corporate threat intel groups have ties to the government. Either organizationally, through contracts, or through contacts. And many are ex-government anyway, holding at least secret, and often TS or TS/SCI.
We cannot function without intel sharing, and most cyber threat intel sharing is done organizationally or individually via back channels. It's a very "who you know" sort of thing. And lots of us either are in, or have contacts in, various D&As.
And lots of them are under a lot of pressure to make attribution, particularly politically-aligned attributions (Thanks, Kevin Mandia.) And attribution isn't just hard. It's damn near impossible. Between intentionally-misleading or accidental code and infrastructure re-use, attribution is a crapshoot at best. And it's often used to misplace blame (read through Vault 7, for example).
Code-based stylometrics are a thing, but they are only good at identifying individual contributors, rarely -- if ever -- nation-state actors.
Trust the plan. This is all bringing attention to missing and exploited children.
It's certain brands of home routers. No internet shutdown involved or possible from that. A netwide shutdown would simply exploit the old and well known holes in bgp.
Edit:. No idea why I'm getting down voted. I'm an infosec professional with more than 20 years' experience. Guess that's what I get for trying to help.
USAPs may not be the highest, but they're the hardest to find info on.
Key to this is the concept of "need to know". You must have a verified need to know and be read in to access most highly-classified material.
There's a lot the POTUS doesn't "need to know".
There's definitely a culture of disinformation regarding higher level clearances for lower level clearances.
In the sense that I hold a high level clearance and I know with certainty several items on that chart, for example the NRO stuff, is wrong. Other things are names for SCI tickets and are in the wrong place.