Deutsch   English   Français   Italiano  
<vjg25u$1bgn$1@nnrp.usenet.blueworldhosting.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: "Edward Rawde" <invalid@invalid.invalid>
Newsgroups: sci.electronics.design
Subject: Re: Win11 explorer bug?
Date: Thu, 12 Dec 2024 20:21:01 -0500
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Lines: 151
Message-ID: <vjg25u$1bgn$1@nnrp.usenet.blueworldhosting.com>
References: <qieclj5ca2dsc2fnpufpg51fn7qt0u2peh@4ax.com> <vj6im4$cf7f$1@dont-email.me> <dcselj96kvngr6gid7mje3phabj2sp876t@4ax.com> <vj91de$t4hr$2@dont-email.me> <jcoglj5c0cmprqek68tah1euht1amhu9ko@4ax.com> <vj9q8g$11i0t$2@dont-email.me> <13vgljdqp79a2onuijph2om08fk99u2fdm@4ax.com> <vjablv$14se5$1@dont-email.me> <addhljp8i0d5t42lavnd37a8e883ijhsqt@4ax.com> <vjaeii$14se5$2@dont-email.me> <gquhljd83745shtckfjgtd5u6iphkprprc@4ax.com> <vjblle$1fd6a$1@dont-email.me> <gsnjljdvnhu7m25ops26ek9lvca5eqvk2n@4ax.com> <vjec62$22pn8$1@dont-email.me> <vjefoe$23fh4$1@dont-email.me> <uj2r2lxum3.ln2@Telcontar.valinor> <vjennd$24vi6$1@dont-email.me> <vjeu9v$1k7v$1@nnrp.usenet.blueworldhosting.com> <vjf6rs$2rvlf$1@dont-email.me> <vjfdof$1d8$1@nnrp.usenet.blueworldhosting.com> <vjfg9k$2tnfq$1@dont-email.me> <vjfhrg$saj$1@nnrp.usenet.blueworldhosting.com> <vjfjul$2ufi0$1@dont-email.me> <vjfs1g$1iam$1@nnrp.usenet.blueworldhosting.com> <vjfvvb$310fn$1@dont-email.me>
Injection-Date: Fri, 13 Dec 2024 01:21:02 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
	logging-data="44567"; mail-complaints-to="usenet@blueworldhosting.com"
Cancel-Lock: sha1:32P7eJupsRaydi9GSpqMFww4wIs= sha256:VE9m9JC8vj/a0JqUo/UMcQzEK2McFXob1ayZO3P+zMs=
	sha1:XfN0dB+nYVPeqvnLUlZNmdWh6SQ= sha256:EMl0Bs/+aRY4R2DJXsLlvPf5iCRHoalPK1CX8tRiw4k=
X-Priority: 3
X-RFC2646: Format=Flowed; Response
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6157
X-MSMail-Priority: Normal
X-Newsreader: Microsoft Outlook Express 6.00.2900.5931
Bytes: 8753

"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjfvvb$310fn$1@dont-email.me...
> On 12/12/2024 4:36 PM, Edward Rawde wrote:
>>> Most users have banal needs for a firewall.  If running Windows hosts,
>>> then the filter in the host is even finer-grained than a filter in
>>> an external firewall (as the host-based filter can be tailored
>>> to specific applications).
>>
>> The host based filter is worthless if the user is administrator (like most Windows users are) because malware can 
>> configure/disable
>> the firewall as it likes.
>
> It's not going to suddenly decide that, e.g., PhotoShop needs access to
> the internet!
>
>>>> I don't permit outbound connections to a long list of countries.
>>>
>>> You're thinking two-dimensionally.  Your *neighbor*'s PC can be acting as
>>> a C&C node for a foreign actor.  Just like the camera INSIDE your "perimeter
>>> defenses" (WELCOMED in!) can act on behalf of some other agency.
>>>
>>> IP filtering doesn't buy you any real protection.
>>
>> It does if you watch the logs for anything unusual.
>
> Do you have more than one host?  Printer?  etc.  How many thousands of
> connections are you going to examine every day?

Automatic (python scripts in my case) examination of successful connections (ignoring anything blocked) takes a few seconds per day 
so that I can easily see anything out of the ordinary. Connection between anything on my network and another nearby IP on the same 
(or not far away) ISP would have been obvious.

>
> Windows machines typically run a whole slew of protocols, many of which
> have dubious GENERAL value.  Yet, disable one and you may find you've
> shutdown CIFS support.  Or, network discovery protocols.  Or...
>
>> A connection to a neighbor IP address would be obvious to me and I'd likely block it to see if anything legitimate breaks.
>
> So, you work for your computer!  Most folks want their computers to work
> for THEM!

See above.

>
>> Just like I watch who goes in and out of my house and who I give keys to.
>> Imagine owning a house where you can't tell who comes and goes or who has keys.
>
> Knowing who has keys tells you ONLY who has keys.  It tells you nothing
> of whether they are using them, have given them to someone else to use, etc.
>
> Do you really spend your waking hours watching all the lockable doors on
> your property?  AND, connections to your computer(s)?

See above. Security personnel are generally trained to watch for anything unusual.
Knowing whether a complete stranger has entered your house is all that's needed.
It is of course best that they stay locked out.

>
>> That's how it is for most people online and they aren't interested in knowing more, except perhaps briefly after the ransomware
>> cleanup.
>
> A simpler solution is simply not to have anything "stealable" on a machine
> that can be compromised.

A better solution is not to get anything compromised.

>
> If you could commandeer THIS machine, remotely, you could look to see
> who I correspond with.  And, what I've downloaded, recently.
>
> And, that's about it!
>
> If you manage to install malware, then you could use it as a C&C node to
> manipulate other machines -- machines that I don't own (because the only
> other thing on this network is a printer and the modem).
>
> And, at the next semi-annual review, I will discover your malware
> and remove it -- along with taking steps to protect against reinfection
> (e.g., install the custom boot loader that I have on the laptop that
> wipes the OS each time I boot)

I wouldn't want to use a laptop which wipes the OS each time I boot.

>
>>>>> I "hide" my file server behind a particular "knock sequence" that is
>>>>> only known to folks who should need access to it.  Trying to probe
>>>>> the IP address gets you no information -- it looks like there isn't
>>>>> a machine AT that IP address.
>>>>
>>>> I don't see any additional value in this provided the file server is restricted to specific IP addresses or networks and the
>>>> connection is secure.
>>>
>>> Knowing that a server exists is information.  (esp if your AUP
>>> prohibits them!  :> )  Knowing that there is <something> sitting
>>> at an IP invites probes.
>>
>> Knowing that there's a house there is information.
>
> Who said there is a house?  :>  Who says it is (physically) *here*?
>
>> Or in the country I'm from, knowing that there's a castle there is information but if it's surrounded by a moat then good luck
>> getting in unseen.
>
> What difference if you can still get in and inflict whatever damage?
> Imagine trying to get OUT in the event of a fire... when the drawbridge
> mechanism fails?
>
>> Violation of the access protocol could get you an arrow or cannon ball up your somewhere in the past.
>>
>>> An address that never reacts to your actions is uninteresting.
>>> And, unless you can snoop the actual traffic, you can't know that
>>> the address is actually actively moving data!
>>
>> In many cases you can infer. 1.2.3.0/24 and if you know 1.2.3.20 is active then the rest are likely doing someting potentially
>> interesting.
>
> I have ~70 hosts in my office.  Yet, you'd be hard pressed to see more
> than one or two (despite not deliberately trying to "hide") simply
> because they are never ALL powered up (yet each needs a distinct
> IP so I can power up any subset of them).
>
> The advantage of an "internal agent" (like a pwn plug) is that it
> can run 24/7/365 and patiently collect data from its observations.
>
>>> Several decades ago, a "transformer" was installed on such a pole
>>> (why was it SUDDENLY needed, there?) outside from a business that
>>> sold "growing supplies" to folks who were suspected of being marijuana
>>> growers.
>>>
>>> The joke was that the transformer had NO wires (primary or secondary)
>>> attached to it.  And, a large, rectangular region that resembled a
>>> "window" -- on the side facing the business.
>>>
>>> "Gee, wanna bet that's a (really poorly disguised) camera??"  :>
>>
>> It must have been powered by something, even if everything else was wireless.
>
> A large battery.  The voltage present on the pole is ~11KV (14KV?) or more.
> Silly to design a surveillance device that has to accept those high voltages
> for power when you have all that volume to use for an energy store!
>
> (You can always come back to visit it a month later to replace the battery
> and retrieve the stored video footage!)

A camera system which requires me to go up a ladder to change the large battery and retrieve the footage doesn't sound like fun to 
me.

>
>