Everything is wrong with the US government.
Everything is wrong with the US government.
Tbf it’s a pretty damned easy shit test to pass, it’s quite telling when someone won’t even take a swing.
Well, Ukraine is definitely off the Christmas card list now, that much is certain. They’ll be lucky to even get a Happy New Year’s text at this point.
Do I smell a territory swap coming?
A lot of negativity around Ubiquity in here, which is surprising to me, honestly. I had their USG for years and loved it, recently swapped it out for the Dream Machine and love it. Really don’t understand the complaints about linking it to the cloud. I just didn’t bother, everything works fine. Additionally, I managed to get a Debian container running on it and installed ntopng, it’s been awesome for getting realtime visibility into my network traffic.
E. I should add I have 6 of their switches and 3 access points, one of which is at least 7 years old and still receiving updates.
Also used to track ransom notes, etc.
Engineering is engineering. You design it, you build it, you test it. Engineering. We shouldn’t gatekeep words.
With that said, I recognize that certain engineering disciplines have overlap with public safety, and should come with some qualifications to back it up.
Several comments about tires being the issue. I’ve driven through worse with a simple set of all-seasons - is there something special about EV tires that make them perform so poorly in these conditions?
It probably has to do with being native ipv6 and needing to ride a 6to4 nat to reach the broader internet.
Start at 1400 and walk the MTU down by ~50 until you find stability, then id creep it back up by 10 to find the ‘perfect’ size, but that part isn’t really needed if you’re impatient. :)
E. I found 1290 was needed for reliable VPN over an ATT nighthawk hotspot.
Latency plays a big role in throughput. If one download target was ‘closer’, i.e. lower latency, it will be able to scale the windowsize higher, therefore allowing more data to flow through for a given connection. Imagine network packets are envelopes and data is paper. Not all envelopes can carry the same amount of paper for a given connection, and the more paper you stuff in your envelope, the faster the transfer completes.
Your VPN doesn’t have the ability to strip user agent strings on HTTPS requests, this doesn’t seem VPN related imo.
That makes sense! Believe it or not it’s actually easier for an ISP to block a whole country than select websites and services. We actually null route all Russian public IP space where I work, that would absolutely be plausible on a national scale as well.
It’s imperfect, you can get around it, but it catches 99% of normal users, which is the goal.
You are absolutely correct, I should have lead with that. Encrypted client handshake means no one can see what certificate you are trying to request from the remote end of your connection, even your ISP.
However, It’s worth noting though that if I am your ISP and I see you connecting to say public IP 8.8.8.8 over https (443) I don’t need to see the SNI flag to know you’re accessing something at Google.
First, I have a list of IP addresses of known blocked sites, I will just drop any traffic destined to that address, no other magic needed.
Second, if you target an IP that isn’t blocked outright, and I can’t see your SNI flag, I can still try to reverse lookup the IP myself and perform a block on your connection if the returned record matches a restricted pattern, say google.com.
VPN gets around all of these problems, provided you egress somewhere less restrictive.
Hope that helps clarify.
Yeah, even if they miss your DNS request, the ISP can still do a reverse lookup on the destination IP you’re attempting to connect to and just drop the traffic silently. That is pretty rare though, at least in US, mainly because It costs money to enforce restrictions like that at scale, which means blocking things isn’t profitable. However, slurping up your DNS requests can allow them to feed you false error pages, littered with profitable ads, all under the guies of enforcing copyright protections.
Most ISP blocking is pretty superficial, usually just at the DNS level, you should be fine in the vast majority of cases. While parsing for the SNI flag on the client hello is technically possible, it’s computationally expensive at scale, and generally avoided outside of enterprise networks.
With that siad, When in doubt, VPN out. ;)
QSFP and SFP are different physical connectors, they are not interoperable.
You will still be able to use them completely offline after you complete the setup process, it’s in the article. Regardless, I only have a couple devices, so it’ll be pretty painless for me to rip em out.
Yeah, they seem to put a lot of energy into esoteric features, when the app is in serious need of some quality of life improvements. I donate a tiny monthly sum to the project and honestly feel conflicted about how effectively it’s being used.
I like the last one, I think having the status code in the body could help clarify where the error is coming from when traversing a reverse proxy.