photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

246
active users

#quad9

1 post1 participant0 posts today
Kevin Karhan :verified:<p>Thx <span class="h-card" translate="no"><a href="https://ohai.social/@lina" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lina</span></a></span> for exposing the <a href="https://infosec.space/tags/Copyrightmafia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copyrightmafia</span></a>'s <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a>-based <a href="https://infosec.space/tags/internetcensorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetcensorship</span></a>:<br><a href="https://cuiiliste.de" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cuiiliste.de</span><span class="invisible"></span></a></p><ul><li>I really should test the <a href="https://infosec.space/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> more: <a href="https://api.cuiiliste.de" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">api.cuiiliste.de</span><span class="invisible"></span></a></li></ul><p>As for circumvention: Just use <a href="https://infosec.space/tags/OpenNIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenNIC</span></a>'s <a href="https://github.com/greyhat-academy/lists.d/blob/df41ea6a5320f0a895b801145efe0ea6d2e9ea33/dns.servers.list.tsv#L2" rel="nofollow noopener" target="_blank">DNS servers</a>...</p><ul><li>Personally <a href="https://lina.sh/blog/cuii-gives-up" rel="nofollow noopener" target="_blank">I'm not as enthusiastic</a> as to claim <a href="https://infosec.space/tags/CUIi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CUIi</span></a> <a href="https://netzpolitik.org/2025/die-cuii-gibt-auf-fuer-netzsperren-braucht-es-jetzt-einen-gerichtsentscheid/" rel="nofollow noopener" target="_blank">is done</a> because not only ain't they forced to remove any blockages but also they marginally changed their process.</li></ul><p>The sheer <a href="https://infosec.space/tags/Zensursula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zensursula</span></a>-Style bullshit <em>is the <a href="https://infosec.space/tags/IllicitActivity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IllicitActivity</span></a></em>! <a href="https://infosec.space/tags/ISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISP</span></a>|s should have <em>no right to interfere with any traffic</em> (except to defend their own infrastructure from getting hacked) unless explicitly requested by customers to do so.</p><ul><li>And now <a href="https://infosec.space/tags/ISPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISPs</span></a> like <a href="https://infosec.space/tags/O2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>O2</span></a> want to sell <a href="https://infosec.space/tags/TechIlliterate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIlliterate</span></a> <a href="https://infosec.space/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> clients the idea that fucking around with <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> is somehow <em>"<a href="https://infosec.space/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a>"</em> for which they want to <a href="https://www.o2business.de/cloud-sicherheit/cybersicherheit/webguard/" rel="nofollow noopener" target="_blank">charge clients a premium and make it opt-out!</a> when <span class="h-card" translate="no"><a href="https://mastodon.social/@quad9dns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>quad9dns</span></a></span> offers the same <a href="https://quad9.net/service/threat-blocking/" rel="nofollow noopener" target="_blank">for free</a> [and I'm certain they just use <a href="https://infosec.space/tags/quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quad9</span></a>'s <em>filtered</em> DNS and slap CUII's <a href="https://infosec.space/tags/blocklist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocklist</span></a> <a href="https://api.cuiiliste.de/blocked_domains" rel="nofollow noopener" target="_blank">on top.</a>]!</li></ul><p>I do wish <span class="h-card" translate="no"><a href="https://mastodon.social/@ooni" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ooni</span></a></span> would take a look at the <a href="https://api.cuiiliste.de/blocked_domains" rel="nofollow noopener" target="_blank">CUII blocklist</a> and add that to their <a href="https://infosec.space/tags/OONIprobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OONIprobe</span></a> to test for.</p>
JdeBP<p>[…Continued]</p><p><a href="https://mastodonapp.uk/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a>, <a href="https://mastodonapp.uk/tags/GooglePublicDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePublicDNS</span></a>, and my ISP all appeared to respect their capped TTLs; having cache misses when the TTLs reached zero. Unsurprisingly.</p><p>I know, both from prior experience and having seen the code, that the on-machine cache respects its TTLs in like manner.</p><p>Anyone expecting this (quite conventional) behaviour would be greatly misled by CloudFlare, however.</p><p>Quad9 and Google Public DNS were better than <a href="https://mastodonapp.uk/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a>, in retention time or amount of re-population needed to fill every cache behind the anycast; but they with their more aggressive TTL capping got nowhere near as long an interval between cache misses that the on-machine cache has.</p><p>CloudFlare, however, in fact incurred cache misses multiple times per hour, at one point fetching anew on *all* of its caches after a mere 10 minute gap when the test was halted. The TTLs never even managed to count down to 41 days before there was a (sometimes global!) cache miss.</p><p><a href="https://mastodonapp.uk/tags/DomainNameSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNameSystem</span></a> <a href="https://mastodonapp.uk/tags/BendersTest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BendersTest</span></a></p>
JdeBP<p>[…Continued]</p><p>The pattern is not ideal, because the anycasting is of course determined by moment-to-moment circumstances; but the multiple descending series of TTL values revealed that:</p><p>My ISP had at least 3 caches behind 2 apparent IP addresses.</p><p><a href="https://mastodonapp.uk/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> and <a href="https://mastodonapp.uk/tags/GooglePublicDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePublicDNS</span></a> had at least 8 caches behind 2 apparent IP addresses.</p><p><a href="https://mastodonapp.uk/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> had at least 2 caches behind 2 apparent IP addresses, but it was not as simple as 1 cache per IP address. Sometimes they swapped, or gave identical results.</p><p>[Continued…] <a href="https://mastodonapp.uk/tags/DomainNameSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNameSystem</span></a> <a href="https://mastodonapp.uk/tags/BendersTest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BendersTest</span></a></p>
JdeBP<p>[…Continued]</p><p>Everyone properly counted down the TTLs.</p><p>Only the on-machine cache counted down monotonically as expected, however. The others had TTLs that counted down in the long term but jumped up and down in the short term.</p><p>There was a discernable pattern, thanks to the 10 second loop interval in my test. There were multiple series of descending TTLs, swapping in and out.</p><p>This pattern revealed that there are multiple caches behind anycast, even at my ISP; those caches not sharing data. They each get separately populated during the first few test loop iterations and re-populated.</p><p>[Continued…] <a href="https://mastodonapp.uk/tags/DomainNameSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNameSystem</span></a> <a href="https://mastodonapp.uk/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> <a href="https://mastodonapp.uk/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> <a href="https://mastodonapp.uk/tags/GooglePublicDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePublicDNS</span></a> <a href="https://mastodonapp.uk/tags/BendersTest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BendersTest</span></a></p>
JdeBP<p>[…Continued]</p><p>The on-machine cache capped the 42 day TTL down to 1 week, as documented.</p><p>There was no pressure to evict the resource record set, even though the machine was not dedicated to just the test and other use was being made of the on-machine cache. There was no cache miss at all after the first one.</p><p>My ISP's proxy DNS servers also capped the TTL down to 1 week, interestingly.</p><p>Only <a href="https://mastodonapp.uk/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> passed through the original 42 day TTL. The high TTLs might lead one to conclude that CloudFlare thus cached the longest and best. In reality it cached the shortest and worst, more on which in a moment.</p><p><a href="https://mastodonapp.uk/tags/GooglePublicDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePublicDNS</span></a> and <a href="https://mastodonapp.uk/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> capped the 42 day TTL the most aggressively, the former reducing to a couple of days, the latter to a mere 12 hours. They turned out to do better than CloudFlare, however.</p><p>[Continued…] <a href="https://mastodonapp.uk/tags/DomainNameSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNameSystem</span></a> <a href="https://mastodonapp.uk/tags/BendersTest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BendersTest</span></a></p>
JdeBP<p>[…Continued]</p><p>The latency of the on-machine server, the total transaction time, was always in single milliseconds after the single very first cache miss query.</p><p>The actual latencies of all of the <a href="https://mastodonapp.uk/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a>, <a href="https://mastodonapp.uk/tags/GooglePublicDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePublicDNS</span></a>, and <a href="https://mastodonapp.uk/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> public proxy DNS servers were in tens of milliseconds for cache hits.</p><p>My ISP's proxy DNS servers are 6 hops away, and also had an actual latency in the tens of milliseconds, but slightly shorter than those of the third-party ones. None of the third-party ones are in fact closer than 7 hops away. </p><p>The latency to the relevant content DNS server was in the hundreds of milliseconds, and the latencies of the third-party proxy DNS servers when they had cache misses were between this and twice this.</p><p>[Continued…] <a href="https://mastodonapp.uk/tags/DomainNameSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNameSystem</span></a> <a href="https://mastodonapp.uk/tags/BendersTest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BendersTest</span></a></p>
JdeBP<p>If you thought that using a third-party public resolving proxy DNS server gained you economies of scale because you shared a cache with other people, think again.</p><p>I ran Bender's Test (<a href="https://news.ycombinator.com/item?id=44534938" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.ycombinator.com/item?id=4</span><span class="invisible">4534938</span></a>) in a loop, once every 10 seconds, intermittently over a couple of days.</p><p>I added an on-machine resolving proxy DNS server on 127.0.0.1, my ISP's proxy DNS servers, and <a href="https://mastodonapp.uk/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a>'s, <a href="https://mastodonapp.uk/tags/GooglePublicDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePublicDNS</span></a>'s, and <a href="https://mastodonapp.uk/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a>'s 2nd IP addresses to Bender's set. </p><p>Results reveal that if one conflates latency with cache misses, or claims that there must be better cache hits compared to using one's own proxy DNS server on-machine (or even on-LAN), one hasn't a clue as to the quite different reality of these third-party public DNS servers.</p><p>In detail:</p><p>[Continued…] <a href="https://mastodonapp.uk/tags/DomainNameSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNameSystem</span></a> <a href="https://mastodonapp.uk/tags/BendersTest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BendersTest</span></a></p>
stfn<p>I switched my PiHole upstream DNS from Google to Quad9. Let's see how it goes and if I see any difference.</p><p>One less Google service in my house :zawadiaka:</p><p><a href="https://fedi.stfn.pl/tags/pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pihole</span></a> <a href="https://fedi.stfn.pl/tags/quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quad9</span></a></p>
Gemma ⭐️🔰🇺🇸 🇵🇭 🎐<p><span class="h-card" translate="no"><a href="https://mastodon.social/@bhasic" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bhasic</span></a></span> I’m already using a <a href="https://mstdn.plus/tags/Pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pihole</span></a> with filtered <a href="https://mstdn.plus/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a>.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@quad9dns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>quad9dns</span></a></span> <span class="h-card" translate="no"><a href="https://social.g2od.ch/@rapha3l" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rapha3l</span></a></span> <span class="h-card" translate="no"><a href="https://waldvogel.family/@marcel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>marcel</span></a></span> <span class="h-card" translate="no"><a href="https://ioc.exchange/@abuse_ch" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>abuse_ch</span></a></span> </p><p>Also this only applies to the <code>filtered</code> &amp; <code>secured</code> <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> servers.</p><ul><li><p>default filtered DNS by <a href="https://infosec.space/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a></p><pre><code>9.9.9.9<br>149.112.112.112<br>2620:fe::fe<br>2620:fe::9<br></code></pre></li><li><p>secured quad9 servers</p><pre><code>9.9.9.11<br>149.112.112.11<br>2620:fe::11<br>2620:fe::fe:11<br></code></pre></li><li><p>unfiltered quad9 DNS</p><pre><code>9.9.9.10<br>149.112.112.10<br>2620:fe::10<br>2620:fe::fe:10<br></code></pre></li></ul><p>See <a href="https://www.quad9.net/service/service-addresses-and-features" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">quad9.net/service/service-addr</span><span class="invisible">esses-and-features</span></a> for details.</p><p>The unfiltered ones do not filter any results, thus they should only be used for those that i.e. filter their results themselves.</p>
Marcel Waldvogel<p>6️⃣ <a href="https://waldvogel.family/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> hat eine Grafik, die den Einbruch des Internetverkehrs in Spanien und Portugal gestern visualisiert.</p><p>Ihre drei Serverstandorte waren scheinbar mit funktionierender Notstromversorgung ausgestattet. Im Gegensatz zu – mutmasslich – diversen Internetanbietern. Wie im Wallis werden da jetzt wahrscheinlich die Notfallszenarien an vielen Stellen nochmals überdacht.<br><a href="https://mastodon.social/@quad9dns/114416276417809952" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@quad9dns/1144</span><span class="invisible">16276417809952</span></a></p>
Max Resing<p>Received an email by the <a href="https://infosec.exchange/tags/NANOG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NANOG</span></a> mailing list in which they raise a pretty concerning thing: Apparently, <a href="https://infosec.exchange/tags/Spain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spain</span></a> started to intercept or nullroute certain IP addresses of <a href="https://infosec.exchange/tags/CDN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CDN</span></a> providers. The intent is to fight <a href="https://infosec.exchange/tags/piracy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>piracy</span></a> during <a href="https://infosec.exchange/tags/football" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>football</span></a> matches.</p><p>Do the people who pass the list of IP addresses even understand the significance of blocking a bunch of <a href="https://infosec.exchange/tags/CDN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CDN</span></a> networks of various providers? Seriously?! It <a href="https://infosec.exchange/tags/censors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>censors</span></a> access to tens of thousands of legitimate <a href="https://infosec.exchange/tags/websites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>websites</span></a> which is blatantly accepted as a <a href="https://infosec.exchange/tags/collateral" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>collateral</span></a> to help out some shady sports association in their <a href="https://infosec.exchange/tags/copyright" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>copyright</span></a>?</p><p>How much shadier can a decision be? Since this is a thing, maybe they can think about taking down entire regions in Spain the next football match?</p><p>The amount of collateral damage in the name of copyright is ridiculous. The <a href="https://infosec.exchange/tags/EuropeanUnion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EuropeanUnion</span></a> really has to step-up their game in addressing those concerning developments. I read about multiple such blatant decisions so far. Eyeing at you, <a href="https://infosec.exchange/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> and <a href="https://infosec.exchange/tags/Sony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sony</span></a>...</p><p><a href="https://infosec.exchange/tags/copyrightinfringement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>copyrightinfringement</span></a> <a href="https://infosec.exchange/tags/LaLiga" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LaLiga</span></a> <a href="https://infosec.exchange/tags/digitalsovereignty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalsovereignty</span></a> <a href="https://infosec.exchange/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a> <a href="https://infosec.exchange/tags/digitaleurope" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaleurope</span></a> <a href="https://infosec.exchange/tags/corporatepower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>corporatepower</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@DoctorBrodsky" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>DoctorBrodsky</span></a></span> <span class="h-card" translate="no"><a href="https://toot.wales/@woe2you" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>woe2you</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@miah" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>miah</span></a></span> given <a href="https://infosec.space/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> bowed before the <a href="https://infosec.space/tags/Contentmafia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Contentmafia</span></a> and censored <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> requests, I'll continue to recommend using <a href="https://infosec.space/tags/OpenNIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenNIC</span></a>'s Servers <a href="https://github.com/greyhat-academy/lists.d/blob/a4a7ccf70d8504ebbffd7e5fbcd5630294860434/dns.servers.list.tsv" rel="nofollow noopener" target="_blank">instead</a></p><p><code>94.103.153.176 &amp; 2a02:990:219:1:ba:1337:cafe:3</code> as well as<br><code>144.76.103.143 &amp; 2a01:4f8:192:43a5::2</code> </p><ul><li>If you <a href="https://mastodon.ie/@DoctorBrodsky/114251891439728473" rel="nofollow noopener" target="_blank">only add a single</a> <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv4</span></a> address, no <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> resolution will take place over said provider or worse even no IPv6 connectivity at all...</li></ul><p>I merely <a href="https://github.com/greyhat-academy/lists.d/blob/a4a7ccf70d8504ebbffd7e5fbcd5630294860434/dns.servers.list.tsv#L25" rel="nofollow noopener" target="_blank">retain quad9</a> on said list for archival purposes. I Yeeted <a href="https://infosec.space/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> aka. <a href="https://infosec.space/tags/ClownFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClownFlare</span></a> since they are a <a href="https://infosec.space/tags/RogueISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueISP</span></a>!</p>
RTN<p><a href="https://chaos.social/tags/DerStandard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DerStandard</span></a>:<br>"<br>Trumps Kürzungsrausch gefährdet für das Internet wichtige Open-Source-Projekte</p><p>Die neue US-Regierung entzieht dem Open Technology Fund die Mittel. Von diesem sind unter anderem Let’s Encrypt, Tor und F-Droid finanziell abhängig. Der OTF hat Klage eingereicht<br>"<br><a href="https://www.derstandard.at/story/3000000263520/lets-encrypt-tor-trump-kuerzungen-gefaehrden-fuer-das-internet-wichtige-open-source-projekte?ref=article" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">derstandard.at/story/300000026</span><span class="invisible">3520/lets-encrypt-tor-trump-kuerzungen-gefaehrden-fuer-das-internet-wichtige-open-source-projekte?ref=article</span></a></p><p>30.3.2025</p><p><a href="https://chaos.social/tags/FDroid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDroid</span></a> <a href="https://chaos.social/tags/LetsEncrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LetsEncrypt</span></a> <a href="https://chaos.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://chaos.social/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVPN</span></a> <a href="https://chaos.social/tags/OTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTF</span></a> <a href="https://chaos.social/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> <a href="https://chaos.social/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://chaos.social/tags/Tails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tails</span></a> <a href="https://chaos.social/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://chaos.social/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a> <a href="https://chaos.social/tags/USAGM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USAGM</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.sdf.org/@freeagent" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>freeagent</span></a></span> <span class="h-card" translate="no"><a href="https://toot.community/@VTDARKSIM" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>VTDARKSIM</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@miah" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>miah</span></a></span> </p><p><a href="https://infosec.space/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> self-censored their <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> and <a href="https://infosec.space/tags/ClownFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClownFlare</span></a> is a <a href="https://infosec.space/tags/RogueISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueISP</span></a>!</p><p><a href="https://infosec.space/@kkarhan/114201410030390264" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.space/@kkarhan/1142014</span><span class="invisible">10030390264</span></a></p>
Joaquim Homrighausen<p>If you're not running your own DNS resolver, and/or not running PiHole, changing your DNS from 8.8.8.8 to 9.9.9.9 is a good first step 😉 </p><p><a href="https://mastodon.online/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://mastodon.online/tags/infrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infrastructure</span></a> <a href="https://mastodon.online/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.online/tags/quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quad9</span></a> <a href="https://mastodon.online/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://mastodon.online/tags/tcpip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tcpip</span></a> <a href="https://mastodon.online/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pihole</span></a></p>
adfichter 🖋<p>The same happens again... Now France's Canal+ wants a privacy-friendly Swiss DNS-Resolver to block certain websites. The court rouling from Germany (against Sony) doesn't matter.</p><p><a href="https://chaos.social/tags/quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quad9</span></a> <a href="https://chaos.social/tags/dnsresolver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnsresolver</span></a> </p><p><a href="https://quad9.net/news/press/quad9-faces-new-dns-censorship-legal-challenge-in-france-from-canal/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">quad9.net/news/press/quad9-fac</span><span class="invisible">es-new-dns-censorship-legal-challenge-in-france-from-canal/</span></a></p>
<p><a href="https://earth.law/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> is a <a href="https://earth.law/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> minefield. Here's my best shot at charting a safe course through. </p><p>New <a href="https://earth.law/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> post up now re: combining <a href="https://earth.law/tags/AdGuardHome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdGuardHome</span></a> with rotating stable of <a href="https://earth.law/tags/DNSCrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSCrypt</span></a> resolvers, with <a href="https://earth.law/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a> <a href="https://earth.law/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> over <a href="https://earth.law/tags/Mullvad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mullvad</span></a> exit nodes, and <a href="https://earth.law/tags/Caddy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Caddy</span></a> obtaining certificates for <a href="https://earth.law/tags/DOH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOH</span></a> — <a href="https://sij.law/dns/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sij.law/dns/</span><span class="invisible"></span></a></p><p><a href="https://earth.law/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://earth.law/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://earth.law/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://earth.law/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://earth.law/tags/hetzner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hetzner</span></a> <a href="https://earth.law/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> <a href="https://earth.law/tags/pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pihole</span></a> <a href="https://earth.law/tags/unbound" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unbound</span></a> <a href="https://earth.law/tags/macos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macos</span></a> <a href="https://earth.law/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://earth.law/tags/DNSOverride" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSOverride</span></a> <a href="https://earth.law/tags/DeepDive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeepDive</span></a> <a href="https://earth.law/tags/LittleSnitch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LittleSnitch</span></a> <a href="https://earth.law/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> <a href="https://earth.law/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> #9999</p>
Michał "rysiek" Woźniak · 🇺🇦<p>If you are at the <a href="https://mstdn.social/tags/GlobalGathering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GlobalGathering</span></a> in Estoril and would like to learn more about <span class="h-card" translate="no"><a href="https://mastodon.social/@quad9dns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>quad9dns</span></a></span> – or are already using it and just want to say hi! 👋 – come to the <a href="https://mstdn.social/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> booth on Sunday at 15:30 in Booth 13.</p><p>I'll be there.</p><p>There will be stickers.</p>
Michał "rysiek" Woźniak · 🇺🇦<p>I am at the <a href="https://mstdn.social/tags/GlobalGathering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GlobalGathering</span></a> in Estoril, Portugal this weekend, and have booths about <a href="https://mstdn.social/tags/LibResilient" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibResilient</span></a> (Saturday, 15:30 - 17:30) and about <a href="https://mstdn.social/tags/Quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quad9</span></a> (Sunday, 15:30 - 17:30).</p><p>If you're there as well, come say hi!</p>