![]() ![]() ![]() I've run quite a few firewalls from Fortinet, pfSense, Juniper, hand crafted Linux. I'm no real expert on IT security but I do have a Nessus license and a box to wield it from. Searching for the word "security" gets a discussion about SSL/TLS and some pontificating. If you skim read that thread from HN where I also learned about Rust Desk then there is no consensus about "sketchy". I've only cast a vague eye so far but it looks like it reuses quite a lot of well regarded stuff including VNC, so I'll take issue with "shady and sketchy". (the linked page contains several other less severe examples discovered about 2014-2016 I'm not in infosec anymore, so I'm not looking for this that much) This includes passwords in your clipboard. Īs another real-life example, I have discovered that Stardict scans clipboard by default and tries to translate what it finds there using an online dictionary. This is not entirely made up (only the exploit part), there was indeed an Audacity telemetry incident. Unfortunately, OpenSnitch probably cannot detect "Audacity has spawned wget and you have allowed wget, but only as a child of bash in your terminal launched from your DE startup script, not as a child of Audacity". For example, should there be an exploit for a MP3 parser in Audacity (presume that Audacity has no use for internet normally - at least that's my use case), it will probably try to download a second stage from the internet, and you want to block this. It also allows you to deny all internet access per-app. And then I have discovered that Thunderbird sends filenames and SHA-256 hashes of all received email attachments to Google (.url, ) and that it sends telemetry saying "you have disabled telemetry" when you disable telemetry. For example I have allowed only my mail servers for Thunderbird. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |