Products > Networking & Wireless

Ubiquiti Breach

<< < (3/5) > >>

Ranayna:
Well, considering that it is at least suspected that a large majority of TOR exit nodes are run bei various "Three Letter Agencies" i would not trust TOR all that much.
I would even think that it makes you especially suspicious. :p

On topic: In the past, despite not having had personal experience with Ubiquity hardware, i, and many IT people i know, often recommended it as consideration for affordable wireless products.
But since that breach i stopped doing that, and any consideration that i myself might upgrade to Ubiquity hardware had been stopped. When i learned that they now have started showing ads on the admin webpages of some of their devices i am really glad that i do not have anything made by them.

But this account bullshit is really becoming very common. There are Netgear switches that need a Netgear account to manage. There are now HP printers that need an HP account to set them up. And now Windows 11 Home Edition needs a Microsoft account. It's getting ridiculous, and the options for sane people get less and less.

PKTKS:

--- Quote from: Ranayna on September 30, 2021, 09:48:35 am ---Well, considering that it is at least suspected that a large majority of TOR exit nodes are run bei various "Three Letter Agencies" i would not trust TOR all that much.
I would even think that it makes you especially suspicious. :p
(..)

--- End quote ---

It may be mostly TRUE today..  reason I have even put aside my own relay..

But it was not like that a decade ago.
It became pretty clear that filthy hands got into the relays...

Nevertheless the amount of trouble and brute force they need to do is mostly worthless for the results..

Today I really give a shit for all that freak show  the agencies and mega corps are making..

Internet and software in general turned out like a serious anti-privacy surveillance monetizing paradigm ...

Reason such CLOUD buz fast ascending
And why obviously some targets are sweeter than others..

Politics and discrimination as usual

BTW running a relay or proxy may be suspicious for vicious minds trying to find targets 100% time..

Otherwise is just a plain proxy method like any other  being VPN or filter proxy

The world we live is sick and monetized 
Paul

madires:
Most of the popular VPN services are marketed as some kind of privacy shield which they aren't. Marketing nonsense, as usual. There are many ways to pinpoint a specific web browser profile, not matter if via direct internet access, NAT or VPN with public exit. And those pesky enforced online accounts aren't a good idea either. Why should I give a LAN switch or a printer internet access? To increase my attack surface? Ever heard of network security? The vendors claim that they care about privacy and security. Still they try to enforce an online account which won't work without internet access. :palm: ²

PKTKS:

--- Quote from: madires on September 30, 2021, 11:17:00 am ---(..)Still they try to enforce an online account which won't work without internet access. :palm: ²

--- End quote ---

Don't  forget as today: 
- an online "account" monitoring
-  a required TPM identify tutored agent
- a UEFI  "trusted" firmware.

Not so long ago mostly account and MAC (which can be tinkered)

But that would not scale and leverage tracking system surveillance

So competition can be tutored
Paul

madires:
Apparently it was an inside job:
Ubiquiti Developer Charged With Extortion, Causing 2020 “Breach”: https://krebsonsecurity.com/2021/12/ubiquiti-developer-charged-with-extortion-causing-2020-breach/#more-57755

Navigation

[0] Message Index

[#] Next page

[*] Previous page

There was an error while thanking
Thanking...
Go to full version