Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:ISP Privacy Invasion (Score 1) 273

Plenty of us who run ISPs have quite the opposite desire. If we're able to gather the data, we're easily served a "technical capability notice" to send that data off somewhere else. If we don't gather the data already then the cost of that is passed back to the body asking us to build that capability.

Comment Re: Typical authoritarian government (Score 3, Informative) 273

Pretty sure the lawyers I've spoken to who are specialists on this subject in the UK have said that if the ISP follows the order and blocks DNS on their resolvers, then the fact their customer might be using a VPN or DoH or similar privacy technology is *not* the ISP's fault.

Comment DNS privacy, for starters (Score 2) 231

The dprive (DNS PRIVate Exchange) working group formed — https://datatracker.ietf.org/w...

Thanks to that initiative, we've ended up with several different possible implementations: DNScrypt, DNS-over-TLS, and DNS-over-HTTPS.

DoH seems to have gained traction in browsers — with built-in support in Firefox — but also potentially could centralise DNS resolution in the hands of a few large cloud providers (like Mozilla's partnership with Cloudflare) https://developers.cloudflare....

Comment Re:Ban the lot of 'em (Score -1, Flamebait) 543

One neo-right knobber in the UK got banned from Twitter — https://www.theguardian.com/te...

And then complained that this is the reason why he didn't win a seat in the recent elections — https://metro.co.uk/2019/05/27...

Hey, Jack! It's almost like banning hate speech from Twitter works! =)

Comment Re:No need (Score 4, Informative) 214

ip6tables is a doddle to use, and assuming you have a new enough kernel pretty much all you'll need will be a variation upon:

ip6tables -A FORWARD -i lo -j ACCEPT
ip6tables -A FORWARD -i $lan_if -o $upstream_if -j ACCEPT
ip6tables -A FORWRRD -i $upstream_if -o $lan_if -m state --state ESTABLISHED,RELATED -j ACCEPT
ip6tables -P FORWARD DROP
sysctl net.ipv6.conf.all.forwarding=1

(NB: you probably want more than that, but assuming your $lan_if and $upstream_if have appropriate IPv6 subnets on, and everything is routing correctly, then you get "the same behaviour you used to" when you had your IPv4 NAT... only now you have "real" end-to-end connectivity)

Slashdot Top Deals

The clothes have no emperor. -- C.A.R. Hoare, commenting on ADA.

Working...