![](https://lemmy.cringecollective.io/pictrs/image/e28e7924-e083-4a2d-bd23-9edd290033a4.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
If the other traffic is already correlated to your IP, then what additional info does an ICMP echo leak?
If the other traffic is already correlated to your IP, then what additional info does an ICMP echo leak?
ICMP doesn’t reveal any personal details. As opposed to say when you visit with the web browser where you can be fingerprinted, and perhaps have that tied to the rest of your browsing history or real world identity.
BOFH: hooked up the mains to the doorknob and asked a luser to bring their laptop over for personal attention and repair.
dmesg | less
should allow you to scroll the output. You should use forward slash in less
to search for the devices (hit enter), see if the modules are being loaded or if there some errors.
check lsmod
before and after see what kernel modules are changing.
also look at dmesg
for interesting kernel messages as you attempt to use / not use the offending hardware.
tcpdump, wireshark can capture packets. haproxy can be a proxy of many networking protocols mitmproxy can help see encrypted traffic by acting as a literal man in the middle. ssh with certain parameters can become a SOCKS5 proxy to encrypt and tunnel traffic out of a hostile network
Partition
Brave browser does an okay job, but remember under the hood everything is just a re-skinned Safari browser. There are content blockers, but AdBlock sold out (allows ads) and uBlock Origin doesn’t work on iOS due to limitations Apple has in place.
Can you link to the data / source?
You can’t do that, you’re committing copyright infringement! Change game
to mygame
though, and you’re golden.
Is that backlog per community, or per server? Because I was able to subscribe to other communities from the same server. I’m not an expert on the ActivityPub protocol but I thought information was pulled from my server, not pushed from the remote.
There, their its are not it’s they’re its. It’s as simple as “its”, as it’s the its it’s.
But this user plans to leave ping running all the time to check that their own Internet connection is working.
Either way, at any given time there’s tons of traffic leaving your network, it just means that software is active, not that a human is active. On top of that, Cloudflare probably isn’t selling the fact that an ICMP ping was received at their DNS server directly to spammers quickly enough for them to act and put an email at the top of your inbox, assuming that spam isn’t caught by a spam filter first.