413 private links
Published 1997
Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolff
The Internet has revolutionized the computer and communications world like nothing before. The invention of the telegraph, telephone, radio, and computer set the stage for this unprecedented integration of capabilities. The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. //
In this paper,3 several of us involved in the development and evolution of the Internet share our views of its origins and history. This history revolves around four distinct aspects. There is the technological evolution that began with early research on packet switching and the ARPANET (and related technologies),
SAN DIEGO — A U.S. Navy chief who wanted the internet so she and other enlisted leaders could scroll social media, check sports scores and watch movies while deployed had an unauthorized Starlink satellite dish installed on a warship and lied to her commanding officer to keep it secret, according to investigators.
Internet access is restricted while a ship is underway to maintain bandwidth for military operations and to protect against cybersecurity threats. //
She and more than a dozen other chief petty officers used it to send messages home and keep up with the news and bought signal amplifiers during a stop in Pearl Harbor, Hawaii, after they realized the wireless signal did not cover all areas of the ship, according to the investigation.
Those involved also used the Chief Petty Officer Association’s debit card to pay off the $1,000 monthly Starlink bill.
The network was not shared with rank-and-file sailors.
Marrero tried to hide the network, which she called “Stinky,” by renaming it as a printer, denying its existence and even intercepting a comment about the network left in the commanding officer's suggestion box, according to the investigation.
Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly. It enables encrypted point-to-point connections using the open source WireGuard protocol, which means only devices on your private network can communicate with each other.
The Benefits
Building on top of a secure network fabric, Tailscale offers speed, stability, and simplicity over traditional VPNs.
Tailscale is fast and reliable. Unlike traditional VPNs, which tunnel all network traffic through a central gateway server, Tailscale creates a peer-to-peer mesh network (called a tailnet):
SIMPLE & INEXPENSIVE WEBSITE MONITORING.
Pricing
You only pay for what you use, check by check. 1 credit = 1 check.
For example, check 10 websites every 2 minutes from 1.83€/month (up to 5.49€/m)
Requests:
200,000 = 5€
500,000 = 10€
SMS alerts costs 7500 credits (≈ 0.10€) per message. ///
30 days of one check every 3 minutes = 1440/month
One of the most common pre-sales questions we get at rsync.net is:
"Why should I pay a per gigabyte rate for storage when these other providers are offering unlimited storage for a low flat rate?"
The short answer is: paying a flat rate for unlimited storage, or transfer, pits you against your provider in an antagonistic relationship. This is not the kind of relationship you want to have with someone providing critical functions.
Now for the long answer...
JCI now offers FreeBSD 11 Cloud Servers that provide significant enhancements over previous versions of FreeBSD. Under FreeBSD 11 you will be running a true virtual cloud server and not the more limited "jail" VPS. This allows complete independent server instances with on-the fly expandability, secure root access and custom backup capability.
Choose the server from our standard FreeBSD server plans below with the memory, disk, IPs, bandwidth and backup required to support your application.
Once we engineered a selective shutdown switch into the Internet, and implemented a way to do what Internet engineers have spent decades making sure never happens, we would have created an enormous security vulnerability. We would make the job of any would-be terrorist intent on bringing down the Internet much easier.
Computer and network security is hard, and every Internet system we’ve ever created has security vulnerabilities. It would be folly to think this one wouldn’t as well. And given how unlikely the risk is, any actual shutdown would be far more likely to be a result of an unfortunate error or a malicious hacker than of a presidential order.
But the main problem with an Internet kill switch is that it’s too coarse a hammer.
Yes, the bad guys use the Internet to communicate, and they can use it to attack us. But the good guys use it, too, and the good guys far outnumber the bad guys.
Shutting the Internet down, either the whole thing or just a part of it, even in the face of a foreign military attack would do far more damage than it could possibly prevent. And it would hurt others whom we don’t want to hurt.
For years we’ve been bombarded with scare stories about terrorists wanting to shut the Internet down. They’re mostly fairy tales, but they’re scary precisely because the Internet is so critical to so many things.
Why would we want to terrorize our own population by doing exactly what we don’t want anyone else to do? And a national emergency is precisely the worst time to do it.
Just implementing the capability would be very expensive; I would rather see that money going toward securing our nation’s critical infrastructure from attack.
Welcome to Hurricane Electric's Network Looking Glass. The information provided by and the support of this service are on a best effort basis.
ping, traceroute
video
NetChoice often argued out of both sides of their mouth when Section 230 protections were in play. During back and forth with NetChoice counsel, Justice Gorsuch observed that NetChoice’s argument was, conveniently, both sides of the coin:
“So it’s speech for the purposes of the First Amendment, your speech, your editorial control, but when we get to Section 230, your submission is that that isn’t your speech?
So now, the cases head back to the lower courts, who've been tasked with doing their homework and using the proper framework to analyze the issues. //
anon-7lqi anon-tf71
4 hours ago
i think administratively you can declare any platform with more that 25% market share as a "public square".
Public squares are obliged to allow speech that smaller venues do not have to.
keeps 230 intact. focuses the law on the companies large enough to impact the public in any meaningful way
JustCause_for_Liberty anon-7lqi
3 hours ago edited
I do not even think its that hard. They get to declare if they are publishers or platforms. If you are a publisher you get no protections from 230 and are subject to liability claims for all content. If you are a platform you get liability protections from 230 but lose all rights to moderate content from users or their speech and posts. If laws are broken from users then refer those to law enforcement. Otherwise its not their job.
Just FYI their self identification of publisher or platform is for the entirety of that service. You either have to sell the Company or completely shut down the service and deploy a completely separate service afterwards to redeclare.
Google says you can't turn off AI overviews in the main search engine. I'm still seeing the "Labs" icon in the top right, with some checkboxes for AI features, but those checkboxes are no longer respected—some queries will bring up an AI overview no matter what. What you can do is go find a new "Web" filter, which can live alongside the usual filters like "Videos," "Images," "Maps," and "Shopping." That's right, a "Web" filter for what used to be a web search engine. Google says the Web filter can appear in the main tab bar depending on the query (when would a web filter not be appropriate?), but I've only ever seen it buried deep in the "More" section.
Once you do find the Web filter, the results will look like old-school Google. You get 10 blue links, and that's it, with everything else (Google Maps, answer info boxes, etc) disabled. Sadly, unlike old-school Google, these are still the current Google web results, so they'll be dominated by SEO sites rather than page quality.
Google says AI Overviews are rolling out to "hundreds of millions of users" this week, with "over a billion people" seeing the feature by the end of the year, as Google expands AI Overview to more countries. //
The power-user way to use Google Search web now takes a lot of clicks. You'd want to click on "more" and then "Web" for actual web results, and then to get Google to actually pay attention to the words you type in, you'd want to click "Tools" and change "all results" to "verbatim." Alternatively, you could also find a more web-focused search engine instead of Google.
The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network. A setting known as option 121 allows the DHCP server to override default routing rules that send VPN traffic through a local IP address that initiates the encrypted tunnel. By using option 121 to route VPN traffic through the DHCP server, the attack diverts the data to the DHCP server itself. //
We use DHCP option 121 to set a route on the VPN user’s routing table. The route we set is arbitrary and we can also set multiple routes if needed. By pushing routes that are more specific than a /0 CIDR range that most VPNs use, we can make routing rules that have a higher priority than the routes for the virtual interface the VPN creates. We can set multiple /1 routes to recreate the 0.0.0.0/0 all traffic rule set by most VPNs. //
Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn't implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks. //
The most effective fixes are to run the VPN inside of a virtual machine whose network adapter isn’t in bridged mode or to connect the VPN to the Internet through the Wi-Fi network of a cellular device.
Carr, who spoke for more than half an hour, described how the FCC's net neutrality decisions were allegedly swayed by President Obama in 2015 and by President Biden this year. "The FCC has never been able to come up with a credible reason or policy rationale for Title II. It is all just shifting sands, and that is because the agency is doing what it's been told to do by the executive branch," Carr said. //
"Congress never passed a law saying the Internet should be heavily regulated like a utility, nor did it pass one giving the FCC the authority to make that determination. The executive branch pressured the agency into claiming a power that remained, and remains, with the legislative branch," Carr said.
Twenty years ago, in a world dominated by dial-up connections and a fledgling World Wide Web, a group of New Zealand friends embarked on a journey. Their mission? To bring to life a Matrix fan film shot on a shoestring budget. The result was The Fanimatrix, a 16-minute amateur film just popular enough to have its own Wikipedia page.
As reported by TorrentFreak, the humble film would unknowingly become a crucial part of torrent history. It now stands as the world’s oldest active torrent, with an uptime now spanning a full 20 years.
Check DNS, Urls + Redirects, Certificates and Content of your Website
Société Internationale de Télécommunications Aéronautiques
(SITA) Neuilly France
INTRODUCTION
1.1. SITA (Société Internationale de Télécommunications Aéronautique), a cooperative company founded in 1949, embraces the majority of the international air carriers (more than 160). It provides to its members a worldwide message switching network.
1.2. Initially the network consisted of manual (torn-tape) centres, interconnected by low speed circuits (50, 75 Bauds, 60, 30, 15 words per minute, asynchronous). The Airline terminal equipment (teleprinters. Telex) was connected to the SITA manual centres, thus enabling airline messages to be exchanged via nodes of the SITA network, with consequent reduction in costs to the airlines by their sharing of communications facilities.
1.3. With the rapid development of the Air Transport Industry, the airline communications needs became increasingly important and thus the SITA network expanded very quickly, by 1963 covering the world. Network development was not, however, restricted to geographic extension; in 1963 a number of the busiest manual centres were replaced by semi-automatic systems, and three years later, due to the continuing steady increase of traffic volumes, SITA equipped the Frankfurt centre with its first computer system to perform the message switching functions. Then, in 1969, SITA began replacing the other most heavily loaded centres (Western Europe and New York) with computer systems and established a computer communication data network by interconnecting these centres with voice grade circuits (medium speed). This network, called the High Level Network, performing the task of block switching, was interfaced at that time with the rest of the network composed of manual centres. This step was soon followed by the automation of other manual centres using what are in SITA terminology called satellite processors. These stand-alone computers act as concentrators of airline teleprinter traffic and controllers of airline CRT terminals, each of them connected to one High Level Centre by medium speed circuits. By mid-1973, the SITA network comprised 150 centres including 8 high level centres and 21 satellite processors. The 29 automated centres will be referred to as the SITA medium speed network (see figure 1).
IPFS is just a technology, not a predatory financial gambit. It is a set of peer-to-peer protocols for finding content on a decentralized network. It relies on a Content Identifier (CID) rather than a location (URL), which means the focus is on the identity of the content (a hash) rather than a server where it's stored.
IPFS focuses on representing and addressing data, routing it, and transferring it. It's not a storage service, though storage is necessary to use it. It's been adopted by Cloudflare and implemented in Brave and Opera, among others, and work is being done to make it work in Chromium.
IPFS traffic is public unless encrypted, which is why there are rival decentralized projects that strive for stronger built-in privacy protection like Veilid.
Parts of Africa were already seeing web disruptions from damaged Red Sea cables.
Our pledge
We'll never raise money. We'll never get acquired. We'll never shut down.
In fact, we don't even take salaries. All proceeds go directly to sustaining Posthaven for the next 100+ years.
Forever hosting
Pay for at least a year and your site stays online.
If we can't charge your card, your site goes into read only mode. Even if something catastrophic happens, your content will remain online.