toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#dns

22 posts21 participants3 posts today
Tuxi ⁂<p>Ich teste ja seit ungefähr zwei Wochen mit lokalen <a href="https://anonsys.net/search?tag=DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> Servern in meinem lokalen LAN herum: <a href="https://anonsys.net/search?tag=PiHole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PiHole</span></a>, <a href="https://anonsys.net/search?tag=Technitium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technitium</span></a> und <a href="https://anonsys.net/search?tag=AdGuardHome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdGuardHome</span></a>. Alle drei Lösungen verwenden lokalen <a href="https://anonsys.net/search?tag=Unbound" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unbound</span></a>.</p><p>Pi-Hole und AdGuard Home laufen auf einem <a href="https://anonsys.net/search?tag=Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> jeweils in einem <a href="https://anonsys.net/search?tag=LXC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LXC</span></a> Container. AdGuard Home läuft auf meiner <a href="https://anonsys.net/search?tag=OPNsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPNsense</span></a>.</p><p>Die Konfiguration ist so, dass im <a href="https://anonsys.net/search?tag=Adguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Adguard</span></a> Home als Upstream Server alle drei DNS Server angegeben sind, mit der Option "Paralleles Abfragen (Alle drei Upstream-Server werden angefragt, um dann den schnellsten zu verwenden)". AdGuard Home fragt also bei allen dreien nach und verwendet dann den schnellsten.</p><p><br>Was mich echt verwundert, sind die doch sehr großen Unterschiede bei den Antwortzeiten, obwohl alle drei im gleichen lokalen Netzwerk sind und zumindest Pi-Hole und Technitium auch die gleichen Voraussetzungen haben, was die Hardware betrifft.</p><p><br>Der Pi-Hole wurde nach der Anleitung vom Kuketz Blog (kuketz-blog.de/pi-hole-einrichtung-und-konfiguration-mit-unbound-adblocker-teil2/) und Technitium wie in diesem Blog beschrieben: fryboyter.de/pi-hole-und-unbound-durch-technitium-ersetzen/</p><pre><code>192.168.101.96 --&gt; Pi-Hole 192.168.101.82 --&gt; Technitium 192.168.101.1 --&gt; (AdGuard Home auf OPNsense)</code></pre><p>Hätte echt nicht geglaubt, dass die drei Lösungen sich bei den Antwortzeiten doch so sehr unterscheiden. Unterschiede ja, aber so massiv?</p>
Quad9DNS<p>We are happy to announce a significant capacity increase in our Warsaw systems, thanks to our partner <a href="https://mastodon.social/tags/i3D" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>i3D</span></a>. We're now well-positioned to grow extensively as our user base in Poland (and neighboring countries like Ukraine) continues to expand. We're even more happy to make this announcement since two of our very small team are Polish! We'll continue to rebuild and expand our footprint to provide safe and trusted <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> services for the world. 🇵🇱</p>
Quad9DNS<p>Z przyjemnością informujemy, że dzięki naszemu partnerowi, <a href="https://mastodon.social/tags/i3D" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>i3D</span></a>, znacznie zwiększyliśmy naszą wydajność w Warszawie. Jesteśmy dobrze przygotowani na obecny istotny wzrost liczby osób korzystających z naszych usług w Polsce i w krajach sąsiednich (jak Ukraina). Cieszymy się tym bardziej, że dwie osoby w naszym małym zespole są z Polski! Kontynuujemy prace nad ulepszaniem i rozszerzaniem naszej infrastruktury by świadczyć bezpieczne i godne zaufania usługi <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> na całym świecie. 🇵🇱</p>
Nishant Sharma<p><span class="h-card" translate="no"><a href="https://mastodon.social/@quad9dns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>quad9dns</span></a></span> 9.9.9.9 not reachable from AS55836 (Jio) from North and Eastern India.</p><p>RIPE Atlas measurement: <a href="https://atlas.ripe.net/measurements/123278046/overview" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">atlas.ripe.net/measurements/12</span><span class="invisible">3278046/overview</span></a> <a href="https://mastodon.hopbox.net/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.hopbox.net/tags/india" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>india</span></a></p>
DNŠ<p><span class="h-card" translate="no"><a href="https://eupolicy.social/@bert_hubert" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bert_hubert</span></a></span> Interestingly I subconsciously read that hastag as <a href="https://mastodns.net/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> 🙂 Thanks for the writeup. It is a very interesting read.</p>
Miek Gieben<p>Made a proper dnsutil package, but also needed interally, so I copy/generate it....</p><p><a href="https://codeberg.org/miekg/dns/src/branch/main/dnsutil_generate.go" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/miekg/dns/src/bra</span><span class="invisible">nch/main/dnsutil_generate.go</span></a></p><p><a href="https://mastodon.cloud/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://mastodon.cloud/tags/go" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>go</span></a></p>
Peter N. M. Hansteen<p>In case you were unaware of that particular scam, "Domain Name Scams Are Alive And Well, Thank You" <a href="https://nxdomain.no/~peter/domain_name_scams_are_alive_and_well_thank_you.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/domain_name</span><span class="invisible">_scams_are_alive_and_well_thank_you.html</span></a> (tracked <a href="https://bsdly.blogspot.com/2016/03/domain-name-scams-are-alive-and-well.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsdly.blogspot.com/2016/03/dom</span><span class="invisible">ain-name-scams-are-alive-and-well.html</span></a>) <a href="https://mastodon.social/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://mastodon.social/tags/domainnamescam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>domainnamescam</span></a> <a href="https://mastodon.social/tags/cndomains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cndomains</span></a> <a href="https://mastodon.social/tags/chinaname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chinaname</span></a> <a href="https://mastodon.social/tags/chinanetname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chinanetname</span></a> <a href="https://mastodon.social/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://mastodon.social/tags/china" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>china</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p><p>(I repost when one of those scam messages actually reaches a mailbox I read)</p>
Infoblox Threat Intel<p>Last week we released the first of a three part VexTrio origin story. The second part is now available. This research includes more than 200 open source references to help others validate the results and start their own investigations. </p><p>As of Tuesday, August 5th, all of those links were valid and all went directly to open material …. so anything that is gone, or social media that is now closed… welp, that's the actors, not us. Feel free to report missing things in this thread. :) <br> <br>The second part of this story focuses on the VexTrio activities that extend beyond their well-known traffic distribution systems (TDS). Enjoy. <br> <br><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/tds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tds</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> </p><p><a href="https://blogs.infoblox.com/threat-intelligence/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.infoblox.com/threat-inte</span><span class="invisible">lligence/vextrio-unmasked-a-legacy-of-spam-and-homegrown-scams/</span></a></p>
Miek Gieben<p>This looks rock solid,, nothing stands in my way</p><p>panic: runtime error: invalid memory address or nil pointer dereference</p><p>oh</p><p><a href="https://mastodon.cloud/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://mastodon.cloud/tags/go" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>go</span></a></p>
Renée Burton<p>VexTrio's origins come from two distinct groups: an Italian group we can date back to 2004 and a Russian-speaking Eastern European group. The Italians were quite successful early on, with a dating app that was among the fastest growing on Facebook in 2012. But our guess is that their profits slid in the years that followed. In 2020, there is an merger-acquisition which leaves the Eastern Europeans in charge. They gain the trademarks, knowledge in spam distribution, and who knows what else. <br> <br>While developers remain in eastern Europe, VexTrio created business headquarters in Lugano, Switzerland. Including the existing AdsPro, which developed the Los Pollos, Taco Loco, and Adtrafico traffic distribution systems (TDS) through their software company HolaCode. (ok it's more complicated than that, but this is the cliffsnotes version). We have identified nearly 100 businesses associated with 8 key figures in many industries, including construction, energy, and advertising.</p><p>So in the end, what is VexTrio? It's hard to say. We originally used it to refer to the TDS. Nice clean lines... but now, for us it is all the people and their labyrinth of companies. <br> <br>We spoke at BlackHat last week so if you have a briefings pass you can listen to that. Otherwise, find our research online and start your own investigation.</p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/vextrio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vextrio</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/tds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tds</span></a></p>
iX Magazin<p>iX-Workshop: Mastering Azure – Administration der Azure Cloud Services</p><p>Lernen Sie, die grundlegenden Komponenten der Microsoft Azure Cloud zu administrieren, zu konfigurieren und zu implementieren - in Theorie und Praxis.</p><p><a href="https://www.heise.de/news/iX-Workshop-Mastering-Azure-Administration-der-Azure-Cloud-Services-10508253.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Mast</span><span class="invisible">ering-Azure-Administration-der-Azure-Cloud-Services-10508253.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudComputing</span></a> <a href="https://social.heise.de/tags/Containerisierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Containerisierung</span></a> <a href="https://social.heise.de/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Virtualisierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualisierung</span></a> <a href="https://social.heise.de/tags/Wirtschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wirtschaft</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
PCHHello Dresden!
<br>We’re excited to share that we are now active and ready for <a class="hashtag" href="https://pleroma.pch.net/tag/peering" rel="nofollow noopener" target="_blank">#peering</a> at Dresden Internet Exchange! <br>A big thank you to <a class="hashtag" href="https://pleroma.pch.net/tag/ddix" rel="nofollow noopener" target="_blank">#DDIX</a> for helping us strengthen and expand a faster, more secure, and more resilient DNS infrastructure.<br><a class="hashtag" href="https://pleroma.pch.net/tag/dns" rel="nofollow noopener" target="_blank">#DNS</a> <a class="hashtag" href="https://pleroma.pch.net/tag/anycast" rel="nofollow noopener" target="_blank">#Anycast</a> <a class="hashtag" href="https://pleroma.pch.net/tag/dnsanycast" rel="nofollow noopener" target="_blank">#DNSAnycast</a> <a class="hashtag" href="https://pleroma.pch.net/tag/peering" rel="nofollow noopener" target="_blank">#Peering</a> <a class="hashtag" href="https://pleroma.pch.net/tag/ixp" rel="nofollow noopener" target="_blank">#IXP</a> <a class="hashtag" href="https://pleroma.pch.net/tag/dnsresiliency" rel="nofollow noopener" target="_blank">#DNSresiliency</a>
Dendrobatus Azureus<p>As I am browsing through the settings in firefox I see the odd setting of using it's own DNS over https enabled. My settings should be copied over from the account I use and I know that I've **never** turned this setting on.</p><p>I'm now on the SBC Pi5 running MX Linux Pi respin. </p><p>My own dns config is perfectly fine and Im changing it back to my own local DNS.</p><p>Why is the firefox team doing this? IS there any protective benifit from having this setting on? Are they snooping my data?</p><p>The help file is here</p><p><a href="https://support.mozilla.org/en-US/kb/dns-over-https?as=u&amp;utm_source=inproduct#w_what-is-a-local-provider" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">support.mozilla.org/en-US/kb/d</span><span class="invisible">ns-over-https?as=u&amp;utm_source=inproduct#w_what-is-a-local-provider</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.bsd.cafe/tags/AskFediverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFediverse</span></a> <a href="https://mastodon.bsd.cafe/tags/firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firefox</span></a> <a href="https://mastodon.bsd.cafe/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.bsd.cafe/tags/https" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>https</span></a> <a href="https://mastodon.bsd.cafe/tags/port443" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>port443</span></a> <a href="https://mastodon.bsd.cafe/tags/settings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>settings</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p>
Miek Gieben<p>New Msg layout and printing (dnsv2), <a href="https://mastodon.cloud/tags/go" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>go</span></a> <a href="https://mastodon.cloud/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> </p><p>; QUERY, status: NOERROR, id: 17759, flags: qr rd ra ad do<br> ;; EDNS, version: 0, udp: 512<br> ;; QUESTION: 1, PSEUDO: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 0</p><p> ;; QUESTION SECTION:<br> miek.nl. IN A</p><p> ;; PSEUDO SECTION:<br> . CLASS0 NSID 6770646e732d616d73 ; ("gpdns-ams)</p><p> ;; ANSWER SECTION:<br> miek.nl. 14301 IN A 45.138.52.215</p>
Notxor :esperanto:<p>Acabo de configurar el router para tirar del DNS de esta instancia: <a href="https://rocksdns.ovh/site/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">rocksdns.ovh/site/</span><span class="invisible"></span></a><br>y va de lujo</p><p><a href="https://tuiter.rocks/tags/tuiterrocks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tuiterrocks</span></a> <a href="https://tuiter.rocks/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a></p>
Asheville Charlie<p>My fedifam nerds.. just a random reminder to check who/where your DNS is..</p><p><a href="https://mastodon.social/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a><br><a href="https://mastodon.social/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a></p>
Kathleen Fitzpatrick<p>I have been fighting with the process of setting up a server on my home network for what is now literally months. (I keep having to walk away from the project because of that whole “day job” thing, plus travel and so forth.) If anyone has advice to offer, it would not be unsolicited! <a href="https://kfitz.info/networking-continued/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kfitz.info/networking-continue</span><span class="invisible">d/</span></a> <a href="https://hcommons.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://hcommons.social/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://hcommons.social/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> <a href="https://hcommons.social/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a></p>
Kevin Karhan :verified:<p>Thx <span class="h-card" translate="no"><a href="https://ohai.social/@lina" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lina</span></a></span> for exposing the <a href="https://infosec.space/tags/Copyrightmafia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copyrightmafia</span></a>'s <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a>-based <a href="https://infosec.space/tags/internetcensorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetcensorship</span></a>:<br><a href="https://cuiiliste.de" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cuiiliste.de</span><span class="invisible"></span></a></p><ul><li>I really should test the <a href="https://infosec.space/tags/API" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>API</span></a> more: <a href="https://api.cuiiliste.de" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">api.cuiiliste.de</span><span class="invisible"></span></a></li></ul><p>As for circumvention: Just use <a href="https://infosec.space/tags/OpenNIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenNIC</span></a>'s <a href="https://github.com/greyhat-academy/lists.d/blob/df41ea6a5320f0a895b801145efe0ea6d2e9ea33/dns.servers.list.tsv#L2" rel="nofollow noopener" target="_blank">DNS servers</a>...</p><ul><li>Personally <a href="https://lina.sh/blog/cuii-gives-up" rel="nofollow noopener" target="_blank">I'm not as enthusiastic</a> as to claim <a href="https://infosec.space/tags/CUIi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CUIi</span></a> <a href="https://netzpolitik.org/2025/die-cuii-gibt-auf-fuer-netzsperren-braucht-es-jetzt-einen-gerichtsentscheid/" rel="nofollow noopener" target="_blank">is done</a> because not only ain't they forced to remove any blockages but also they marginally changed their process.</li></ul><p>The sheer <a href="https://infosec.space/tags/Zensursula" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zensursula</span></a>-Style bullshit <em>is the <a href="https://infosec.space/tags/IllicitActivity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IllicitActivity</span></a></em>! <a href="https://infosec.space/tags/ISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISP</span></a>|s should have <em>no right to interfere with any traffic</em> (except to defend their own infrastructure from getting hacked) unless explicitly requested by customers to do so.</p><ul><li>And now <a href="https://infosec.space/tags/ISPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISPs</span></a> like <a href="https://infosec.space/tags/O2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>O2</span></a> want to sell <a href="https://infosec.space/tags/TechIlliterate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIlliterate</span></a> <a href="https://infosec.space/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> clients the idea that fucking around with <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> is somehow <em>"<a href="https://infosec.space/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a>"</em> for which they want to <a href="https://www.o2business.de/cloud-sicherheit/cybersicherheit/webguard/" rel="nofollow noopener" target="_blank">charge clients a premium and make it opt-out!</a> when <span class="h-card" translate="no"><a href="https://mastodon.social/@quad9dns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>quad9dns</span></a></span> offers the same <a href="https://quad9.net/service/threat-blocking/" rel="nofollow noopener" target="_blank">for free</a> [and I'm certain they just use <a href="https://infosec.space/tags/quad9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quad9</span></a>'s <em>filtered</em> DNS and slap CUII's <a href="https://infosec.space/tags/blocklist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocklist</span></a> <a href="https://api.cuiiliste.de/blocked_domains" rel="nofollow noopener" target="_blank">on top.</a>]!</li></ul><p>I do wish <span class="h-card" translate="no"><a href="https://mastodon.social/@ooni" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ooni</span></a></span> would take a look at the <a href="https://api.cuiiliste.de/blocked_domains" rel="nofollow noopener" target="_blank">CUII blocklist</a> and add that to their <a href="https://infosec.space/tags/OONIprobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OONIprobe</span></a> to test for.</p>
✍️ Eljo #MorpurgoMedia<p>So what happens when I enter a building that has Wi-Fi and routers set on DNS-x and my hardware has DNS-y?</p><p><a href="https://mastodon.nl/tags/question" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>question</span></a> <a href="https://mastodon.nl/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a></p>
Mitex Leo<p>Registration of new .ONE domains is going up to $24.75 USD per year. </p><p>😕</p><p><a href="https://mitexleo.one/tags/Domain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Domain</span></a> <a href="https://mitexleo.one/tags/dotone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dotone</span></a> <a href="https://mitexleo.one/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://mitexleo.one/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a></p>