toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

214
active users

#mitm

1 post1 participant0 posts today
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@aria" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>aria</span></a></span> : nice to meet you!</p><p>Not meaning to be blunt, but *please* prepend links with https:// instead of http://.</p><p>Let me know if you'd like me to explain why!<br> </p><p><a href="https://infosec.exchange/tags/httpsVShttp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>httpsVShttp</span></a> <a href="https://infosec.exchange/tags/httpVShttps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>httpVShttps</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/HttpRedirect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HttpRedirect</span></a> <a href="https://infosec.exchange/tags/Wifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wifi</span></a> <a href="https://infosec.exchange/tags/EvilTwin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EvilTwin</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@VXShare" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>VXShare</span></a></span> <span class="h-card" translate="no"><a href="https://myside-yourside.net/@StarkRG" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>StarkRG</span></a></span> <span class="h-card" translate="no"><a href="https://social.zerojay.com/@jay" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jay</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@vildis" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vildis</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@vxunderground" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vxunderground</span></a></span> OFC, if their corporate firewall didn't blocklist your domain, most <a href="https://infosec.space/tags/MITM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITM</span></a>-based <em>"<a href="https://infosec.space/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a>"</em> solutions and <em>"<a href="https://infosec.space/tags/EndpointProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointProtection</span></a>"</em> will checksum files and instantly yeet them into the shadow realm.</p><ul><li>Researchers should OFC only run those said malware <em>only for research purposes and on <a href="https://infosec.space/tags/airgapped" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>airgapped</span></a>, sanctioned systems</em> but they need to get their hands on them in the first place.</li></ul><p>And lets be honest: Like with chemistry and medicine, one wants to have a supplier that isn't shady af but actually transparent. </p><ul><li>The "alternative" would be to go into some <em>"dark corners"</em> and risk getting something else entirely.</li></ul>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@relishthecracker" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>relishthecracker</span></a></span> : that's make belief.</p><p>"Wow, asymmetric encryption, even quantum-computer-proof", "military-grade", etcetera.</p><p>Right after logging in using a passkey with an unbreakably protected private key, the website sends a session cookie (or similar) to the browser - which is NOT protected like private keys. If a website (like most of them) does not log you out if your IP-address changes, such a cookie is nearly as bad as a password. And fully if the cookie never expires.</p><p>Therefore:</p><p>1️⃣ Even if attackers cannot copy private keys: if the user device is sufficiently compromised (i.e. on Android, running an accessibility service), they can take over all of the user's accounts;</p><p>2️⃣ If the user's browser is compromised, attackers can copy session cookies and use them to obtain access to accounts the user logs in to;</p><p>3️⃣ An AitM (Attacker in the Middle) using a malicious website can copy/steal authentication cookies. Such AitM-attacks are possible in at least the following cases if either:</p><p>• A malicious third party website manages to obtain a fraudulently issued certificate (examples: <a href="https://infosec.exchange/@ErikvanStraten/112914050216821746" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/112914050216821746</span></a>);</p><p>• An attacker obtains unauthorised write access to the website's DNS record;</p><p>• An attacker manages to obtain access to a server where a "dangling" (forgotten) subdomain name points to, *AND* the real authenticating server (RP) does not carefully check for allowed subdomains (see <a href="https://github.com/w3ctag/design-reviews/issues/97#issuecomment-175766580" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/w3ctag/design-revie</span><span class="invisible">ws/issues/97#issuecomment-175766580</span></a>);</p><p>4️⃣ The server is compromised or has a rogue admin: the attacker can add their passkey's public key to your account, or replace your public key with theirs (note that passkey pubkeys are not encapsulated by certificates issued by trusted issuers, stating who owns the public key).</p><p>Phishing using fake websites is probably the number one problem on the internet. *THE* major advantage of passkeys is that they make phishing attacks VERY HARD.</p><p>Indeed, if your device is sufficiently compromised, the risk of all of your passwords being stolen if you use a password manager is BIG.</p><p>However, as I wrote, if your device is sufficiently compromised, an attacker does not need access to your private keys in order to obtain access to your accounts.</p><p><span class="h-card" translate="no"><a href="https://sigmoid.social/@oliversampson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>oliversampson</span></a></span> <span class="h-card" translate="no"><a href="https://cathode.church/@kaye" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kaye</span></a></span> </p><p><a href="https://infosec.exchange/tags/Passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passkeys</span></a> <a href="https://infosec.exchange/tags/PasswordManagers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordManagers</span></a> <a href="https://infosec.exchange/tags/DomainNames" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNames</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/MilitaryGrade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MilitaryGrade</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/FakeWebsites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeWebsites</span></a> <a href="https://infosec.exchange/tags/ATO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATO</span></a> <a href="https://infosec.exchange/tags/AccountTakeOver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AccountTakeOver</span></a> <a href="https://infosec.exchange/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a> <a href="https://infosec.exchange/tags/SharedSecrets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharedSecrets</span></a> <a href="https://infosec.exchange/tags/AsymmetricCryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsymmetricCryptography</span></a> <a href="https://infosec.exchange/tags/SubDomains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SubDomains</span></a> <a href="https://infosec.exchange/tags/DanglingSubDomains" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DanglingSubDomains</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://sigmoid.social/@oliversampson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>oliversampson</span></a></span> <span class="h-card" translate="no"><a href="https://cathode.church/@kaye" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kaye</span></a></span> </p><p>Primary passkeys advantage:<br>• With some uncommon exceptions, you cannot (be persuaded to) log in to a phishing website with a (slightly) different domain name *USING A PASSKEY* (see below) - because software (not you) checks the domain name.</p><p>Some passkeys disadvantages:<br>• Typically you yourself do not have access to each passkey's private key (*)(usually you can't back them up/export them). Risks: vendor lock-in and losing access to accounts.</p><p>• Because there's a risk of losing access to passkeys and thus to accounts, usually accounts can also be accessed using a rescue code - which renders them phishable again.</p><p>• Implementation errors (both Apple and Android suffered from them, and probably still do - I did not check today).</p><p>(*) For each new passkey, your device generates a unique complementary keypair. The public key is stored in your account on the server and is used to verify that your device has access to the complementary private key, which is kept secret. However, even if attackers do not have access to your private key(s), there are other ways for them to obtain access your account(s).</p><p>A reasonable alternative to passkeys is using a password manager that "integrates" with the browser to verify the domain name of the site you're logging in to. Android and iOS "Autofill" provide such a bridge between password managers and browsers (without requiring browser plug-ins).</p><p><a href="https://infosec.exchange/tags/Passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passkeys</span></a> <a href="https://infosec.exchange/tags/PasswordManagers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordManagers</span></a> <a href="https://infosec.exchange/tags/DomainNames" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNames</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tychotithonus" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tychotithonus</span></a></span> : thank you for responding. I'm not trying to be aggressive but to make the internet safer.</p><p>In your original toot, you wrote: "It's comforting to know that I'm significantly protected from these attempts" while showing phishing messages.</p><p>From <a href="https://blog.talosintelligence.com/how-are-attackers-trying-to-bypass-mfa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.talosintelligence.com/how</span><span class="invisible">-are-attackers-trying-to-bypass-mfa/</span></a> (a year ago):<br>"In the latest Cisco Talos Incident Response Quarterly Trends report, instances related to multi-factor authentication (MFA) were involved in nearly half of all security incidents that our team responded to in the first quarter of 2024".</p><p>From my own research I know that the number of phishing-sites is exploding. PhaaS makes it easy to take over accounts where weak MFA is used.</p><p>The more people use weak MFA, the more of these sort of attacks we'll be seeing. IOW, the security of weak MFA (TOTP, SMS, number matching) will decrease over time (it does since Alex Weinert wrote this in 2019: <a href="https://techcommunity.microsoft.com/blog/microsoft-entra-blog/all-your-creds-are-belong-to-us/855124" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/bl</span><span class="invisible">og/microsoft-entra-blog/all-your-creds-are-belong-to-us/855124</span></a>).</p><p>Furthermore, from the page referenced by you, <a href="https://meta.wikimedia.org/wiki/Steward_requests/Global_permissions#Requests_for_2_Factor_Auth_tester_permissions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">meta.wikimedia.org/wiki/Stewar</span><span class="invisible">d_requests/Global_permissions#Requests_for_2_Factor_Auth_tester_permissions</span></a>:<br>"Testing this service may result in the loss of your access and is not recommended for inexperienced users."</p><p>TOTP effectively means a unique strong (server supplied) password per account that people can impossibly remember. A TOTP app simply is a disguised password manager.</p><p>There have been lots of incidents where people lost access to multiple MFA-proteced accounts because they lost access to the shared secrets on their phones. Nobody tells people to make sure that backups are made of such secrets, let alone in a secure and privacy-respecting manner.</p><p>Note: a lot of TOTP apps had serious security issues a couple of years ago, as documented by Conor Gilsenan et al. in <a href="https://www.usenix.org/conference/usenixsecurity23/presentation/gilsenan" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">usenix.org/conference/usenixse</span><span class="invisible">curity23/presentation/gilsenan</span></a> (source: <a href="https://infosec.exchange/@conorgil/109542074585730853" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@conorgil/109</span><span class="invisible">542074585730853</span></a>). I doubt that things have significantly improved (Authy was really bad, and at the time, Google's app blocked backups of the shared secrets).</p><p>Here's an, IMO, way better advice: use a password manager that checks the domain name. Use it to generate long random passwords, and make sure that it's (encrypted) database is backed up after every change you make.</p><p>I wrote about the caveats of password managers in, for example, <a href="https://infosec.exchange/@ErikvanStraten/113022180851761038" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/113022180851761038</span></a>.</p><p>Recommending people to use TOTP because they use weak passwords is a bad idea IMO: you effectively make them use a password manager (which a TOTP app is, while it does not check domain names) instead of solving the primary problem: weak passwords.</p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@conorgil" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>conorgil</span></a></span> <br> </p><p><a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/TOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOTP</span></a> <a href="https://infosec.exchange/tags/WeakMFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeakMFA</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://infosec.exchange/tags/Weak2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Weak2FA</span></a> <a href="https://infosec.exchange/tags/ATO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATO</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/Evilginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Evilginx</span></a> <a href="https://infosec.exchange/tags/PhaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhaaS</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tychotithonus" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tychotithonus</span></a></span> : can you explain which protection(s) are provided by weak MFA?<br> </p><p><a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/TOTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOTP</span></a> <a href="https://infosec.exchange/tags/WeakMFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeakMFA</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://infosec.exchange/tags/Weak2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Weak2FA</span></a> <a href="https://infosec.exchange/tags/ATO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATO</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/Evilginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Evilginx</span></a></p>
Ay Papi 🔞 Parental Advisory<p><span class="h-card"><a class="u-url mention" href="https://www.minds.com/unit15" rel="nofollow noopener" target="_blank">@<span>unit15</span></a></span> It's unfortunate that you're hosted on a <a class="hashtag" href="https://miniwa.moe/tag/cloudflare" rel="nofollow noopener" target="_blank">#Cloudflare</a> <a class="hashtag" href="https://miniwa.moe/tag/mitm" rel="nofollow noopener" target="_blank">#MITM</a> controlled and <a class="hashtag" href="https://miniwa.moe/tag/centralised" rel="nofollow noopener" target="_blank">#centralised</a> server. I would have loved to enhance the visibility of several of your posts</p>
Insecurity Princess 🌈💖🔥<p>"If your reports don't feel safe, they won't tell you" — This is one of the clearest and most important pieces of advice I've heard for managers.</p><p>It's a perfect illustration of the "monster in the middle dilemma for navigating both social and organizational/authoritative power dynamics as a manager. Power dynamics are the monster in the middle — and if a manager doesn't actively work to mitigate that, they will fail to operate effectively as a manager. </p><p>It's not something anyone can fix or prevent, it's an inevitable, inescapable aspect of the management threat model.<br><a href="https://infosec.exchange/tags/mitm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mitm</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://hachyderm.io/@apicultor" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>apicultor</span></a></span> wrote:</p><p>"Much like with Webauthn, that's not how it works. You can't just capture and replay it."</p><p>WebAuthn is TOFU (there is a reason that phishing domain names such as<br>• mypasskey[.]info<br>• passkeysetup[.]com<br>exist). In WebAuthn a unique asymmetric key pair is bound to (part of the) domain name. AitM attacks are possible if an attacker illegitimately obtains a certificate for the domain name (examples can be found in <a href="https://infosec.exchange/@ErikvanStraten/112914050216821746" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/112914050216821746</span></a>).</p><p>EDIW is in no way comparable to WebAuthn, among other reasons because:</p><p>1) It's not even TOFU: it does not remember.</p><p>2) AFAIK EDIW "relying party authentication" is optional.</p><p><span class="h-card" translate="no"><a href="https://noc.social/@hlindqvist" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hlindqvist</span></a></span> </p><p><a href="https://infosec.exchange/tags/EDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDIW</span></a> <a href="https://infosec.exchange/tags/EUDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUDIW</span></a> <a href="https://infosec.exchange/tags/eID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eID</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/DVcerts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DVcerts</span></a> <a href="https://infosec.exchange/tags/DomainValidation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainValidation</span></a> <a href="https://infosec.exchange/tags/BrowsersSuck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrowsersSuck</span></a> <a href="https://infosec.exchange/tags/DV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DV</span></a> <a href="https://infosec.exchange/tags/GoogleIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleIsEvil</span></a> <a href="https://infosec.exchange/tags/BigTechIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BigTechIsEvil</span></a> <a href="https://infosec.exchange/tags/CloudflareIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudflareIsEvil</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/RP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RP</span></a> <a href="https://infosec.exchange/tags/RelyingParty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RelyingParty</span></a> <a href="https://infosec.exchange/tags/RelyingPartyAuthentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RelyingPartyAuthentication</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://chaos.social/@zhenech" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>zhenech</span></a></span> : you are mistaken.</p><p>You DID successfully browse to <a href="https://www.brother-usa.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">brother-usa.com</span><span class="invisible"></span></a>. Your browser had a succesful https connection to mentioned domain, without certificate errors.</p><p><a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLS</span></a> <a href="https://infosec.exchange/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a></p>
Matrix<p><span>Hello, readers and followers.<br><br>Last week, feeling rather bored, I decided to write a small </span><a href="https://github.com/if-you-want-peace-prepare-for-war/decentraliseFediverse" rel="nofollow noopener" target="_blank">script</a><span> to assist in identifying centralised servers within the fediverse.<br><br>This is particularly useful as the fediverse is intended to be free, open, and decentralised, in order to safeguard democracy, free speech, and, most importantly, to protect democracy and human freedom, which are </span><a href="https://kb.mypdns.org/articles/MPDNS-A-2" rel="nofollow noopener" target="_blank">fundamental human rights and online privacy</a><span>.<br><br>At this stage, the script identifies centralised and privacy-invasive servers operating on the </span><a href="https://matrix.rocks/tags/MITM" rel="nofollow noopener" target="_blank">#MITM</a> networks of AWS, CloudFlare, and Azure (Microsoft). By now, we should all be aware that these networks are detrimental to privacy, as they do everything possible to identify you for the purpose of collecting your <a href="https://kb.mypdns.org/articles/MTX-A-79" rel="nofollow noopener" target="_blank">Personally Identifiable Information (PII)</a><span>, fingerprinting your browsers, and censoring the internet for those who refuse to be part of the walled garden.<br><br>The results from running the collection of previously connected servers to my fediverse instance are as in the file attached<br><br></span><a href="https://matrix.rocks/tags/fediverse" rel="nofollow noopener" target="_blank">#fediverse</a> <a href="https://matrix.rocks/tags/freespeech" rel="nofollow noopener" target="_blank">#freespeech</a> <a href="https://matrix.rocks/tags/decentralization" rel="nofollow noopener" target="_blank">#decentralization</a> <a href="https://matrix.rocks/tags/cloudflare" rel="nofollow noopener" target="_blank">#cloudflare</a> <a href="https://matrix.rocks/tags/crimeflare" rel="nofollow noopener" target="_blank">#crimeflare</a> <a href="https://matrix.rocks/tags/infosec" rel="nofollow noopener" target="_blank">#infosec</a> <a href="https://matrix.rocks/tags/privacy" rel="nofollow noopener" target="_blank">#privacy</a> <a href="https://matrix.rocks/tags/azure" rel="nofollow noopener" target="_blank">#azure</a> <a href="https://matrix.rocks/tags/aws" rel="nofollow noopener" target="_blank">#aws</a> <a href="https://matrix.rocks/tags/amazon" rel="nofollow noopener" target="_blank">#amazon</a> <a href="https://matrix.rocks/tags/onlineprivacy" rel="nofollow noopener" target="_blank">#onlineprivacy</a> <a href="https://matrix.rocks/tags/privacymatters" rel="nofollow noopener" target="_blank">#privacymatters</a> <a href="https://matrix.rocks/tags/democracy" rel="nofollow noopener" target="_blank">#democracy</a> <a href="https://matrix.rocks/tags/protectdemocracy" rel="nofollow noopener" target="_blank">#protectdemocracy</a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.neilzone.co.uk/@neil" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>neil</span></a></span> OFC it isn't <em>technically feasible</em> wothout <a href="https://infosec.space/tags/MITM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITM</span></a>'ing every connection and even then if people do proper <a href="https://infosec.space/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> they can still do nefarious shit.</p><ul><li>The problem are what people do to other people, not that they use the Internet for it!</li></ul>
Erik van Straten<p>Public key cryptografie voor leken</p><p>Het is een beetje behelpen met "ASCII graphics", maar in <a href="https://www.security.nl/posting/884482/Public+keys+voor+leken" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.nl/posting/884482/Pub</span><span class="invisible">lic+keys+voor+leken</span></a> probeer ik, ook aan minder digitaal vaardigen, uit te leggen hoe asymmetrische cryptografie werkt.</p><p>Doe er uw voordeel mee, want deze techniek is een belangrijk fundament van de steeds verder digtaliserende maatschappij.</p><p>U leert hoe een digitale handtekening werkt en wat een digitaal certificaat is.</p><p>Veel te weinig mensen begrijpen dat goed, en dat bemoeilijkt een fatsoenlijke discussie over deze technieken enorm.</p><p>Big tech is de lachende derde: zij maximaliseren hun winsten terwijl alle risico's voor uw rekening komen.</p><p><a href="https://infosec.exchange/tags/BigTechIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BigTechIsEvil</span></a> <a href="https://infosec.exchange/tags/GoogleIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleIsEvil</span></a> <a href="https://infosec.exchange/tags/DVcerts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DVcerts</span></a> <a href="https://infosec.exchange/tags/EchtVanNepKunnenOnderscheiden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EchtVanNepKunnenOnderscheiden</span></a> <a href="https://infosec.exchange/tags/NepVanEchtKunnenOnderscheiden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NepVanEchtKunnenOnderscheiden</span></a> <a href="https://infosec.exchange/tags/NepWebsites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NepWebsites</span></a> <a href="https://infosec.exchange/tags/BankHelpdeskFraude" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BankHelpdeskFraude</span></a> <a href="https://infosec.exchange/tags/OnlineOplichting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineOplichting</span></a> <a href="https://infosec.exchange/tags/EDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDIW</span></a> <a href="https://infosec.exchange/tags/EUDIW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUDIW</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/BasisKennis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BasisKennis</span></a> <a href="https://infosec.exchange/tags/Encryptie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryptie</span></a> <a href="https://infosec.exchange/tags/Cryptografie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptografie</span></a> <a href="https://infosec.exchange/tags/DigitaleVaardigheden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleVaardigheden</span></a> <a href="https://infosec.exchange/tags/PublicKeyCryptografie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PublicKeyCryptografie</span></a> <a href="https://infosec.exchange/tags/AsymmetrischeCryptografie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsymmetrischeCryptografie</span></a> <a href="https://infosec.exchange/tags/PrivateKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivateKey</span></a> <a href="https://infosec.exchange/tags/PubliekeSleutel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PubliekeSleutel</span></a> <a href="https://infosec.exchange/tags/PrivateSleutel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivateSleutel</span></a></p>
ADMIN magazine<p>The developers of the mitmproxy tool describe it as the Swiss army knife for debugging, testing, data protection analysis, and penetration testing HTTP(S) connections. Holger Reibold shows you how mitmproxy can be a useful addition to your security toolbox.<br><a href="https://www.admin-magazine.com/Archive/2025/85/Traffic-analysis-with-mitmproxy?utm_source=mlm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Archive/202</span><span class="invisible">5/85/Traffic-analysis-with-mitmproxy?utm_source=mlm</span></a><br><a href="https://hachyderm.io/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://hachyderm.io/tags/mitmproxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mitmproxy</span></a> <a href="https://hachyderm.io/tags/debugging" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debugging</span></a> <a href="https://hachyderm.io/tags/testing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>testing</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> <a href="https://hachyderm.io/tags/MITM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITM</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mk.absturztau.be/@Linux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Linux</span></a></span> <a href="https://infosec.space/tags/ClownFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClownFlare</span></a> is literally a <a href="https://infosec.space/tags/ValueRemoving" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ValueRemoving</span></a> <a href="https://infosec.space/tags/RentSeeker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RentSeeker</span></a> that <a href="https://infosec.space/tags/MITM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITM</span></a>'s traffic to capture <a href="https://infosec.space/tags/Logins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Logins</span></a> in <a href="https://infosec.space/tags/PlainText" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PlainText</span></a> &amp; also acts as <a href="https://infosec.space/tags/RogueISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueISP</span></a> hosting everything from <a href="https://infosec.space/tags/CSAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAM</span></a> to <a href="https://infosec.space/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> and <a href="https://infosec.space/tags/Terrorism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Terrorism</span></a>.</p><ul><li>There is no legitimate reason to use <a href="https://infosec.space/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> for anything!</li></ul>
Ay Papi 🔞 Parental Advisory<p><span class="h-card"><a class="u-url mention" href="https://www.minds.com/aussie55" rel="nofollow noopener" target="_blank">@<span>aussie55</span></a></span> </p><p>Charlee Fraser </p><p>Photo: Isa Sanchez</p><p><a class="hashtag" href="https://miniwa.moe/tag/cloudflarefree" rel="nofollow noopener" target="_blank">#cloudflareFree</a> unlike <a class="hashtag" href="https://miniwa.moe/tag/minds" rel="nofollow noopener" target="_blank">#minds</a>, which is yet another <a class="hashtag" href="https://miniwa.moe/tag/fediverse" rel="nofollow noopener" target="_blank">#fediverse</a> server controlled by <a class="hashtag" href="https://miniwa.moe/tag/cloudflare" rel="nofollow noopener" target="_blank">#cloudflare</a>. <a class="hashtag" href="https://miniwa.moe/tag/mitm" rel="nofollow noopener" target="_blank">#mitm</a> <a class="hashtag" href="https://miniwa.moe/tag/insecure" rel="nofollow noopener" target="_blank">#insecure</a> <a class="hashtag" href="https://miniwa.moe/tag/pii" rel="nofollow noopener" target="_blank">#PII</a> <a class="hashtag" href="https://miniwa.moe/tag/infosec" rel="nofollow noopener" target="_blank">#infosec</a> <a class="hashtag" href="https://miniwa.moe/tag/censorship" rel="nofollow noopener" target="_blank">#censorship</a></p><ul><li>Stay away from CrimeFlare <a href="https://kb.mypdns.org/articles/MTX-A-73" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MTX-A-73</a></li><li>Fundamental Human Rights and Online Privacy <a href="https://kb.mypdns.org/articles/MPDNS-A-2" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MPDNS-A-2</a></li></ul>
Ay Papi 🔞 Parental Advisory<p><span class="h-card"><a class="u-url mention" href="https://www.minds.com/aussie55" rel="nofollow noopener" target="_blank">@<span>aussie55</span></a></span> </p><p><a class="hashtag" href="https://miniwa.moe/tag/nudephotography" rel="nofollow noopener" target="_blank">#nudephotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartphotography" rel="nofollow noopener" target="_blank">#nudeartphotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartist" rel="nofollow noopener" target="_blank">#nudeartist</a> <a class="hashtag" href="https://miniwa.moe/tag/femaleform" rel="nofollow noopener" target="_blank">#femaleform</a> <a class="hashtag" href="https://miniwa.moe/tag/bodyart" rel="nofollow noopener" target="_blank">#bodyart</a> <a class="hashtag" href="https://miniwa.moe/tag/artnude" rel="nofollow noopener" target="_blank">#artnude</a> <a class="hashtag" href="https://miniwa.moe/tag/artisticnude" rel="nofollow noopener" target="_blank">#artisticnude</a> <a class="hashtag" href="https://miniwa.moe/tag/nudebeauty" rel="nofollow noopener" target="_blank">#nudebeauty</a> <a class="hashtag" href="https://miniwa.moe/tag/womeninnudeart" rel="nofollow noopener" target="_blank">#womeninnudeart</a> <a class="hashtag" href="https://miniwa.moe/tag/eroticart" rel="nofollow noopener" target="_blank">#eroticart</a> <a class="hashtag" href="https://miniwa.moe/tag/cloudflarefree" rel="nofollow noopener" target="_blank">#cloudflareFree</a> unlike <a class="hashtag" href="https://miniwa.moe/tag/loforo" rel="nofollow noopener" target="_blank">#loforo</a>, which is a centrtalized <a class="hashtag" href="https://miniwa.moe/tag/cloudflared" rel="nofollow noopener" target="_blank">#cloudflared</a> controlled. <a class="hashtag" href="https://miniwa.moe/tag/mitm" rel="nofollow noopener" target="_blank">#mitm</a> <a class="hashtag" href="https://miniwa.moe/tag/insecure" rel="nofollow noopener" target="_blank">#insecure</a></p><ul><li><a href="https://kb.mypdns.org/articles/MTX-A-73" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MTX-A-73</a></li><li><a href="https://kb.mypdns.org/articles/MPDNS-A-2" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MPDNS-A-2</a></li></ul>
Ay Papi 🔞 Parental Advisory<p><span class="h-card"><a class="u-url mention" href="https://www.minds.com/aussie55" rel="nofollow noopener" target="_blank">@<span>aussie55</span></a></span> </p><p><a class="hashtag" href="https://miniwa.moe/tag/nudephotography" rel="nofollow noopener" target="_blank">#nudephotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartphotography" rel="nofollow noopener" target="_blank">#nudeartphotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartist" rel="nofollow noopener" target="_blank">#nudeartist</a> <a class="hashtag" href="https://miniwa.moe/tag/femaleform" rel="nofollow noopener" target="_blank">#femaleform</a> <a class="hashtag" href="https://miniwa.moe/tag/bodyart" rel="nofollow noopener" target="_blank">#bodyart</a> <a class="hashtag" href="https://miniwa.moe/tag/artnude" rel="nofollow noopener" target="_blank">#artnude</a> <a class="hashtag" href="https://miniwa.moe/tag/artisticnude" rel="nofollow noopener" target="_blank">#artisticnude</a> <a class="hashtag" href="https://miniwa.moe/tag/nudebeauty" rel="nofollow noopener" target="_blank">#nudebeauty</a> <a class="hashtag" href="https://miniwa.moe/tag/womeninnudeart" rel="nofollow noopener" target="_blank">#womeninnudeart</a> <a class="hashtag" href="https://miniwa.moe/tag/eroticart" rel="nofollow noopener" target="_blank">#eroticart</a> <a class="hashtag" href="https://miniwa.moe/tag/cloudflarefree" rel="nofollow noopener" target="_blank">#cloudflareFree</a> unlike <a class="hashtag" href="https://miniwa.moe/tag/loforo" rel="nofollow noopener" target="_blank">#loforo</a>, which is a centrtalized <a class="hashtag" href="https://miniwa.moe/tag/cloudflared" rel="nofollow noopener" target="_blank">#cloudflared</a> controlled. <a class="hashtag" href="https://miniwa.moe/tag/mitm" rel="nofollow noopener" target="_blank">#mitm</a> <a class="hashtag" href="https://miniwa.moe/tag/insecure" rel="nofollow noopener" target="_blank">#insecure</a></p><ul><li><a href="https://kb.mypdns.org/articles/MTX-A-73" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MTX-A-73</a></li><li><a href="https://kb.mypdns.org/articles/MPDNS-A-2" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MPDNS-A-2</a></li></ul>
Ay Papi 🔞 Parental Advisory<p><span class="h-card"><a class="u-url mention" href="https://www.minds.com/aussie55" rel="nofollow noopener" target="_blank">@<span>aussie55</span></a></span> </p><p><a class="hashtag" href="https://miniwa.moe/tag/nudephotography" rel="nofollow noopener" target="_blank">#nudephotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartphotography" rel="nofollow noopener" target="_blank">#nudeartphotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartist" rel="nofollow noopener" target="_blank">#nudeartist</a> <a class="hashtag" href="https://miniwa.moe/tag/femaleform" rel="nofollow noopener" target="_blank">#femaleform</a> <a class="hashtag" href="https://miniwa.moe/tag/bodyart" rel="nofollow noopener" target="_blank">#bodyart</a> <a class="hashtag" href="https://miniwa.moe/tag/artnude" rel="nofollow noopener" target="_blank">#artnude</a> <a class="hashtag" href="https://miniwa.moe/tag/artisticnude" rel="nofollow noopener" target="_blank">#artisticnude</a> <a class="hashtag" href="https://miniwa.moe/tag/nudebeauty" rel="nofollow noopener" target="_blank">#nudebeauty</a> <a class="hashtag" href="https://miniwa.moe/tag/womeninnudeart" rel="nofollow noopener" target="_blank">#womeninnudeart</a> <a class="hashtag" href="https://miniwa.moe/tag/eroticart" rel="nofollow noopener" target="_blank">#eroticart</a> <a class="hashtag" href="https://miniwa.moe/tag/cloudflarefree" rel="nofollow noopener" target="_blank">#cloudflareFree</a> unlike <a class="hashtag" href="https://miniwa.moe/tag/loforo" rel="nofollow noopener" target="_blank">#loforo</a>, which is a centrtalized <a class="hashtag" href="https://miniwa.moe/tag/cloudflared" rel="nofollow noopener" target="_blank">#cloudflared</a> controlled. <a class="hashtag" href="https://miniwa.moe/tag/mitm" rel="nofollow noopener" target="_blank">#mitm</a> <a class="hashtag" href="https://miniwa.moe/tag/insecure" rel="nofollow noopener" target="_blank">#insecure</a></p><ul><li><a href="https://kb.mypdns.org/articles/MTX-A-73" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MTX-A-73</a></li><li><a href="https://kb.mypdns.org/articles/MPDNS-A-2" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MPDNS-A-2</a></li></ul>
Ay Papi 🔞 Parental Advisory<p><span class="h-card"><a class="u-url mention" href="https://sloshed.loforo.com" rel="nofollow noopener" target="_blank">@<span>sloshed</span></a></span> </p><p><a class="hashtag" href="https://miniwa.moe/tag/nudephotography" rel="nofollow noopener" target="_blank">#nudephotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartphotography" rel="nofollow noopener" target="_blank">#nudeartphotography</a> <a class="hashtag" href="https://miniwa.moe/tag/nudeartist" rel="nofollow noopener" target="_blank">#nudeartist</a> <a class="hashtag" href="https://miniwa.moe/tag/femaleform" rel="nofollow noopener" target="_blank">#femaleform</a> <a class="hashtag" href="https://miniwa.moe/tag/bodyart" rel="nofollow noopener" target="_blank">#bodyart</a> <a class="hashtag" href="https://miniwa.moe/tag/artnude" rel="nofollow noopener" target="_blank">#artnude</a> <a class="hashtag" href="https://miniwa.moe/tag/artisticnude" rel="nofollow noopener" target="_blank">#artisticnude</a> <a class="hashtag" href="https://miniwa.moe/tag/nudebeauty" rel="nofollow noopener" target="_blank">#nudebeauty</a> <a class="hashtag" href="https://miniwa.moe/tag/womeninnudeart" rel="nofollow noopener" target="_blank">#womeninnudeart</a> <a class="hashtag" href="https://miniwa.moe/tag/eroticart" rel="nofollow noopener" target="_blank">#eroticart</a> <a class="hashtag" href="https://miniwa.moe/tag/cloudflarefree" rel="nofollow noopener" target="_blank">#cloudflareFree</a> unlike <a class="hashtag" href="https://miniwa.moe/tag/loforo" rel="nofollow noopener" target="_blank">#loforo</a>, which is a centrtalized <a class="hashtag" href="https://miniwa.moe/tag/cloudflared" rel="nofollow noopener" target="_blank">#cloudflared</a> controlled. <a class="hashtag" href="https://miniwa.moe/tag/mitm" rel="nofollow noopener" target="_blank">#mitm</a> <a class="hashtag" href="https://miniwa.moe/tag/insecure" rel="nofollow noopener" target="_blank">#insecure</a></p><ul><li><a href="https://kb.mypdns.org/articles/MTX-A-73" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MTX-A-73</a></li><li><a href="https://kb.mypdns.org/articles/MPDNS-A-2" rel="nofollow noopener" target="_blank">https://kb.mypdns.org/articles/MPDNS-A-2</a></li></ul>