Gellis12

joined 1 year ago
[–] Gellis12@lemmy.ca 1 points 1 year ago

If they did, I haven't heard about it. China has been trying and failing to block tor for decades though, so I kinda doubt Russia managed to beat them to it overnight.

[–] Gellis12@lemmy.ca 1 points 1 year ago

If you're just looking for remote access, openvpn on port 443 should (in theory) be indistinguishable from normal https traffic.

[–] Gellis12@lemmy.ca 9 points 1 year ago (4 children)

Tor. It's free, it works, and there's nobody to sell you out when the cops come knocking.

[–] Gellis12@lemmy.ca 0 points 1 year ago (1 children)

I'm out of the loop, what's the context for all this?

[–] Gellis12@lemmy.ca 1 points 1 year ago

Here's a quick bash script if anyone wants to help flood the attackers with garbage data to hopefully slow them down: while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date) | shasum | sed 's/.\{3\}$//' | base64); sleep 1; done

Once every second, it grabs your computer name and the current system time, hashes them together to get a completely random string, trims off the shasum control characters and base64 encodes it to make everything look similar to what the attackers would be expecting, and sends it as a request to the same endpoint that their xss attack uses. It'll run on Linux and macOS (and windows if you have a WSL vm set up!) and uses next to nothing in terms of system resources.

[–] Gellis12@lemmy.ca 1 points 1 year ago

I still run my own xmpp server!

But I'm the only one who has an account on it :/