https://drkt.eu/

This is an alt account, you may see it around. I am not ban-dodging intentionally, I promise!

This is the main
https://scribe.disroot.org/u/drkt

  • 0 Posts
  • 30 Comments
Joined 16 days ago
cake
Cake day: March 16th, 2025

help-circle
  • I wouldn’t even know where to begin, but I also don’t think that what I’m doing is anything special. These NVR IPs are hurling abuse at the whole internet. Anyone listening will have seen them, and anyone paying attention would’ve seen the pattern.

    The NVRs I get the most traffic from have been a known hacked IoT device for a decade and even has a github page explaining how to bypass their authentication and pull out arbitrary files like passwd.



  • I have plenty of spare bandwidth and babysitting-resources so my approach is largely to waste their time. If they poke my honeypot they get poked back and have to escape a tarpit specifically designed to waste their bandwidth above all. It costs me nothing because of my circumstances but I know it costs them because their connections are metered. I also know it works because they largely stop crawling my domains I employ this on. I am essentially making my domains appear hostile.

    It does mean that my residential IP ends up on various blocklists but I’m just at a point in my life where I don’t give an unwiped asshole about it. I can’t access your site? I’m not going to your site, then. Fuck you. I’m not even gonna email you about the false-positive.

    It is also fun to keep a log of which IPs have poked the honeypot have open ports, and to automate a process of siphoning information out of those ports. Finding a lot of hacked NVR’s recently I think are part of some IoT botnet to scrape the internet.









  • Man I’m not going to dive into it but this reads like a FUD piece and I know the article explicitly calls out people who dismiss evidence as FUD, but please read just the first point that ‘Tor is compromised’:

    the agency has worked on several methods that, if successful, would allow the NSA to uncloak anonymous traffic

    If succesful, implying that they haven’t been. I’d love to read the paper but I’m European and they block me from clicking it, citing GDPR issues :-)

    promised to reveal how a $3,000 piece of kit could unmask the IP addresses of Tor hidden services as well as their users.

    a much anticipated talk at the Black Hat hacking conference was abruptly canceled.

    The university cancelled the speech and cited no reasons but I can think of several legal ones even if the device didn’t work. No proof.

    the FBI is able to de-anonymize Tor users and discover their real IP address remains classified information. In a 2017 court case, the FBI refused to divulge how it was able to do this,

    I can fly. No, I don’t have to prove it.


  • What kind of car you like is one thing but does he understand that when he sits at a café next to a busy, congested road and blame the cyclists for the congestion that he’s actually just factually wrong? Because I don’t think he knows that. Jeremy Clarkson is fiercely anti-bicycle and until he says, in front of an audience, that he’s wrong about this and will stop spewing vitriol at bicyclists, I frankly don’t care about him.









  • You can boil the logic down and apply it however you want. The fact is that different people have different levels of tolerance for bullshit and VPN users are a large source of it. TOR is also inherently harmless but exit nodes end up on banlists everywhere because malicious users use them to the point that exit nodes are pre-emptively banned in a lot of places because some people just don’t wanna deal with it. The big email providers have a zero-tolerance policy for the same reason; if your domain misbehaves even once then you’re on the shit-list forever because it’s not worth playing whack-a-mole with malicious actors.