news
Welcome to c/news! Please read the Hexbear Code of Conduct and remember... we're all comrades here.
Rules:
-- PLEASE KEEP POST TITLES INFORMATIVE --
-- Overly editorialized titles, particularly if they link to opinion pieces, may get your post removed. --
-- All posts must include a link to their source. Screenshots are fine IF you include the link in the post body. --
-- If you are citing a twitter post as news please include not just the twitter.com in your links but also nitter.net (or another Nitter instance). There is also a Firefox extension that can redirect Twitter links to a Nitter instance: https://addons.mozilla.org/en-US/firefox/addon/libredirect/ or archive them as you would any other reactionary source using e.g. https://archive.today/ . Twitter screenshots still need to be sourced or they will be removed --
-- Mass tagging comm moderators across multiple posts like a broken markov chain bot will result in a comm ban--
-- Repeated consecutive posting of reactionary sources, fake news, misleading / outdated news, false alarms over ghoul deaths, and/or shitposts will result in a comm ban.--
-- Neglecting to use content warnings or NSFW when dealing with disturbing content will be removed until in compliance. Users who are consecutively reported due to failing to use content warnings or NSFW tags when commenting on or posting disturbing content will result in the user being banned. --
-- Using April 1st as an excuse to post fake headlines, like the resurrection of Kissinger while he is still fortunately dead, will result in the poster being thrown in the gamer gulag and be sentenced to play and beat trashy mobile games like 'Raid: Shadow Legends' in order to be rehabilitated back into general society. --
view the rest of the comments
Yes, they are mapping human networks because humans are the weakest link in any security. Once you know who's talking with whom, when, where, and how frequently, you can essentially get anything you need by finding the weakest links and exploiting them.
There's an old exercise that shows you dont even have to exploit them. Just knowing the metadata can tell you a loooot.
What old exercise? Reading about cryptography and network stuff involves wading through a lot of weird blog posts and github and mastodon discussions for me. There has got be a better way.
It's kinda funny because 90% of the traffic is just going to be people connecting to whatever online service with known public IPs. But I guess that tells you what household is using what online service. Maybe which businesses are doing network communication with what other businesses i.e. they have some kind of data integration, etc.
Plus you can (sometimes) easily correlate an IP address with an online advertising ID...
Another interesting thing to know would be how detailed the routing table information different countries and intelligence agencies have. You can easily use a service that can tell you where you are located based on your IP address, but it's usually limited to city, state/province, or country. I wonder if for example, the US has the routing tables for specific Chinese neighborhoods or specific houses or apartments.