What i did to circomvent being banned from another site
What i did to circomvent being banned from another site
I used to go on a website. One day, it censored me for reason i do not know.
What i did to circomvent this censorship :
Any one of these changes may have been enough alone, but i used them collectively to get around censorship.
First, i changed my mac address with macchanger from Ubuntu repositories. Now my mac address is randomly changed at each boot.
https://www.linuxuprising.com/2018/05/h ... dress.html
Also i changed the country from which i connect to the Web with a VPN (Germany)
Then i used firejail to use 1.1.1.1 as my DNS and removed all addons to offer another fingerprint profile :
firejail --private --caps.drop=all --dns=1.1.1.1 --dns=1.0.0.1 firefox -no-remote
It takes a few minutes to change mac address ramdomly at boot, but all other changes are done rapidly, and as a result i have access to a website i used to go previously without any censorship.
Mac Address : changed
DNS : Changed
Browser Fingerprint : changed
Country : changed
Result : Access to website
What i did to circomvent this censorship :
Any one of these changes may have been enough alone, but i used them collectively to get around censorship.
First, i changed my mac address with macchanger from Ubuntu repositories. Now my mac address is randomly changed at each boot.
https://www.linuxuprising.com/2018/05/h ... dress.html
Also i changed the country from which i connect to the Web with a VPN (Germany)
Then i used firejail to use 1.1.1.1 as my DNS and removed all addons to offer another fingerprint profile :
firejail --private --caps.drop=all --dns=1.1.1.1 --dns=1.0.0.1 firefox -no-remote
It takes a few minutes to change mac address ramdomly at boot, but all other changes are done rapidly, and as a result i have access to a website i used to go previously without any censorship.
Mac Address : changed
DNS : Changed
Browser Fingerprint : changed
Country : changed
Result : Access to website
Re: What i did to circomvent being banned from another site
mac address is completely irrelevant, labbe. It is only used during ARP on local network to physically directly connected machines (i.e. same LAN). Mac address does not get encapsulated in TCP/IP protocol packages that get routed out onto the Internet [though ARP happens between each LAN onroute to the destination, but the MAC addresses belong to the machines (routers) communicating the IP message segment(s) on each segment; the MAC address of your machine is not at all propagated outside outside of your own LAN so is not used in determining censorship - your IP address could be though if that is how the blocking system has been set up].labbe5 wrote:
What i did to circomvent this censorship :
Any one of these changes may have been enough alone, but i used them collectively to get around censorship.
First, i changed my mac address with macchanger from Ubuntu repositories. Now my mac address is randomly changed at each boot.
wiak
WeeDogLinux forum: https://weedoglinux.rockedge.org/viewforum.php?f=4
Tiny Linux Blog: https://www.tinylinux.info/
Check Firmware: http://murga-linux.com/puppy/viewtopic.php?p=1022797
Tiny Linux Blog: https://www.tinylinux.info/
Check Firmware: http://murga-linux.com/puppy/viewtopic.php?p=1022797
labbe5,
Did you ever ask why you were banned?
People run web sites and they can make mistakes.
Did you ever ask why you were banned?
People run web sites and they can make mistakes.
The things they do not tell you, are usually the clue to solving the problem.
When I was a kid I wanted to be older.... This is not what I expected
YaPI(any iso installer)
When I was a kid I wanted to be older.... This is not what I expected
YaPI(any iso installer)
- Moose On The Loose
- Posts: 965
- Joined: Thu 24 Feb 2011, 14:54
I suspect the answer is "slightly but yes"BarryK wrote:Interesting!
Excuse me for changing the subject, but regarding mac address, if I was to post my mac address, perhaps while debugging wifi, to this forum, would that in any way be a security risk for me?
The bad guys would then have a MAC address and perhaps from other places the OS being run and web browser etc.
They would then be able to rule out some attack methods so they only need to try fewer of them.
They also may be able to pretend to be you somehow.
BTW: Running Puppy on VirtualBox on Puppy seems to me to be the safest way to go.
Either GNU Icecat or Ungoogled-Chromium if you want the best security/privacy.Lobster wrote:> BTW: Running Puppy on VirtualBox on Puppy seems to me to be the safest way to go.
which modernish browser, apart from Tor, which is too slow
would you recommend?
Vivaldi has a lot of inbuilt security but I am glad to consider others ...
We are rooting for Puppy
See:
https://www.facebook.com/notes/ethical- ... 080045548/
Last edited by s243a on Tue 22 Oct 2019, 01:02, edited 1 time in total.
Find me on [url=https://www.minds.com/ns_tidder]minds[/url] and on [url=https://www.pearltrees.com/s243a/puppy-linux/id12399810]pearltrees[/url].
I can't see how it would risk anything. I don't know if it is still the case, but I read that many years ago some mass-produced cheap Network Interface Cards sometimes ended up having same MAC address (a bit like cheap bicycle locks). That wouldn't cause a problem if used on different LAN segments; one exception I suppose would be if a Router was configured to do proxy ARP since that allows a broadcast ARP for a particular IP host to be replied to by the router (telling the source to send the packet to it) rather than the actual host on the other side of the router. But I am pretty sure proxy ARP can't be cascaded to answer for a host several LAN segments away (and wouldn't be in practice anyway).BarryK wrote:Interesting!
Excuse me for changing the subject, but regarding mac address, if I was to post my mac address, perhaps while debugging wifi, to this forum, would that in any way be a security risk for me?
A router several segments away might end up doing proxy ARP to final destination (e.g. NAT firewall) but it still doesn't forward the original source machines ARP address. Of course if a distant machine did somehow know of a sender's MAC address I suppose in theory it could remotely configure some other machine on original LAN to have same MAC address and read packets at link layer not destined for it, but since ARP doesn't propagate original MAC then no real issue that I can think of (but hackers are inventive...).
https://en.wikipedia.org/wiki/Proxy_ARP
wiak
WeeDogLinux forum: https://weedoglinux.rockedge.org/viewforum.php?f=4
Tiny Linux Blog: https://www.tinylinux.info/
Check Firmware: http://murga-linux.com/puppy/viewtopic.php?p=1022797
Tiny Linux Blog: https://www.tinylinux.info/
Check Firmware: http://murga-linux.com/puppy/viewtopic.php?p=1022797