• 1 Post
  • 2.05K Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle







  • Certain types of broadcast traffic always get re-broadcast from of every port on a switch. So if you directly connect two ports, and you get some broadcast coming into the switch, that broadcast will loop forever across that loopback, and then get propagated repeatedly until it hits a broadcast boundary. It’s surprisingly difficult to prevent even with managed switches unless you are willing to hand manage every port and significantly restrict the kind of network services which can flow through it.

    Some devices can detect these loops and break them, but that can have other unintended impacts if your network is designed (some would argue poorly) around using dumb switches to multiply limited Ethernet drops at the edge.


  • Yup, the good old “loopback FU.”

    Routers do have some protections which can mitigate this, but the entire problem is broadcast flooding which can’t really be dealt with at later 2, or even at layer 3 within the same segment. Most places will have no broadcast forwarding between segments, but even if you detect unusual broadcast activity and ban that class of traffic, you break other things. A lot of times it is ARP floods, so it doesn’t happen when the network is static and converged until someone plugs a new laptop in, and then everyone assumes it’s that laptop.









  • Socsa@sh.itjust.worksto196@lemmy.blahaj.zoneyikes rule
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    5 days ago

    That was pretty apparent to me from the first chapter of the first book. I never got the hype and thought her writing was pretty bad, even by the YA standards of the time. Like, Piers Anthony farts out better YA fantasy on the toilet every morning, but Rowling writes some toddler-speak and everyone loses their fucking mind?


  • Socsa@sh.itjust.worksto196@lemmy.blahaj.zoneyikes rule
    link
    fedilink
    arrow-up
    11
    ·
    edit-2
    5 days ago

    It’s even more insidious than this. In many conservative value sets, children are viewed as property, and domestic issues are viewed as household business. Many many cases of obvious CSA (and physical abuse in general) over the decades have been dismissed as “I’m sure the parents know best,” or “it’s not our business,” or “I’m sure we don’t know the whole story.” It was only very recently that this veil was pierced even a little bit, but it was not without significant struggle. And even now there is a growing backlash to the idea that children are to be allowed any autonomy or agency beyond their parents. Many people still believe it is is ok to hit children, or that children should not be allowed to use a nickname in school. These are all vestiges or even new iterations of this exact same attitude which has enabled all manner of child abuse over the years.

    Make no mistake, in the conservative worldview, child abuse is still, to this day, only bad if the parents say it is bad.


  • With a VPN, the only real attack vector here is to block the VPN traffic and hope the user disables it or doesn’t notice it didn’t connect. No modern VPN will handshake with a spoofed server so it will just never connect. In some cases, the connection might fail silently enough to fool someone like this, but basically every mainstream app these days is pretty vocal about that for exactly this reason. As of Android 13, the default behavior is never to pass traffic outside the VPN unless the user explicitly turns it off. On other platforms this is dependent on the specific app.