Does randomizing your MAC create any usability issues? Needing to log in repeatedly, getting bumped off network due to looking like a different device, anything else hindering usability?
That might not work either. If a server marks it as spam, we do something called blackholing the email, meaning we discard the email and close the connection without responding to the sending server. This is done in an effort to provide as little info as possible to a bad actor.
If you don’t send an email from a server and address deemed reputable and with a low enough spam score, you’ll be shut down by more than 95% of the mail servers out there.
There’s really not enough info here to help you. Are you looking for software? Writing it from scratch? Web tool? Bulk or not?
I don’t know how many addresses you plan on testing on any one server but we’ve been on to this trick for decades now and the firewall will block you from almost every server once you try a non-existent address a few times(for my servers, it’s 2). Many servers also report bot/spam IPs to the ISP and if you get reported enough time, your connection could get shut down.
Man I got so excited about beeper but it just fails to log in to anything I try to set up. FB, sms, anything at all, it successfully logs me in and then hangs on the spinning wheel of death
Thanks very much for the clarification to the context, I really appreciate it as someone who had no idea.
“Proton does not require a recovery address, but in this case the terror suspect added one on their own. We cannot encrypt this data as we need to be able to send an email to that address if the terror suspect wishes to initiate the recovery process,…"
I love that proton kept referring to the user as the “terror suspect” repeatedly so we would know they’re really the good guy here.
I use forwarders on a domain I own that point to my primary acct.
Thanks very much, I believe I understand that part now, like a fingerprint to associate to site components like pulled in js, css, etc. I still don’t understand, though, how they associate that to a particular user of a VPN. Does each request done through a VPN include some sort of identifier for each of us or is AI also doing something to put these requests in a particular user’s bucket?
Anyone have an eli5 explanation of how AITA works? What patterns could be captured and how would that lead to identification or data siphoning?
Laypeople don’t make the distinction between bees. They want to “Save the bees”, not save the honey bees. Of course the sentiment will be exploited by an industry.
Could you explain how separate emails would increase security risk? I ask because I’ve used separate emails for absolutely everything and it has only ever helped me with security( if I get a Microsoft security notice to anything other than Microsoft@mydoma.in, I know it’s not legitimate).
I don’t mean in lieu of 2fa, strong pass, etc, I mean in conjunction. I don’t see how it could hurt.
Freetube with sponsorblock enabled foils all of it.
My gym does this. I carry one my old phones in my console with nothing but the gym app on it. I turn it on when I park, it connects to wifi while I’m walking in, I scan the code then turn it off and throw it in my bag.
I do this for part of my reg forms. I split the reg process into two parts. First, supply email only. This element uses an obfuscated id. Once they do that, the link sent to their email leads to the rest of the process, using no obfuscation. This should keep from breaking password managers.
Regarding login bruteforcing. I give them 3 shots then a cooling down period.
This process has resulted in a 0% success rate for bots so far. We will see how it holds as the domain sees more traffic.
Freetube with sponsor block is a godsend.
Still working for me on Freetube.
You keep saying you’re done but yet here you are, still engaging.
I win because I’ve commented last. Yay, me.
I just watch the filler from the side mirror. When I feel the click of the disengagement, I hop out, give a ground pat to the pump and replace the nozzle.
or… is it?