Centroid.EU Blog

(this blog is mostly encrypted - adults only)

Previous Page

Protesting: My experience and recommendations (in hindsight)

June 5th, 2020

I attended protests in 2001. Here is some recommendations in hindsight.

  • Don't go alone
  • Have someone be the getaway driver
  • Have a network of people getting you out
  • Never say your real name, unless you have a big network
  • In my experience they got me before I realised what happened
  • You'll be "charged up" your nerves will/may not take it
  • Know your group, stay with it, don't get split
  • When I protested there was two groups in the end
  • It's a scary experience once you've been through it
  • Protesting alone is stupid, you'll be first one taken
These are the things I wished I would have done before listening to the radio to "come out!". I'm here now, but where am I?


Introducing: Project STARGATE

June 5th, 2020

I could only find this in english wikipedia. You can translate it in your browser. Apparently Project STARGATE used psychics (with psychedelic drugs?) to achieve a tactical and strategic advantage (my conclusion). Take it with a grain of salt, since it is wikipedia after all. If these allegations are true, then that would make the psychics prisoners of the military. This is not good, nada.


Golem.de - how do you know?

June 5th, 2020

Golem.de claims in a story to know the internal systems of the B-21 bomber. How do you know? Have you been listening to psychics or something?


I've decided to go off my medication

June 3rd, 2020

I don't need this anymore.


It was a murder of crows

June 3th, 2020

Ra, Ra, Ra!


BSI uses Alg 5 for bsi-fuer-buerger.de

June 3rd, 2020

I informed myself on the BSI website about the Buerger CERT and found that their DNSSEC is signed with Algorithm 5.

   | Number | Mnemonics          | DNSSEC Signing  | DNSSEC Validation |
   | 1      | RSAMD5             | MUST NOT        | MUST NOT          |
   | 3      | DSA                | MUST NOT        | MUST NOT          |
   | 5      | RSASHA1            | NOT RECOMMENDED | MUST              |

According to RFC 8624 this algorithm is not recommended. BSI if you read this please consider upgrading / hiring human resources.


Goldflipper is back in the news

May 29th, 2020

Goldflipper is back in the news. The green lit panel was in a vision. I seem to recall that I still see floaters in my eyes.


Hacks, network security etc.

May 28th, 2020

The low hanging fruits were already gone 20 years ago. Sophistication can likely only be aquired with larger teams. This is not to say that this should be done. However, to learn that a backdoor exists for example, proof of concepts could be done in teams. Likely at the NSA or someone. I have a book here that covers amplification denial of service tools in an entire chapter or so. Likely wasted space these days. These books are very thick and several volumes. Likely they can be cut down.

When reading source code, which is a very memory and mental intensive work, you should likely approach this systemically by working down a list. I've in the past taken stabs at source code reading but it wasn't systemically. Also set your goals low, an entire OS for reading is not likely going to work. Seek help as in human resources. I've made my own programs so that I can practice reading on that over other programs. I think I'll pick this up once my headache clears.


Can't judge a book by its cover

May 28th, 2020

This is an idiom, to describe that you can't quickly look at something and make a determined diagnosis of it. Take a picture album. These are just slices of your life perhaps but don't tell the entire story. They are snapshots in time. You don't see progress in these slices. In fact the photos only tell a story, in the photographers eyes, who may or may not be trustworthy. When I look into a photo album I see that I have no eyes. There is no eyes. Since birth.


Back for now

May 28th, 2020

The last few days I reinstalled all my servers. I had a rootkit installed on both of them. A third server which was a scaleway linux host I turned off because I could not deal with them right now. I'll leave that server in an off state for a month in order to decide if I want to keep it or not. I have updated my DNS servers for all my zones. I'll likely have to also rotate the DNSSEC keys. You can't trust what's coming from centroid.eu as much as google.com (which is unsigned). Treat it as unsigned DNS info even though it has a signature, until I have changed all KSK and ZSK's.

I believe the breach occured through BIND or opensmtpd. There was a window of opportunity with opensmtpd for someone to gain root access. Sure it's been a while but I didn't see evidence for a breach for some time. In regards to BIND, I'm just assuming becuase it displayed weird behaviour. Make sure if you have a similar setup as mine (if you know), that your nameservers are in order and both resolve to forward AND reverse dns to the same name.


Next Page


RSS Feed

Click here for RSS

On this day in

Other links

Have feedback?

By clicking on the header of an article you will be served a cookie. If you do not agree to this do not click on the header. Thanks!

Using a text-based webbrowser?

... such as lynx? Welcome back it's working again for the time being.

Older Blog Entries

Powered by BCHS