Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:00
The. Two
0:02
and a Half Admins Episode One Nine, Five. I.
0:04
Am Jog. I'm. Jim and I'm Alan.
0:07
And he were again. Has. Windows
0:09
Eleven Really last market share to Windows
0:11
Ten? Probably? Well, this is based on
0:13
the register. And they talk
0:16
about some stats they've got from
0:18
Statcounter, which I'm always a little
0:20
bit dubious about to be honest,
0:22
but I wouldn't be that surprised.
0:24
If. Windows Ten was slightly going vs
0:26
Windows Eleven. I would be surprised either.
0:28
There's an awful lot of people that
0:30
are buying refurbished Pcs and they get
0:32
whatever operating system comes on it. They're
0:35
absolutely are people who are nuking their
0:37
Windows Eleven off of newly bought pcs
0:39
and going back to Windows Ten. And.
0:42
I think a lot of the reason
0:44
for that. You know, everybody points at
0:46
the honor his hardware requirements one is
0:48
eleven, but I don't think that's a
0:50
reason for the market. Sure, that actually
0:52
declined from where it was originally. However,
0:54
you look at things like you know,
0:56
the ads inject into the start menu
0:58
and just a noxious annoyances like copy
1:00
and paste disappearing off the context menu
1:02
unless you click a more to see
1:04
him. There's a lot of paper cuts
1:06
there that genuinely piss people off, and
1:08
I don't find it difficult to imagine
1:10
that people are actively. Avoiding it. Even.
1:13
To the level of actually wiping out eleven
1:15
England accent in some cases. I. Think
1:17
it's more likely to be. Static.
1:20
Then really changing massive A because
1:22
anyone who's gonna go to Windows
1:24
Eleven. Has. Gone to another live
1:27
and surely if you've got brand new hardware
1:29
that needs it Obviously you could run linux
1:31
or whatever but if you're in the Windows
1:33
world then if it's to modern then your
1:35
only option is eleven. And if
1:37
you got relatively modern hardware then if you
1:39
gonna upgrade you would have done it by
1:41
now. So. It's people who either
1:44
just don't want to or can't officially
1:46
because they've got to get our fifth,
1:48
sixth generation, I five, or whatever. Well,
1:50
I think there are some scenarios that
1:52
you're not considering it is. It's really
1:54
weird from Windows Eleven to have had
1:57
to the dominant market share and then
1:59
to D. increase relative to 10. And
2:02
the most plausible way that I see that happening
2:04
again is really refurbished PC sales, which are
2:07
everywhere right now. Oh yeah.
2:10
I mean, you can imagine, for example, and this
2:12
is all, we're talking straight out of our butts
2:14
here, but for example,
2:16
imagine somebody who goes to Walmart
2:18
and buys the cheapest possible Windows
2:20
11 computer, absolutely freaking hates it,
2:23
gets rid of it, and then buys a
2:25
refurbished Windows 10 PC for the same amount
2:27
of money or less off of Amazon. Well,
2:30
you just went down one Windows 11 and up
2:32
one Windows 10. Even though
2:34
you didn't actually change the OS installed
2:36
on the actual hardware, nobody
2:38
was using that Windows 11 machine that you bought
2:40
from Walmart until you bought it. And then you
2:43
bought it and stopped using it and now nobody's
2:45
using it. Nobody was using that refurbished Windows 10
2:47
PC since it had gone in
2:49
for refurbishment until you bought it. And now
2:51
you bought it and you're using it. So
2:54
you add that to the people who have gone
2:56
and wiped out Windows 11 and reinstalled Windows 10
2:59
on their own hardware, new or old, when they decide
3:01
they don't like it badly enough to be willing to
3:03
get rid of it. And again, I
3:06
don't have a whole lot of trouble seeing this
3:08
one. Now I doubt the market share has changed
3:11
massively, but any
3:13
amount down on a
3:15
deprecated operating system, well, that's
3:17
pretty big news. Yeah. And
3:20
I think there are some other explanations here
3:22
as well. The fact that this
3:24
is the percentage of traffic they saw and
3:26
not raw numbers might mean that actually
3:29
the number of computers they saw running Windows 10 and
3:31
Windows 11 both went up just
3:33
by different amounts. Depending how
3:35
they capture this, it might be that people that
3:37
were using Windows 11 were using
3:39
two browsers and went to using one browser and don't
3:41
get counted as two people anymore. Like
3:44
how much did the Microsoft changing
3:46
around Windows Edge browser or whatever
3:48
mean that, especially when they kept
3:51
making, if you try to open
3:53
something for Microsoft Teams, it opens in Edge
3:55
no matter what browser is actually your
3:57
default browser in your operating system. then
4:00
you're now two separate computers. And
4:03
maybe some of that accounted for a
4:05
bunch of corporate Windows 10 machines getting counted as
4:07
two machines because people use Firefox or Chrome, but
4:10
every time they click on a link in stupid
4:12
teams, it opens in a stupid edge browser and
4:14
things like that. Maybe. But also
4:16
looking over the same time period, maybe
4:18
the bigger story is that the Windows
4:20
7 percentage has dropped like a
4:22
full percent over that same time span. And
4:24
that's like a third of the difference between
4:26
the Windows 10 and Windows 11 is it
4:28
is. How many people are still using
4:30
Windows 7? And the fact
4:33
that that's actually trailing off at a
4:35
whole percent over the one year time span
4:37
of the graph. That's a good
4:39
point. We could also be seeing Windows 7 users who
4:41
are giving up and getting new computers, getting
4:44
computers in Windows 10 instead of Windows 11. Yeah.
4:47
Yeah, because computers are much better than they
4:49
used to be. Alan, your laptop
4:51
is an X270, right? Yeah,
4:53
X270. Which is not capable technically
4:55
of running Windows 11, but it is still a
4:58
very capable machine. Yeah, I just wish I had
5:00
a little bit more RAM. Yeah.
5:03
But that is a perfectly capable
5:05
machine for the vast majority of computer users,
5:08
but it can only officially run Windows 10. And
5:11
so you've got all of these old
5:13
machines knocking around that are now relatively
5:15
cheap. I mean, you can pick up an X270 for
5:18
less than a hundred pounds in the UK, but
5:21
it's only ever gonna run Windows 10 unless you start
5:23
hacking it, which we've talked about before, which normal people
5:25
don't do. Or you know, you bite your bun to
5:27
on it or something. Yeah, well exactly, which is of
5:29
course what I would do, but normal
5:31
people don't, they stick with Windows. And
5:34
could it be that you've got all these
5:36
capable machines which are now relatively cheap because
5:39
they can't run Windows 11, and
5:41
people are picking them up and using them with Windows
5:43
10, which is still supported technically. Well, I mean, it's
5:45
the same thing I already said, which is, you know,
5:48
I personally think a lot of this is gonna have
5:50
to do with refurbished PC purchases. And essentially, you just
5:52
said the same thing. Yeah, I
5:54
guess so. Yeah, the other thing is also
5:56
definitely consider the source, stackcounter.com.
5:59
It's like how many... people are using Stack Counter
6:01
on their website anymore. Quite
6:03
a few, to be fair. It is a
6:05
lot of websites have got this code tracking
6:07
people, but like I said,
6:10
I'm always a bit dubious of anything
6:12
that is web-based because you
6:14
get into like huge networks behind that and
6:16
stuff, how many, you know, hundreds of machines
6:18
are actually being counted as one and stuff.
6:21
Right, or the fact that my TV computer
6:23
pretends to be a Samsung Smart TV so
6:25
that it'll get the TV version of YouTube
6:27
instead of the desktop version of YouTube. I
6:30
think that is an anomaly though. I don't think normal people
6:32
do that, Alan. Also the stackcounter.com
6:34
stuff, I'm not sure I believe how
6:36
low the percentage of Firefox they claim
6:39
is and that Opera is as popular
6:41
as Firefox. I believe that. Firefox has
6:43
definitely been trending down, but I don't
6:46
think Firefox only accounts for 3%
6:48
of internet traffic now. I think that's probably
6:50
accurate actually. Why is everybody giving up on
6:53
Firefox so much? That
6:55
is about three shows worth of
6:57
conversation and not for today. The
7:00
short version, Edge is Chromium based
7:02
now. Yeah, but even Edge is only accounting
7:04
for 5% on this stackcounter.com
7:07
stats. I think if you look at
7:09
stats from a different website, you will see different
7:11
numbers. But the bottom line is that these
7:14
are just sort of educated guesswork, let's
7:16
just say, but Microsoft actually has the
7:18
proper stats because you know that Windows
7:20
is phoning home and telling them. So
7:23
they must be worried about this, surely.
7:26
What are they going to do about it? I think they're
7:28
just going to say where Microsoft and the world will have
7:30
to adjust sooner or later. They
7:33
can wait it out. What are you going to
7:35
do? Stop using Windows? It's talking to you slash
7:37
Linux, yeah. Yeah, stopping using Windows is not necessarily
7:39
that bad. But you know, if you're talking in
7:41
a business especially, well, you know, you're not just
7:43
stopping using Windows, you're stopping using Windows. You're
7:46
stopping using, you know, Autodesk products. You're
7:48
stopping using Matlab. You're
7:50
stopping using Adobe products.
7:53
Basically, you just locked yourself out of
7:56
the entire software ecosystem that
7:58
you need to communicate with. you know, peers,
8:01
customers, upstream alike. So Microsoft
8:03
is just banking on people
8:06
having to buy new machines, all
8:09
around Windows 10 unsupported then. You
8:11
may have noticed this is not
8:13
Microsoft's first near universally hated version
8:15
of Windows. And it doesn't
8:17
seem to slow them down a whole lot. But
8:19
I don't even think that Windows 11 is particularly
8:21
hated. Like, yeah, okay, the ads and stuff
8:23
piss people off, but I think it's
8:26
much more about the hardware requirements, which you want
8:28
to play down, Jim. I do want to
8:30
play it down because it really doesn't
8:32
matter except for at the
8:34
very bottom end of the spectrum. If you're buying
8:36
a new machine, it's going to be Windows 11
8:38
capable. Yeah. It's when you're like looking at old
8:40
stuff and buying old stuff. And I don't mean
8:42
from last year, I don't mean from two years
8:44
ago, I don't mean from three years ago. When
8:47
you're buying stuff that is well past
8:49
the normal business life
8:51
cycle for computers, let alone like enterprise
8:54
life cycle. That's the
8:56
only way that those hardware requirements are really going to
8:58
cause you a problem. If
9:00
you're Microsoft, you don't care about that.
9:02
Those people weren't making you any damn
9:05
money on Windows sales anyway because
9:07
they're just another person getting the same
9:09
use out of the same license fee
9:11
that was paid like a decade ago
9:13
by somebody different. Yeah,
9:16
and I think the way we're likely to
9:18
see this go is Microsoft changing to more
9:20
and more of a subscription model where you're
9:22
just going to get the operating system
9:24
changed out from under you. Like
9:26
probably aren't going to be releases of
9:29
Windows anymore so much as just every
9:32
half a year, there's a new update
9:34
and it's the new version of Windows. And you
9:36
either install the updates and get security updates or
9:39
you don't. Okay,
9:41
this episode is sponsored by Tailscale.
9:43
Go to tailscale.com/25A. Tailscale
9:47
is an intuitive programmable way to manage
9:49
a private network. It's
9:51
zero trust network access that every organization
9:54
can use. And with Tailscale's
9:56
ACL policies, you can security control
9:58
access to devices. and services
10:00
with next-gen network access controls. Loads
10:03
of the late night Linux family
10:06
hosts use Tailscale for all sorts,
10:08
including controlling 3D printers, remoting into
10:10
their relative systems for support, controlling
10:12
home assistant, and sending
10:14
ZFS snapshots to off-site backup locations.
10:17
I got it set up in minutes, and you can too.
10:20
So support the show and check out Tailscale
10:22
for yourself. Go to tailscale.com,
10:24
slash, two, five, eight, and try
10:26
out Tailscale for free for up
10:28
to 100 devices and three users
10:30
with no credit card required. That's
10:33
tailscale.com, slash, two,
10:35
five, eight. Novel
10:38
attack against virtually all VPN
10:40
apps mutors their entire purpose.
10:43
I kind of have to push back a little on the
10:45
headline thing. This is a novel attack. Like, maybe
10:48
people are just kind of thinking of it
10:50
now, but it's not even really like hacking.
10:52
It's just using one of the built-in options
10:54
to the DHCP protocol. When you
10:56
have a laptop or another machine that gets
10:59
an IP address automatically from the network, that
11:01
protocol is DHCP, the Dynamic Host Configuration Protocol.
11:04
And there's a seldom used option that's
11:06
been in there, I mean, from day
11:08
one. It's option 121, and option 121
11:10
will basically allow the
11:14
DHCP operator to configure static routes on any
11:17
machines that are grabbing DHCP from it. So
11:19
by doing that, you can put an attacker in the
11:21
middle of any stream of traffic to any machine that's
11:24
getting an IP address automatically from you. Now,
11:26
that's not going to affect anybody who's
11:28
configured their IP address statically. So
11:30
one thing that you could do, if you're feeling really
11:32
paranoid about this, you're on a network where you don't
11:35
trust the DHCP server, you can
11:37
grab the DHCP, the IP
11:39
address from DHCP, you can see
11:41
what that IP configuration information is, then you
11:43
can go back and turn your interface back
11:45
to static, not dynamic, and put in the
11:48
same information the DHCP server just gave you.
11:50
Now, that's not necessarily gonna work forever, because
11:52
the DHCP server is gonna try to hand
11:54
that IP address out again, whenever It least
11:56
expires, might be an hour, might be a day, might be
11:59
a week. But. That will be
12:01
good enough for right now to say hey
12:03
our be able to get on this network
12:05
and do something right now and not have
12:07
for about option one. Twenty one screwed me
12:10
over there. The other thing obviously the chicken
12:12
do as you can just look at your
12:14
own route tape on seekers. Anything goofy in
12:16
there on most people's machines? there should not
12:18
be that many different route showing up the
12:21
route table. You have one route for the
12:23
fall gateway. If you've got a Vpn up,
12:25
you've got another route that goes through the
12:27
Vpn gateway out it's interface and that's usually
12:29
just about. It If you see other things
12:32
popping up that take priority over your Vpn
12:34
route than you know. Okay, I should be
12:36
concerned about this and I should be looking
12:38
at ways to changes of routing. Table back
12:40
the what it should be. There.
12:42
So looking in this more I see. How.
12:46
Is. It because you have my thought at
12:48
first and like will have the time for
12:50
them to control the deeds of the server
12:52
inside my Vpn. but it's actually not that
12:54
it's just taking troll for example, reduce speed
12:56
server or a D C V server on
12:59
the public. Why fi that you're on when
13:01
you get an Ip address from the public
13:03
Why fight It also says oh and to
13:05
get to tend to attend Attended Zero Five
13:07
Twenty Four also wrote it via. The.
13:09
Attackers machine on the public why Fi
13:11
and then when you start to the
13:14
Vpn that one address is now still
13:16
routed not over the Vpn but has
13:18
a more specific grub to say over
13:20
the public life. I and for you
13:22
could do this to purposely mates or
13:25
any traffic the target user is trying
13:27
to go over the weekend to. Their.
13:29
Bank or something is going to that.
13:31
One bite of I peace will be
13:33
routed to the attacker over the regular
13:36
local. That worth it. To be clear
13:38
the Dtp server were talking about very
13:40
specifically the deeds he be server. For
13:42
the real network that you're connected to
13:44
with your Vpn virtual interface has dig
13:46
route it's traffic out over. If
13:49
that the Atp server is is pushing malicious
13:51
routes to the option one Twenty One one.
13:53
That's what you have to worry about and
13:55
there's not many ways to deal with this
13:58
right now because again, this is. It
14:00
actually a hack. It's not an attack,
14:02
it's just using. Option is actually supposed
14:04
to be there that people mostly just
14:07
kind of her about. So on. Android
14:09
the my knowledge is the only operating
14:11
system right now that actually can be
14:14
entirely immune to this, even Linux and
14:16
free Bst. If you use option One
14:18
Twenty one, they'll take it and they'll
14:20
also the route table so I don't
14:23
know of a more reliable mitigation and
14:25
literally disconnecting and turning off. or d
14:27
be quiet and just putting the information.
14:30
And statically, that's the only way I know
14:32
of right now. You can be absolutely certain
14:34
that optional and forty one isn't the screw
14:36
your out they will in previous d in
14:38
the Dcp client computers and you can set
14:40
options to ignore seated say if you see
14:42
a notion went forty one from anybody just.
14:45
Don't follow it as a Clara Extended
14:47
do Computers and to be able to
14:49
do that from Awful interfaces. Really?
14:51
Customer who needed to interfaces to both B D
14:53
C P but to ignore the default wrote that
14:56
came from one of them so that only one
14:58
of a must for the internet but the other
15:00
one with so we get it's address or with
15:02
that said it is a rid of money to
15:04
the. And then from the other
15:06
side of that many switches have options
15:08
to try to isolate rogue Dcp service
15:10
where they will be like okay only
15:13
this part is allowed to have answers
15:15
to the D C P requests and
15:17
stop what happens that many offices somebody
15:19
accidently pugs in a machine that had
15:22
when does his old like internet connection
15:24
sharing or something configured and the and
15:26
of with a D C V server
15:28
that's not the right Dcp server giving
15:31
out random Ip addresses on your network
15:33
and then people. When they're
15:35
computer gets an address on that one
15:37
because it's one millisecond closer on the
15:39
network than the internet southworth him. As
15:42
you get rid on the switch, this is not usually
15:44
something that you're going to be worried about in that
15:46
particular environment. Delivered me something you're worried about. For.
15:48
Example: If your Starbucks it doesn't matter what
15:51
grade switch the Starbucks has in the back
15:53
office for you can't see it because you're
15:55
real concerns me somebody with a life I
15:57
pineapple the his just made a copycat as
15:59
as. D And there is no
16:01
mitigation there if your system sees
16:03
the access point that's actually the
16:06
wife I pineapple in the bad
16:08
guys backpacks saying Starbucks and chooses
16:10
to join that one rather the
16:12
actual Starbucks A P Which also
16:14
says aside, the Starbucks well it
16:16
as it. He. Joined around one
16:18
and. Your man, the Middle
16:20
Eastern. You have to be the wrong one,
16:23
right? They could pay to connect to the
16:25
real Starbucks. Why fire and front a D
16:27
C server to fit answers faster than the
16:29
Starbucks T V server than that the address
16:31
your vicinity. Well. Yes, except that
16:34
in that case, not. And I'm
16:36
not trying to claim that Starbucks
16:38
actually has like advanced mitigation measures,
16:40
but at least in theory, like
16:42
if you're just wearing a road
16:44
D C P on the actual
16:46
Why Fi network. Well, the actual
16:48
Why Fi network itself can block
16:50
that and may very well be
16:52
configured to block that. But if
16:54
you're just spinning up a copycat
16:57
as society with the Why Five
16:59
Pineapple or just a random consumer
17:01
router or whatever, than. The others. There's
17:03
no mitigation. They're. The. Only thing you
17:05
can hope at that point like if you're
17:07
the admin of the Starbucks or the wherever
17:09
maybe you've got to that automatically detect rogue
17:11
access points popping up within range of your
17:13
access points and you can say oh we
17:16
as the a rogue a p that broadcasting
17:18
mon a society it's time to find that
17:20
person the on the hell out of my
17:22
store. But as a customer or user now
17:24
you're you're not gonna know, you're not really
17:26
gonna have the way. I can't
17:28
be the only person who feels like
17:30
option one Twenty one is something that
17:32
poverty would activate. It. Does sound an
17:34
awful lot like order sixty six thousand had.
17:38
This. Is some feedback? San Sebastian
17:40
Rise! Please. Consider saying renting
17:42
as says boy and when talking
17:45
about domains. I'm also shots
17:47
change my own dialogue about it because renting
17:49
is a more correct description. Absolutely.
17:51
Fair point. John thought about it by Fight for
17:53
such as sincere to pay for it yet every
17:55
year in the proceeds going up. Yeah, I don't
17:57
want to call it buying and up renting really.
17:59
The. the renting doesn't sound very
18:01
tony and when domains first became
18:04
a thing and. People. First, wanted
18:06
to charge money for it all. They wanted it
18:08
to sound classy. didn't make. Him. A
18:11
don't think it's kind of. Cats are not going to
18:13
have a bit late, but. It's. True enough
18:15
that it's worth trying to make an
18:17
effort. I think you could maybe make
18:19
leasing stick. Yeah, like he could. Maybe
18:21
convince the corporate types to say lease,
18:24
but they're never gonna say rent mister.
18:26
Was. Bus in also asks which landlord,
18:28
slush, steward of any tailed aid you
18:30
think would deserve your money. Background.
18:33
On one side, you don't wanna get blocked
18:35
all over the internet like when talked about.e
18:37
K. But. You also don't want to pay
18:40
too much for domain, especially since it's only a
18:42
rental. And of course you want to vote
18:44
with your wallet for the money should only go
18:46
to the organizations who deserve it. I. Don't
18:48
actually know of any organizations that
18:50
I specifically feel like the deserve
18:53
my money that own T oldies
18:55
idea, Google own tons of I'm
18:57
and I absolutely don't see deserve
18:59
my money. In. More practical
19:01
terms, he has by far the most
19:04
common Tld that I use. as.net.com is
19:06
the the premium choice and when I
19:08
can I'll usually go for.com if it's
19:11
available. The problem is that very frequently
19:13
there is not a.com available for what
19:15
you want. Not necessarily because there's a
19:18
valid property on the web that using
19:20
it, but just because some Them Speculator
19:22
absolutely already got the dot com. If
19:25
you don't feel that the speculator deserves
19:27
vastly more of your money than registrar
19:29
would charge then, well, That's.
19:31
A no go there. A don't
19:33
really like any of the is
19:36
the new can of off brand
19:38
for lack of better words the
19:40
Oldies because while the mostly work
19:42
everywhere these days you just you
19:44
never know when you're going to
19:46
encounter some weird legacy system that
19:48
doesn't think any Tld exists of
19:50
and.com.net or dot Org knows that
19:52
of agonizing Dell problem is that
19:54
underlying all of them is I
19:56
can and they're not great. So.
19:59
Like you'd have years. It like registrars the
20:01
registers only time is money off the
20:03
stupendous amount you pay for domains most
20:05
i ghost item and the registrars don't
20:07
as the own. the Tld must the
20:09
time and then yeah all the new
20:12
lenses i'd somebody paid i can act
20:14
hundred thousand dollars to to own it.
20:17
But. It doesn't as a memories for giving them
20:19
money either. Yeah. It's not
20:21
great and like the.see a like they
20:23
country code deal these sometimes those are
20:25
fun reasonably well but. If the
20:27
run mother used to not run for
20:30
profit and so it's It's not about
20:32
making money for them, it's about still
20:34
waiting. The concept of.cia or Die Detail
20:36
for Denmark and a couple other ones
20:38
that are recently well run. Public.
20:40
Services run not for profit.
20:43
Than what you want to bother only exists in
20:45
Denmark. See.
20:48
I can't recommend detailed these. That.
20:51
Is good known. As he said when it
20:53
comes down to I tenor Sarah bastards and
20:55
they might have I'm announced the whole thing
20:58
so company when can you? So what we
21:00
need is we need for the he used
21:02
mandate a breakup and so we all get
21:04
to choose our risk servers for Dns and
21:07
you can subscribe to this the announcer that
21:09
the and as the other Dns and you
21:11
know you just have to decide you want
21:13
is on the Dns that you're using. And
21:16
be great. Okay, this
21:18
episode is sponsored by Collide. Would.
21:21
You call and and point security products.
21:23
The bus possibly but Macys as miserable.
21:25
A. Failure. The. Older posts and
21:28
point security is to lock down
21:30
employee devices and rollout changes through
21:32
forced restarts, but it just doesn't
21:34
work. I t is miserable because
21:36
they've got a mountain of support tickets. Employees
21:39
start using person devices get they worked on
21:41
an executive's opt out the first time It
21:43
makes them like for meeting. He
21:45
can't have a successful security implementation unless
21:47
you work with and uses. That's.
21:50
Where collide comes in. The. Use First
21:52
Device Trust solution notifies he's as
21:54
soon as it detects initial know
21:56
device. And. Teaches them how to solve
21:58
it without needing help from. Three. That
22:01
my on trusted devices a block
22:03
from authenticating. But. Users don't stay
22:05
blocked. Collide. Is designed for
22:07
companies with Octa and it works on
22:09
muscle as Windows Linux a mobile devices.
22:12
So. She has Octa and you're looking for
22:14
advice, trust, solution that respects your team. Sport.
22:17
The South and go to collide.com/two
22:19
five a too much demo and
22:21
see how it works. Dot.
22:23
kolita.com/two Five
22:26
I. This.
22:29
Isn't free consulting then the first as quick thank
22:31
you to everyone is for says with Paypal I'm
22:33
patron Really do appreciate that. If. We
22:35
want to join those three persons or
22:38
turret to.five admins.com Support. And. Remember
22:40
that various amounts on patrons and an advert
22:42
free or a seat as either Justice South
22:44
or all the shows in the like? Not
22:46
than a semi. And. If you
22:48
want to send any questions the gym alone
22:50
or feedback is an email shout at To.five
22:52
up in Stockholm. Pablo. Rights
22:55
I recently enabled I busy six
22:57
on my router. I've noticed
22:59
that some sites and are riddled with ads.
23:01
Where. They used to have just a few price
23:03
me enabling I busy six. Or. So
23:06
I'm not worried that web sites will
23:08
have a blast tracking me by my
23:10
Ip the six address instead of relying
23:12
on brother fingerprinting which I can take
23:14
measures to prevent. A. Set Network
23:16
Manager to use the highest privacy settings
23:18
on my desktop summer Ip. The six
23:20
address will vary. But. The families
23:23
mobile phones in the house don't have this
23:25
luxury. Hello. I'm fully aware that
23:27
Not is not security and that my
23:29
roots had does stifle packet inspection to
23:31
prevent requests from the Internet from reaching
23:33
my systems behind. I. Feel more
23:35
exposed with i've he's he six then when
23:37
i'm behind the usual i busy format. Or.
23:40
Even the ice peace hideous Cj Net.
23:43
Should. I just disable Ip V Six or
23:45
my router and go back to an Ip
23:47
before on two thousand and ten home behind
23:49
C D. that. Should. I implement as
23:51
a Lancer things that separate from the
23:53
Zealand's the phones and the violence of
23:55
computers and prevent things from even reaching
23:57
the internet. More. Is the best approach to
23:59
protect. My home from prying eyes of the
24:01
Ip V Six Internet. So. City
24:04
not makes this slightly more complicated possibly
24:06
pilates if you comparing having one I
24:08
Tv for address for every computer in
24:10
your house. Prices: Go see Nance Vs
24:12
I T V Six for you have
24:14
a sub net and need computers got
24:16
it's own address. There's not really any
24:18
more tracking going on other the baby
24:20
they know was computer was in your
24:23
place but like to set of using
24:25
their Ip visit privacy settings where they're
24:27
using different addresses to connect out so
24:29
that it you know you know I
24:31
use the same Ip address, the connective
24:33
same. Sites that can mitigate some once
24:35
by. I don't think it's fundamentally
24:37
changing your privacy level one way
24:39
or the other. For the thing
24:41
about ads, I wonder if. Did.
24:44
You have him an ad blocker and just
24:46
when you had V sixty ads team a
24:48
very six in and maybe weren't block despite
24:51
say I'm not really heard of web sites
24:53
having. Different. Add profiles for
24:55
V sixers is not, although. With.
24:58
For ice? Maybe they just happened to ramp up
25:00
the amount ads around the time. Humid sweats, Although
25:02
Pablo didn't have as much tales about how
25:05
he's blocking ads, I suspect there's probably a
25:07
pie hole like approach in. There may be
25:09
more than one set of filters and some
25:11
of that may literally be black hauling. I
25:13
Pv for sub nets and a would not
25:15
surprise me at all. They have been a
25:18
much more evolved. Maps.
25:20
Of Ip V for space like what belongs
25:22
to people who should not be allowed on
25:24
your network. Then we we've gotten year with
25:26
Ip be six because well, not that many
25:28
people are using Ip. Be sick, So it's
25:31
it's. a Wild West. I feel
25:33
like Pablo would probably be the most comfortable
25:35
from what I'm hearing is he were actually
25:37
set up I Pv six routing with Nat.
25:39
Add that is a thing you can absolutely
25:41
do you. You can set up an Ip
25:44
V Six router and you can use a
25:46
private Ip V six sub nets and you
25:48
nat across it to a single I Pv
25:50
six to goes out of the internet. It
25:52
makes a little easier for you to be
25:54
certain that any central firewall rules that he
25:57
said on that router are actually getting applied
25:59
to all the vice because you know for
26:01
a fact they can't get to the internet
26:03
without going through you. I. Don't
26:05
think that would six, you know the ad
26:07
problem. I think that's just something that you're
26:09
gonna have. Basically. Have to play
26:11
with see if may be a different ad
26:14
blocking technique works better for you. Maybe try
26:16
to get Firefox with you block origin on
26:18
your family's phone so that you can have
26:21
proper ad blocking even on mobile. I find
26:23
that the whole pie hole and central ad
26:25
blocking approach I don't think it's a great
26:27
I think you block origin is frankly the
26:30
best option out there. and now that I
26:32
can get that in a plugin on a
26:34
first class browser Firefox on my Android phones,
26:36
I'm happy with that. Like after I'm done
26:39
with eating thing central or. Granddad isn't
26:41
a browser for things. No, is a browser
26:43
for anything on a farm? These apps don't.
26:45
They. Will. You know if you're using
26:47
apps on the phone when you could be using a
26:49
browser? Just
26:51
stuck with what you've got a me number one.
26:53
The odds are fairly good that you're not somebody
26:56
who's obsessing over as because ads ruining experience because
26:58
if you're doing all that you're not like front
27:00
of do your own thing. You know your fish
27:02
swim in downstream in the water. it's is part
27:05
of a thing sound like the ads but there's
27:07
ads and I worked around the As and that's
27:09
what I do versus you know folks like like
27:11
us and you're like most of our listeners who
27:13
were talking to about this who have a different
27:16
sponsor like they're as and I don't like it
27:18
how I make it so I like it again.
27:20
But these. Are very different classes of human
27:22
response. You know how many of the times
27:24
as the app not just the website and
27:27
it like the app is just a browser
27:29
going to the website it says oh it's
27:31
him out and buy it For least of
27:33
I'm using Firefox I have some control of
27:35
the browser the of I phone and I
27:37
find that he just completely screwed because. It's
27:40
not real Firefox. There's no you block
27:42
origin available. Well. Much like using absence
27:44
does he have gone to the side in
27:46
the browser. You just made the wrong decisions
27:49
for your stated goals when you bought that
27:51
I phone. I'm sorry but I'd know how
27:53
much of our audience is to for our
27:55
our our right now and my Css. Yeah
27:57
I love y'all I'm not saying you're bad
27:59
folks but. If this was year deal than
28:01
yeah you made the wrong decision. You went
28:03
to the Super Lot mail platform and the
28:05
into the that lock it down as they
28:07
may do a lot of things that you
28:09
do like but they also do a lot
28:12
of things that you don't and you'll have
28:14
a choice about it. Does your on the
28:16
Super Lockdown walled garden. About twenty percent of
28:18
our audience is tearing right now and about
28:20
a set it on her eyes and of
28:22
those two senses but there's definitely a percent
28:24
of of a just. I'd like to think
28:26
another twenty percent or so own I phones
28:28
and it just kind of shrugging and center.
28:30
it's a fair cop fear from other. Surveys
28:33
or have you done this like are use of my
28:35
T V Six A Home. I. Have some
28:37
I've used to home not as much as I
28:40
probably could. I. Didn't help that my
28:42
new cable provider doesn't offer it. During.
28:45
The net there can be helpful especially if
28:47
you want to mix to profit from of
28:49
I to machines together. Nicely.
28:51
Took us a different approach. My one main
28:53
P C goes out by an eye on
28:55
a different address than every other machine in
28:58
the house and is when I use my
29:00
other recede. I notice I did a lot
29:02
different. Adsense is based on the fact that
29:04
the other half of the inner to draft
29:07
a mouse is is for lady things and
29:09
I don't get any of those on my
29:11
machine that doesn't use the same Ip address
29:13
but I do get them on the machine
29:16
that has all the other traffic. I.
29:18
Do think public correct that when
29:20
to advertising into these can tell
29:23
which machine is which. They will
29:25
absolutely target the adds more closely
29:27
and they will build more detailed
29:29
profiles. Whether. That has a
29:31
direct immediate masses. Negative impacts are
29:33
not yet. probably not, but. It's.
29:36
One not tighter on the worm gears
29:38
they turned device. Is further and
29:40
further and learning more and more and getting
29:42
more and more detail on. At some point
29:45
you can have to be like looked dead.
29:47
This is my house and I get the
29:49
close the door and you can't just like
29:51
pressure nose up against the window and stare
29:54
at me all night while I sleep. Smart
29:56
Okay. To. Build on what similar
29:58
saying and answer the rest of public questions
30:00
about the lands. If you make a couple
30:02
of he lands least I can make a
30:05
big difference, but if you take gyms idea
30:07
where you're actually using Id be safe with
30:09
Nat. Except don't use
30:11
one external Ip address. Because.
30:13
He six you usually have usually at
30:16
least a reason decisiveness you can have
30:18
not configured to display the about connections,
30:20
the cost of a block of Ip
30:22
addresses him with before and this way
30:24
what you'd do is basically affected the
30:26
get by to the any from network
30:28
manager with Id to sick privacy but
30:30
for the phones and other devices they
30:32
don't support it natively so as he
30:34
goes to the nat the rotor is
30:36
going to to be like oh for
30:38
facebook Reagan attack from this I P
30:40
n for you to begin attacks and
30:42
this I peace. And will come back
30:44
tomorrow. We'll use different eyepiece and that can
30:47
help disrupt some of the tracking that
30:49
they're doing and just make it much
30:51
harder to how was devices which does you're
30:53
mixing all the traffic together and then
30:55
spreading it all out across the range of
30:57
addresses so that. His heart is how
30:59
which ones which. Are you to see the
31:01
Vpn service and in a make in all bars out
31:03
of the internet somewhere completely different? Changer.
31:06
In point: every now and then he really mess with them as much
31:08
as he can. right? Where
31:10
we better get out of a then remember so at
31:12
to the five admins are com as soon as and
31:14
any questions or feedback. He can
31:16
find me a taurus.com/mustard on. You can
31:18
find me a mercenary says admin.com and
31:21
I'm out And you'd was innocent.
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More