very cool
very cool
Curious to know what kind of other people's content makes you uncomfortable using a given registrar.
Did you *just* register it?
Because it looks like it's been delete from the registry (must have been within the 5-day Add Grace Period when the registrar can delete and get their cost back).
That means you can actually go re-register it right now.
I know a place :)
Don't worry, we won't nuke you
No worries, we'll always be here.
Would you settle for Canadian?
use DoH or DoT?
"remove cellophane before eating"
har har
default behaviour in a registrar transfer should be to leave the nameserver delegation unchanged
you're supposed to put an implicit confirmation in there if you want to switch nameservers at the same time
Poems pick AI locks
Verses slip past coded guards
Steel minds start to scream
In other words, AI can be hacked using poetry
axisofeasy.com/aoe/the-tele...
Amazingly - this morning's Cloudflare outage seems to not be at the DNS level.
Still can't believe there's a .zip TLD
it's a lock.
In the case of multi-homed websites (many hostnames, 1 IP) the SNI has to be sent in the clear to begin the TLS handshake.
So yes, an eavesdropper knows which hostnames you are connecting to.
in the case of sitting on an open WiFi network with an eavesdropper in the mix: yes.
of course, you still have to trust the VPN provider as well
you're really just transferring your trust. I'm not vouching for VPN providers in general
you could be with a DNS provider you trust (to be clear, we're talking resolvers here) - and you could be using DoH/DoT, and maybe none of your apps are leaking your DNS queries.
but without a VPN, on a public wifi, an eavesdropper can still see what endpoints you're connecting to
you could be using DoT / DoH and still have your web browsing tracked (tracked, not read)
that and a lot of apps leak DNS queries despite DoH/DoT
...eavesdroppers may not be able to see the contents of individual connections on an open WiFi network, but they can certainly see what sites you're visiting and what DNS lookups you're doing.
Ah I see.
They need to have them executed here - usually via the Ontario Sheriff's Office, or otherwise accompanied with appropriate Letters Rogatory
This subpoena is for archive TODAY. that is not archive ORG - two completely different outfits.
We are the registrar for .ORG - who is NOT the subject of that subpoena
To be clear: archive *.org* (a.k.a waybackmachine) is a completely different organization than archive *.is* *.ph* et al
DNS isn't zero-trust.
One of the reasons blockchain *seems* compelling for P2PDNS is because it is permissionless.
But there are other trade-offs in using a blockchain as a naming root. Immutability can actually work against you sometimes.
I've been thinking about this for a long, long time.
If you DM one of your domains I can get it looked at and make sure you're on the right service level
Sorry - late to the thread here.
On the DNS queries - in over 95% of the cases domains are well under the limits and if you unexpectedly go over, it is usually transient and there are ways to mitigate it.
Cont..
Mark Jeftovic is Co-Founder & CEO of @easydns.com, a longtime domain and DNS provider. A former CIRA Board Member and author of 'Managing Mission Critical Domains', he brings deep experience in internet infrastructureβand a punk rock past.
Meet Our Board: internetsociety.ca/what-we-do/#...
failover FTW. It's basically "reverse dynamic DNS". we run a bunch of monitors that take heartbeats of your main IP and do a DNS update locally if there's a problem.