Blog.christopherburg.com is a subdomain of christopherburg.com, which was created on 2009-03-06,making it 15 years ago.
Description:Explore the dangers of Wi-Fi for security cameras and stay informed on governmental abuses at A Geek With Guns blog....
Keywords:Wi-Fi security cameras, government abuses, privacy, cybersecurity, surveillance, technology, blog, State depravities....
Discover blog.christopherburg.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site
HomePage size: 121.356 KB |
Page Load Time: 0.66491 Seconds |
Website IP Address: 64.91.16.185 |
The Coronavirus Chronicles | New York City in the Time of Pandemic virus.nycitynewsservice.com |
Tỷ số trực tuyến bóng đá, thông tin thi đấu, lịch thi đấu, tỷ số kết quả, thể thao 7M vn2.7msport.com |
The Chronicles of Riddick: Assault on Dark Athena riddick.atari.com |
Geek Universe - Live Long and Geek Out - Geeky Subculture. - Geek | Fanart | Cosplay | Pokémon GO | geek.cheezburger.com |
BackerKit Pledge Manager for Mutant Chronicles 3rd Ed. RPG mutant-chronicles-3rd-ed-rpg.backerkit.com |
The Melvin Chronicles melvin.jeaniebottle.com |
Paycheck Chronicles, Military Pay and More | Military.com paycheck-chronicles.military.com |
Star Legends: The Blackstar Chronicles mob.starlegends.com |
Chronicles of Merlin-– Create your legend, become the best in history cm.koramgame.com |
Zootropolis Chronicles xzootropolischronicles.jcink.net |
The Halo CE Chronicles - A Halo CE Machinima Production hcec.halomaps.org |
Geek Therapy Training Home - Geek Therapeutics education.geektherapeutics.com |
Dickinson College Chronicles chronicles.dickinson.edu |
The Lunar Chronicles Archives - The Universe of Marissa Meyer lunarchronicles.universeofmarissameyer.com |
The Chezzy Chronicles chronicles.traxproject.com |
A Geek With Guns – Chronicling the depravities of the State. https://blog.christopherburg.com/ |
About - A Geek With Guns https://blog.christopherburg.com/about/ |
February 2009 - A Geek With Guns https://blog.christopherburg.com/2009/02/ |
Humor - A Geek With Guns https://blog.christopherburg.com/category/humor/ |
February 2024 - A Geek With Guns https://blog.christopherburg.com/2024/02/ |
Mastodon - A Geek With Guns https://blog.christopherburg.com/tag/mastodon/ |
July 2013 - A Geek With Guns https://blog.christopherburg.com/2013/07/ |
May 2020 - A Geek With Guns https://blog.christopherburg.com/2020/05/ |
March 2019 - A Geek With Guns https://blog.christopherburg.com/2019/03/ |
Preparing for Bad Times – A Geek With Guns https://blog.christopherburg.com/2021/11/12/preparing-for-bad-times/ |
July 2021 – A Geek With Guns https://blog.christopherburg.com/2021/07/ |
News You Need to Know – A Geek With Guns https://blog.christopherburg.com/category/news-you-need-to-know/ |
November 2021 – A Geek With Guns https://blog.christopherburg.com/2021/11/ |
June 2021 – A Geek With Guns https://blog.christopherburg.com/2021/06/ |
February 2021 – A Geek With Guns https://blog.christopherburg.com/2021/02/ |
Server: nginx/1.24.0 |
Date: Sat, 11 May 2024 16:19:57 GMT |
Content-Type: text/html; charset=UTF-8 |
Transfer-Encoding: chunked |
Connection: keep-alive |
X-Powered-By: PHP/7.4.28 |
Link: https://blog.christopherburg.com/wp-json/; rel="https://api.w.org/", https://wp.me/1EIFF; rel=shortlink |
Content-Security-Policy: "base-uri self; child-src self https://player.vimeo.com https://www.youtube-nocookie.com https://akismet.com; connect-src self; default-src none; font-src self data: https://fonts.gstatic.com; form-action self; frame-ancestors self https://player.vimeo.com https://www.youtube-nocookie.com; frame-src self https://player.vimeo.com https://www.youtube-nocookie.com https://akismet.com; img-src self https://secure.gravatar.com https://s0.wp.com https://s1.wp.com https://s2.wp.com https://chart.googleapis.com; media-src self; object-src none; script-src self unsafe-inline unsafe-eval https://s0.wp.com https://s1.wp.com https://s2.wp.com https://stats.wp.com; style-src self unsafe-inline https://fonts.googleapi.com; worker-src self;", Strict-Transport-Security: max-age=31536000; includeSubdomains; preload |
X-Frame-Options: SAMEORIGIN |
X-Content-Type-Options: nosniff |
X-XSS-Protection: 1; mode=block |
Referrer-Policy: no-referrer |
Front-End-Https: on |
charset="utf-8"/ |
content="width=device-width, initial-scale=1" name="viewport"/ |
content="max-image-preview:large" name="robots" |
content="WordPress 6.4.4" name="generator" |
Ip Country: United States |
Latitude: 37.751 |
Longitude: -97.822 |
A Geek With Guns Chronicling the depravities of the State. Don’t Use Wi-Fi for Security Cameras I’ve been asked for my opinion on Wi-Fi security cameras many times. My opinion is to avoid them. Wi-Fi is susceptible for many easy to perform attacks. For example, Wi-Fi deauthentication attacks are a favorite of script kiddies because they are so easy to perform. I’ve demonstrated how easy it is to many friends. WPA3 helps alleviate this, but most access points that I’ve seen are still using WPA2. If you buy a Wi-Fi camera that can’t use WPA3, it is vulnerable to this trivial attack. Deauthentication attacks aren’t the only way to bring a Wi-Fi network down. Wi-Fi is a wireless protocol, which means it’s susceptible to jamming. When I explain this to friends, they often say that I’m being overly paranoid. But just because you’re paranoid doesn’t mean that they’re not out to get you : A serial burglar in Edina, Minnesota is suspected of using a Wi-Fi jammer to knock out connected security cameras before stealing and making off with the victim’s prized possessions. Minnesota doesn’t generally have a reputation as a hotbed for technology, so readers shouldn’t be surprised to hear that reports of Wi-Fi jammers used to assist burglaries in the U.S. go back several years. PSA: even criminals use technology , and more are now catching on — so homeowners should think about mitigations. This is the exact thing I’ve been warning about since Wi-Fi cameras came on the market. The purpose of a security camera is in the name: security. You want security cameras to be a deterrence and, failing that, to collect evidence that can be provided to law enforcers, insurance companies, etc. A Wi-Fi camera isn’t going to deter a burglar who has access to jamming hardware and knows how to use it. Wi-Fi cameras that have been disconnected from their recording device aren’t going to collect evidence (a camera with a built-in SD card could, but then you’re trusting an SD card, which is a crap shoot). If you’re going through the trouble of buying and installing security cameras, get hard wired cameras. There are a lot of excellent Power over Ethernet (PoE) options on the market. PoE cameras only require a single Ethernet cable to provide both power and data connectivity. Author Christopher Burg Posted on February 13, 2024 Categories Protecting Yourself and Others Tags Security , Technology 1 Comment on Don’t Use Wi-Fi for Security Cameras In Praise of Pen and Paper Back before the Internet became ubiquitous, one of the most commonly given pieces of computer security advice was to not write passwords down on Post-It notes and stick them to your computer. The threat model was obvious. Anyone sitting down at the computer would have access to the password. This threat model was the most common one back then. While writing passwords down on Post-It notes isn’t a good idea today, it’s actually quite secure against today’s most common threats because a piece of paper can’t be accessed remotely. Ubiquitous Internet connectivity has shifted the most common threat models from local access to remote access. Data breaches, ransomware, and distributed denial of service are three of the most common forms of attack we read about today. Data breaches in business and government networks have resulted to tremendous amounts of personal information being leaked online. Ransomware attacks can grind businesses to a halt by locking away the data needed to complete day to day tasks. Likewise, distributed denial of service attacks can bring businesses to a halt because so much data has been uploaded to other people’s computers. If those computers are knocked offline, the data uploaded to them becomes inaccessible. A folder containing information written on paper forms stored in a filing cabinet can’t be stolen remotely. It can’t be maliciously encrypted remotely. Access to it can’t be taken away remotely. The benefits of paper don’t stop there. Paper has an intuitive interface. You pick it up and you read it. Accessing information on a piece of paper doesn’t require trying to figure out a command line or graphical user interface designed by a mad programmer who seemed to take design cues from Daedalus. The user interface of paper also doesn’t change. You don’t have to worry about a software company releasing an update to a piece of paper that drastically changes the user interface for no reason other than the sake of changing it. Paper is resilient. Data stored on a computer can be corrupted in so many ways. A file loaded into RAM can be corrupted due to a memory error and that corrupted data can be dutifully written to disk and then included in backups. It’s possible that a file that is accessed infrequently can be corrupted without anyone noticing until all of the backups of the uncorrected file are cycled out. A file can also be corrupted while it’s stored on a hard drive or SSD. Paper doesn’t suffer such weaknesses. Writing information down on paper has a lot of security and integrity benefits. None of this is to say there aren’t downsides to using paper. But the next time you read about patient information being leaked online because a hospital suffered a data breach, consider how much safer that information would have been if it had been stored on paper forms instead of a database. When half of the Internet disappears due to another Cloudflare misconfiguration and you are unable to perform a task because the information you need is hosted on somebody else’s computer, consider that you’d still be able to complete the task if the information was on a paper form in your filing cabinet. Just because a technology is old doesn’t mean it’s completely outdated. Author Christopher Burg Posted on November 16, 2023 Categories Protecting Yourself and Others Tags Security , Technology No True Gray Man Through some twist of cosmic karma, there seems to be a universal rule dictating that any group of carry permit holders must discuss the concept of the gray man. Through an addendum to the universal rule, this discussion must always devolved into No True Gray Man where each participant points out why every other participant is failing to be a gray man. The concept of the gray man seems simple enough. If you don’t want unwanted attention, you need to blend in with the general populace. This is important to many carry permit holders because they know that if a bad guy is able to mark them as a carry permit holder, then they will be the first target should that bad guy decide to act like a bad guy. Such a grizzly fate can only be avoided by becoming indistinguishable from the background mass of people, to become a gray man. The question is, how does one achieve the coveted status of gray man? As a frequent (and almost always unwilling) participant in this conversation, I have learned the characteristics of the gray man. The gray man does not wear tactical pants. The only people who wear tactical pants are people who are carrying a gun. No exceptions. The gray man does not wear a tactical shirt. What is a tactical shirt? Any button down shirt that has pockets. Unless it’s not. The gray man does not wear camouflage. The gray man does not wear any clothing with an emblem of any firearm manufacturer. The gray man does not wear hiking boots unless they’re in gaudy colors. The gray man does not use a backpack with MOLLE webbing. The gray man does not use any pack other than a fanny pack because all other packs scream that the owner is carrying a gun. The gray man does not walk too fast. People who walk too fast attract attention and are easily identified as a man with a gun. The gray man does not walk too slow. People who walk too slow are obviously trying to avoid attention and are therefore easily identified as a man with a gun. If you do all of these things, you will blend in perfectly with the masses and by extent achieve the coveted status of gray man! Unless, of course, you actually practice all of...
Domain Name: CHRISTOPHERBURG.COM Registry Domain ID: 1545658382_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.tucows.com Registrar URL: http://www.tucows.com Updated Date: 2024-03-05T08:38:34Z Creation Date: 2009-03-06T02:30:35Z Registry Expiry Date: 2025-03-06T02:30:35Z Registrar: Tucows Domains Inc. Registrar IANA ID: 69 Registrar Abuse Contact Email: domainabuse@tucows.com Registrar Abuse Contact Phone: +1.4165350123 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Name Server: NS1.HOVER.COM Name Server: NS2.HOVER.COM DNSSEC: unsigned >>> Last update of whois database: 2024-05-17T13:31:30Z <<<