The Signpost

Technology report

Browse Wikipedia in safety? Use Telnet!


+ Add a comment

Discuss this story

These comments are automatically transcluded from this article's talk page. To follow comments, add the page to your watchlist. If your comment has not appeared here, you can try purging the cache.

Hmm I feel some of the hardware hasn't been properly battle tested yet. Something a bit more old school might be a better choice:

https://www.youtube.com/watch?v=X9dpXHnJXaE

©Geni (talk) 21:05, 1 April 2016 (UTC)[reply]

  • This may have comic aspects, but it is well informed and insightful. And it is true that TELNET had one clear advantage - it dates back to a time when program was program and data was data. There probably really isn't a special character sequence that indicates the following output should actually be saved and executed to take over your computer. I miss that kind of program that you could look and see you genuinely can't hack me with it, versus these things that have a new critical vulnerability whenever the old one expires. That said, I wouldn't be surprised if even the TELNET approach doesn't work against that Tor exploit, because (even if Snowden has never said a peep about it) I am suspicious that your saved uuencoded kiddie porn would be recognized by your friendly local antivirus program as a "threat", duly reported to their site, and it would upload a "patch" to you to help fix the virus, with predictable results. But I've never heard such a thing in the news ... and doubt I will this time either. Wnt (talk) 14:38, 2 April 2016 (UTC)[reply]
  • It's always better to write your own telnet client. Every session, for the best security. All the best: Rich Farmbrough, 19:30, 2 April 2016 (UTC).[reply]



       

The Signpost · written by many · served by Sinepost V0.9 · 🄯 CC-BY-SA 4.0