• 0 Posts
  • 20 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle



  • For rather cheap I can see what traffic is suspicious. If you throw more resources at the problem and scale up it becomes simple to see traffic that looks like dns over https without having to decrypt it. Indicators such as size, frequency, consistent traffic going from your host to your DoH provider and then traffic going to other parts of the internet….these patterns become easy to establish. Once you have a good idea that a host on the internet is a DoH provider you can drop it into that category and block it.












  • Lots of people missing the point here.

    What if you had a tablet device that could go weeks without charging? It could handle basic tasks on its own, or more intensive tasks when connected to the internet?

    Office 365 is a good example. Basic tasks of word can be handled by a cached web client, but if you need to do something more advanced and need the full version of word to run, the ARM architecture can’t run it so spin up a virtual instance and stream it to your arm device.

    Windows 11 will have this baked in. It’s not a forced replacement of a local OS.