×
Login Register an account
Top Submissions Explore Upgoat Search Random Subverse Random Post Colorize! Site Rules
6

Interesting presentation on the corporate takeover of the Internet and the destruction of privacy involving DNS over HTTPS and other bad ideas.

submitted by allAheadFull to Technocracy 2 monthsFeb 17, 2024 17:39:00 ago (+6/-0)     (files.catbox.moe)

https://files.catbox.moe/k2sipf.mp4

I don't want to get the presenter in trouble, he's not remotely mentioning jews but he is knowingly or not dealing with their bullshit.

Companies like woke Mozilla now have control of DNS by default in the browser. They also have access to the browser server certificates (public keys). With those two things they can perform a man-in-the-middle attack with any site you browse on the Internet.

"We need a discussion about this (DNS over HTTPS) and what we're getting is unilateralism from a bunch of political activists."

jews want to destroy "local" network administration/security and have all machines directly on the Internet. They want people to rely solely on client security which they have more control over through the OS and apps. This will prevent parents and corporations from reducing access to porn and malware. It's the computer equivalent of removing national borders.

This lecture is from 2019.



1 comments block


[ - ] SithEmpire 2 points 2 monthsFeb 17, 2024 21:52:04 ago (+2/-0)

I remember posting about that on old voat - I pointed out at the time that DNS over HTTPS was being packaged along with the browser doing it, the latter being the bad idea. Those ass-bandits want browser DNS so they can censor stuff.

If the OS host/resolve system handles it then the HTTPS part isn't inherently bad, and indeed I wouldn't mind if it's full HTTP or just DNS over TLS.

To an extent it has a chicken/egg problem because a TLS cert check will fail unless the domain matches, which cannot happen without resolving the host, which is the thing we're trying to implement. This is actually a perfect task for the hosts file, to list some initially-resolved TLS DNSs, another example of the OS having appropriate control over it.