Indeed, it might certainly be worthwhile to extend this tool to provide a means
for people to protect themselves from their own devices and spyware.

> I guess that we tend to think of firewalling as mostly protection from
> inbound connections, but....

There is an increasing academic corpus that draws attention to the idea that
the enemy is within:

https://moniotrlab.ccis.neu.edu/wp-content/uploads/2019/09/ren-imc19.pdf

In my view, the best use of a firewall is to block outbound connections.  You
can absolutely (using iptables, etc) block some of the prefixes that you
describe below.

iptables -A OUTPUT -s 142.241.0.0/16 -j DROP

Alternatively, suggest you can achieve most of what you want simply by blocking
DNS requests for the names of dodgy services.

What names should you block?  Well, you can start with lists maintained by
others:

http://winhelp2002.mvps.org/hosts.txt

https://someonewhocares.org/hosts/zero/hosts

https://pgl.yoyo.org/adservers/serverlist.php?mimetype=plaintext

You can also block other horrible names too, such as, for example:

"incoming.telemetry.mozilla.org."

Bonus points for pointing this name at a web server that runs locally and
returns the response that Microsoft Windows expects:

"www.msftconnecttest.com."

Happy hacking --

Geoff

On Tue, 23 Aug 2022 at 01:27:33PM +0100, mp wrote:
> 
> cool, thx!
> 
> Disclaimer: I did not write this code, I merely downloaded, typed 'cmake .'
> and 'make' and then ran it.
> 
> It is discussed here (on evil Twatter):
> https://twitter.com/bert_hu_bert/status/1561466204602220544
> 
> It is a simple, indicative tool, but it is a sort of proof of concept and
> wake up tool that potentially could be expanded with blacklisting those
> outbound connections of the apps/cookies/whatever they call home and
> elsewhere.
> 
> I guess that we tend to think of firewalling as mostly protection from
> inbound connections, but....
> 
> ...
> ..
> .
> 
> On 23/08/2022 12:08, Geoffrey Goodell wrote:
> > Hi mp,
> > 
> > This is a great idea.  I hypothesise that:
> > 
> > (1) People have no idea how much data they are sending to online services;
> > 
> > (2) People have no idea how often their various devices (not only PCs and
> > smartphones but also 'internet of things' devices) send data, even when the
> > user is not actively using them; and
> > 
> > (3) People have no idea how often routine activities such as web browsing to
> > ostensibly unrelated sites, email checking, and so on result in telemetry 
> > being
> > sent.
> > 
> > And of course, people might not realise that their physical movements and 
> > the
> > cadence of their activities over time are part of the accumulated data set.
> > 
> > I'm surprised that the Google prefixes are hard-coded.  Suggest using the
> > updated prefixes from the global routing table instead.
> > 
> > https://thyme.apnic.net/ipv4/ap/2022/08/23/
> > 
> > (replace with whatever date is today)
> > 
> > Download and unpack the five files in this directory.
> > 
> > Inside you will find a file 'data-used-autnums'.  You can search this file 
> > for
> > the names of autonomous systems (networks), or 'ASes', that together 
> > comprise
> > the Internet.
> > 
> > You can search this list, e.g.:
> > 
> > $ grep " GOOGLE" data-used-autnums
> > 
> > Let's not single-out Google.  Indeed you can look for other possible 
> > offenders
> > too, e.g.:
> > 
> > $ grep " MICROSOFT" data-used-autnums
> > 
> > The first column of the results are the AS numbers.  There is another file,
> > 'data-raw-table', which maps the numbers to prefixes.  You can use this 
> > file to
> > identify all of the prefixes you want to examine.
> > 
> > $ grep -w 15169 data-raw-table
> > 
> > I hope this helps.
> > 
> > Happy hacking,
> > 
> > Geoff
> > 
> > On Tue, 23 Aug 2022 at 10:18:12AM +0100, mp wrote:
> > > 
> > > Great, thanks.
> > > 
> > > Though, just for reference, this:
> > > 
> > > sudo tcpdump -n -l dst net 192.0.2.1/32 $(for a in $(cat 
> > > goog-prefixes.txt);
> > > do echo or dst net $a; done)  |  ./teller
> > > 
> > > from here:
> > > 
> > > https://github.com/berthubert/googerteller
> > > 
> > > .. makes the map noisy: https://map.casariolab.art
> > > 
> > > Ear opening tool.

#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nett...@kein.org
#  @nettime_bot tweets mail w/ sender unless #ANON is in Subject:

Reply via email to