Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Overall, I use "strange WiFi things" techniques for two useful things : audit security cameras, and foxhunting.
I use it to test wireless security cameras on my home network -- to see if I can deauth them and/or force them to reconnect to spoofed access points. If it's easy, then either the router or the cameras are being useless, and I upgrade/replace. Obviously WiFi security cameras can't be made super secure, but if I know how good they are, I can conclude when they are 'good enough'.
I only buy routers that support secure management frames, but I want to make sure that it actually works as it should. I test client networks too, with permission, and then plug security holes.
I also specifically disable secure management frames and deauth my cameras to see how they respond. If the system just 'freezes' without any warning being raised (and then resumes on reconnect), that is also a fail. Connection dropping must raise some form of alert.
Then for foxhunting, I build multiple antennas and listen to traffic. Then I use the RSSI to perform multilateralization on the signal to get a vector on their position. You can get 3-5m accuracy with some work. This is a neat but complicated way to build an indoor positioning system to track employees, corporate assets, and employees that you treat like corporate assets.
Also you can sometimes hack together WiFi ToF measurements but this is tricky and not widely supported.
This sounds very interesting. I would definitely like to be able to know the intricacies of how I am tracked at work. I assume that in the scenario you describe, said employees are connected to the office WiFi network. Maybe there's a way for the office to determine one's location even if they aren't?
I am definitely interested in testing IOT devices and their resilience to attacks, however I don't think I'll have much luck if I'm using something like Tasmota. I might want to check for devices I program myself though. Thanks.
I have yet to fully understand protected management frames, but I believe most operating systems meant for such devices will ship with WPA3 very soon that will require the use of the former technology. I personally want to run OPNSense and OpenWRT, I hope that will keep me relatively secure.
There are a few terms here that I don't know about, but thank you for your comment. I'll explore more!