Linus Sebastian Anounced in early 2018 that he had entered discussions with NCIX to aquire their youtube channel that he built from the ground up. After many months of legal issues Linus announced in May 2018 that he has hired the last producer and host of the NCIX channel and has launched a new channel to surpass NCIX. The new channel called TechLinked will be a rapid fire tech news channel designed as a shorter 3 episode per week WAN show, A 1 hour show held 1 a week to go indepth in news topics which LMG hosts on their main channel every saturday.
The new channel has been a huge success already gaining 270,000~ subscribers in the first week and selling 1000~ TechLinked t-shirts. Linus announced that due to the rapid success of the channel they were quick to get sponsors for the channel, making it self sustaining almost instantly which is amazing.
TechLinked will not be hosted on LMG's sister company FloatPlane a paid suscription based early access platform, as this would make news old news by the time the video reached the masses. But they will be experimenting with hosting a broader range of topics outside the tech space and measuring their success. Viewers can submit topics to hosted on the show via the Linus Tech Tips forums to be decided by the hosts if they are going to host them on the show.
Subscribe to TechLinked & watch the first video! https://youtu.be/kulPdl27Ubc
Cloudflare's new speed and personal privacy increasing domain name program (DNS) servers, on Sunday launched, are also portion of an experiment being executed together with the Asia Pacific Network Facts Centre (APNIC).
The experiment aims to comprehend how DNS could be improved regarding performance, security, and privacy. "We are actually critically reliant on the integrity of the DNS, the details of just how it operates remains generally opaque still," wrote APNIC's chief scientist Geoff Huston in a blog page post.
"We know that the DNS has got been used to create malicious denial of service episodes, and we are keen to comprehend if there are straightforward and widely deployable measures which might be taken up to mitigate such attacks. The DNS relies on caching to operate and quickly efficiently, but we remain unsure concerning how well caching performs essentially. We are also unclear just how much of the DNS relates to end user or application requirements for name resolution, and how much relates to the DNS chattering to itself.
Huston, an Internet Hall of Fame inductee, has a long-standing curiosity in DNS, and is a strong supporter of a proposal that guarantees to improve DNS resilience against DDoS (distributed denial of service) attacks. He's previously said that failing to secure DNS is definitely savage ignorance.
The Cloudflare-APNIC experiment uses two IPv4 address ranges, 1.1.1/24 and 1.0.0/24, which have been reserved for research make use of. Cloudflare's brand-new DNS uses two addresses within those ranges, 184.108.40.206 and 220.127.116.11.
These address ranges were actually configured as "dark visitors addresses", and some years ago APNIC partnered with Google to analyse the unsolicited traffic directed at them. There was a lot of it.
"Our initial work with it certainly showed it to end up being an unusually solid attractor for bad traffic. At the time we stopped doing it with Google, it was over 50 gigabits per second. Quite frankly, few folk can handle that much noise," Huston informed ZDNet on Wednesday.
By placing Cloudflare's DNS on these study addresses, APNIC gets to see the noise and also the DNS visitors -- or at least "a certain factored quantity" of it -- for research functions. Huston emphasised that APNIC intends to protect users' privacy. "DNS is remarkably informative about what users do, if you inspect it closely, and none of us are thinking about doing that," he said.
Indeed, Cloudflare's goal is to create, as the company's chief executive officer Matthew Prince place it, "the internet's fastest, privacy-first customer DNS service".
While 18.104.22.168 is meant to have been used only for research, the Cloudflare-APNIC experiment provides revealed that many operational systems have been using it in a variety of dirty hacks that breach internet routing standards.
Twitter cybersecurity celebrity SwiftOnSecurity has been retweeting a few of the more egregious allegations, such as 22.214.171.124 being utilized by Fortinet VPN as the virtual endpoint; 126.96.36.199 being utilized as the default logout for Nomadix controllers, which are mainly used in hospitality industry environments; AT&T Gigapower using 188.8.131.52 on an internal interface on at least one model of router-gateway, the Pace 5268AC, which blocks this address effectively; and even Vodafone Germany using it as a graphic caching server on the mobile network.
Huston knows usages like this, and has experienced Wi-Fi hotspots employing 1 as well.1.1.1 as their router address. He's not impressed.
"Some folk, without materials to justify it, started out configuring 184.108.40.206. Now, I could start using your Ip, Perhaps, but we're both likely to are having issues," Huston told ZDNet, laughing.
"You should never did it to get started with. You're squatting on someone else's address. That is evidently a bad thing," he said.
"In this case, I'm uncertain that it really impacts after the folk who are marketing and advertising the address, and some degree because I am seeking at the junk site visitors that hits that address, everything increases the interesting junk. But you must not be doing it."
While Huston has but to analyse the junk traffic in this latest experiment, he said that it really is measured in multiple gigabits per second still. "There's lots of rubbish out now there," he said.
Since Google is now disabling reCaptcha1, people were unable to register to leakportal and would get a "Sercurity Check failed!" message. I'll be honist took me a while to figure out the reCaptcha we were using was disabled and we had to upgrade to reCaptcha 2. I have registered to site to use the new one and it is enabled and working. Registration should have no problems now.
Google reCAPTCHA has been a great tool in fighting spam. Nonetheless it comes with a price to your users if they include to type hard to learn letters and amounts to prove they aren't a robot. The issue in filling out an application is related to the engagement and responses you will receive directly.
Click simply. Really, that’s it. One press to prove you aren't a robot and you will be on your way.
If you click multiple moments in a brief period of time, the responses shall get a lttle bit more challenging. If you are a standard human being however, you won't ever even see these more complex challenges probably.
If you still get registration issues, dont hesitate to Contact Us and we will mitigate the problem.