• 6 Posts
  • 96 Comments
Joined 2 years ago
cake
Cake day: July 9th, 2023

help-circle

  • Well, dig is available also of course, but nearly all distros still include nslookup despite it getting deprecated. I like the simplicity of its interactive mode.

    Host is also really great with more human-readable output.

    Don’t get me wrong, when things are getting hairy, you’re going to make a lot of use of dig. I just find that most troubleshooting can be taken care of a lot simpler with host or nslookup.



  • Yeah if you can dig a record and received a response it’s not a routing issue.

    But aren’t you on the same subnet as your DNS server? There’s no routing happening if you’re on the same subnet which I was assuming.

    Even through dig defaults to outputting A records when no other options are specified, I would use the A option anyway just in case:

    dig @192.168.0.249 study.lan A
    

    If you use “ping study.lan” do you see it output the A record IP address in the first line of output?

    Did you try using nslookup as I described?













  • hemmes@lemmy.worldOPtoApple@lemmy.worldHow to: Encrypt Your iPhone
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    3 months ago

    I don’t think I’ve ever really considered any of EFF’s articles “pointless” per se. But the article is a bit more nuanced than just setting in a pin (I mean the first sentence introduces the intent of the article: “Encrypting the data on your iPhone isn’t as simple as creating a password“), and I thought it would be interesting for anybody who didn’t know.

    There’s also some notes about legal standings, which I thought was interesting:

    In the U.S., using a biometric-like your face scan or fingerprint-to unlock your phone may also compromise legal protections for the contents of your phone afforded to you under the Fifth Amendment privilege against compelled incrimination. Under current U.S. law-which is still in flux-using a memorized passcode generally provides a stronger legal footing to push back against a court order of compelled device unlocking/decryption. While EFF continues to fight to strengthen our legal protections against compelling people to decrypt their devices, there is currently less protection against compelled face and fingerprint unlocking than there is against compelled password disclosure.

    But ultimately I thought that it would be good for folks to know about the Advanced Data Protection feature, which takes your security beyond the scope of just your local phone’s PIN or password.

    With Advanced Data Protection enabled, your backups and most important files get the end-to-end encryption benefit, better securing your files against mass surveillance, rogue Apple employees, or potential data leaks.

    This protects your data in the cloud and makes it inaccessible to anyone including Apple, who wouldn’t be able to help you if you lost your recovery backups. You can also setup Recovery Contacts if you lose access to your device.

    There’s some other interesting features this article does not go over like Stolen Device Protection, which changes the behavior of how your iPhone allows access to the device based on its location.

    You sound like an experienced pro power user, so you may find this article pointless worthless.