Quote from: Patrick M. Hausen on December 26, 2025, 12:12:58 AMGenau das ist der Punkt, den ich am wenigsten verstehe ... Drucker, Scanner, Lautsprecher ... kommt bei mir alles ins vertrauenswürdige Familiennetz. Ich kauf da halt keinen China-Kram, sondern Geräte mit Doku, was sie tun. Lautsprecher z.B. ist eine Airport Express an der Stereoanlage. Drucker Brother mit Ethernet und SNMP ... was tun denn moderne Drucker so? Ich hatte noch nie einen, der nachhause telefoniert hätte. Meiner braucht sogar fürs Firmware-Update ein externes Tool.
Isolieren tue ich ganz anderen Kram 🙂
Quote from: OPNenthu on December 26, 2025, 08:40:24 AMI don't buy that their OPNsense is getting hacked like this without receipts.
Quote from: OPNenthu on December 26, 2025, 06:47:27 AMHow many OPNsense users are on a flat LAN with open access to their management interfaces?
Quote from: someone on December 23, 2025, 05:46:33 AMI have connections through the browser attacking my system trying to break through apparmor. It shows up in auditd log file. Its a mile long. Using this as your endpoint protection or a similar app protects your operating system and the LAN side backend of opnsense which is open and everything is allowed, thats how they were breaking my separate opnsense router.