According to Jim

Does Instagram have a sense of humor?

With the unfortunate demise of Bibliogram, I decided to bite the bullet and sign up for an Instagram account. It was not an easy decision to make, but there are a few athletes I need to keep an eye on. I mean, for sports betting purposes.

How did a subdomain on cancer.org end up serving porn?

A few days ago I discovered several referral spam links to the domain servicematch.cancer.org in my server logs. Spam referrals are usually a part of some blackhat SEO campaign used to generate traffic, and if possible, get the URL listed on a website’s public statistics page.

Content warning: This article contains mildly sexually explicit text and images.

Njalla goes TITSUP and paranoidpenguin.net gets wiped off the clearnet

It’s always DNS, right? Well, at least that appeared to be the root cause today as Njalla’s DNS servers became unresponsive. I don’t know how this could happen with anycast DNS, but regardless, every service went offline. My initial concern was that the unscheduled downtime could be the result of actions taken by law enforcement.

Plausible Analytics review – Browser fingerprinting and CNAME cloaking

For the last few weeks, my feeds and federated timelines have been filled with absolutely brilliant marketing campaigns for Plausible Analytics, the new open-source privacy-focused website analytics tool. Plausible Analytics has enjoyed exponential growth and is frequently recommended by privacy-conscious voices in the FOSS community.

Self-hosting security challenge

If you’re a geek like me then you probably enjoy spending your time hardening and optimizing your servers to support modern security standards and policies. If so, I’d like to share my favorite online resources and encourage you to take up the challenge of beating paranoidpenguin.net.

How to back up your 2FA secret keys with KeePassXC

The amount of services offering (or even demanding) two-factor authentication (2FA) is ever-increasing. This has encouraged me to find a more resilient strategy for how I store, manage, and backup my secret keys. My old approach relied solely on using time-based one-time password (TOTP) applications capable of exporting and importing 2FA accounts.