• 3 Posts
  • 19 Comments
Joined 1 year ago
cake
Cake day: March 19th, 2024

help-circle

  • I lost my model A1263 in a box during a move. I’ve been looking for it over the last couple of weeks once I was notified about this, but no luck. I actually emailed Anker to ask if there’s a risk of fire even in storage or not in use, and apparently it can happen even when not under any load and completely discharged.

    I don’t even know if I still have it. Fingers crossed that my serial isn’t one of the affected ones, but I’ll keep looking and hoping that it doesn’t burn my house down.













  • From the article:

    The only way for router users to determine whether their devices are infected is by checking the SSH settings in the configuration panel. Infected routers will show that the device can be logged into by SSH over port 53282 using a digital certificate with a truncated key of

    ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ…

    To remove the backdoor, infected users should remove the key and the port setting.

    People can also determine if they’ve been targeted if system logs indicate that they have been accessed through the IP addresses 101.99.91[.]151, 101.99.94[.]173, 79.141.163[.]179, or 111.90.146[.]237.









  • You can host remote files via SFTP + cloudflared (or another reverse tunnel provider) without opening any ports. Then you use a file manager to add a network share with your SFTP information.

    For the calendar, WebDAV is probably your best bet, which also works with reverse tunneling. You can also use WebDAV in place of SFTP if you prefer to only have one (or two with a reverse tunnel) service configured. Nextcloud is a great option since it has WebDAV and file management built in.

    I would use Docker to do it all, but there is a learning curve associated with setting all of this up in a secure way (which is what the reverse tunnel helps with).