What metadata could be stored in the IPFS network and what could be collected by modified nodes?

I’m guessing uploading to IPFS also uploads some metadata, which gets shared as well, does this assumption hold any truth? According to this only content identifiers and node identifiers are in the public.

Does uploading a file leak any o… Continue reading What metadata could be stored in the IPFS network and what could be collected by modified nodes?

Are the positions of military/spy/government satellites publicly shown on any websites? [closed]

Me and my friend have been discussing about the ongoing Russia-Ukraine war and he started showing me how all the satellites are aligned and targeted to Ukraine by US intelligence and other government bodies (supposedly, according to that p… Continue reading Are the positions of military/spy/government satellites publicly shown on any websites? [closed]

From a forensics standpoint how much leftovers do package managers in Linux leave behind?

Let’s assume that for my question we’re using the equivalent of apt purge, which also removes configuration files. What’s left behind after apt purge and similar commands from other package managers?
I’m guessing it would be loose dependen… Continue reading From a forensics standpoint how much leftovers do package managers in Linux leave behind?

Can my ISP router, which is set in bridge mode be theoretically hacked or is the risk at the router behind the "modem"?

I am using an ISP provided router in bridge mode with my own router.

Where is the risk of getting hacked?
Can my ISP provided router in bridge mode (=modem) be hacked?
Can it get firmware updates when in bridge mode?

Continue reading Can my ISP router, which is set in bridge mode be theoretically hacked or is the risk at the router behind the "modem"?