Strange. My phone is with EE and I get full IPv6 connectivity. Perhaps it's a limitation of their backend mobile broadband system?
53 posts • joined 1 Dec 2008
Broadband providers can now flog Openreach's new IP voice network in bid to ditch UK's copper phone lines by 2025
Let's Encrypt? Let's revoke 3 million HTTPS certificates on Wednesday, more like: Check code loop blunder strikes
Take a high shutter speed photo of your own wee and you'll see that it's droplets too.
I remember Mythbusters covered the 'Peeing on the electrified railway' myth once, and busted it on account of the fact that unless you literally piss like a horse, the stream will break up into air-insulated droplets well before it hits anything electrified.
To see if your router/modem is running a vulnerable version of RomPager, run Wireshark and access the device's configuration page.
Look for a HTTP/1.1 200 OK packet, inside that will be listed the server version, eg:
Server: RomPager/4.07 UPnP/1.0
Which suggests my modem is vulnerable, bugger. Time to get a different one methinks. Good job it's separate from the router.
Then again, would my modem even be reachable from the internet if it's running in PPPoE bridge mode? Wouldn't the PPPoE-encapsulated packets get sent straight to the router without the modem even bothering to look at them?
CAn't see this doing too well in court.
Just had a quick look at the Comcast Residential Agreement (Link)
Section 6.b.1. says that Comcast can send code updates to your router at any time they like; that these updates can change, add, or remove features; and that these updates can be used to provide features not just to the customer (i.e. you), but also others. It also explicitly mentions this WiFi hotspot function when explaining this.
I am going to guess that this agreement will be the defence's 'Exhibit A'.
Re: What IPV6 really needs
I have a 6in4 IPv6 tunnel running on my home network. My router (Asus RT-N66U with Merlin firmware) is running an IPv6 firewall which automatically drops any unsolicited incoming traffic. I can set rules in the firewall to permit traffic to individual hosts (e.g. I could have multiple hosts all with their own port 80 services). All my hosts retain end-to-end IPv6 routing without any of that NAT nonsense.
You could make the password as incriminating as you like and it won't put you in jail any longer - you still need to crack it to get to the real evidence. The only dumb mistake he made (apart from molesting kids) was choosing a password vunerable to a simple dictionary attack.
Also, Gary Glitter was dumb enough to take his laptop in for repair at PC World...