312 lines
28 KiB
Plaintext
312 lines
28 KiB
Plaintext
|
|
Episode: 3321
|
||
|
|
Title: HPR3321: DNS66 URANDOM RANDOM
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3321/hpr3321.mp3
|
||
|
|
Transcribed: 2025-10-24 20:46:17
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
This is Hacker Public Radio Episode 3,321 for Monday, the 26th of April 2021.
|
||
|
|
To its show is entitled, DNS66 and Mrandom. It is hosted by operator and is about 32 minutes long
|
||
|
|
and carries a clean flag. The summary is, I talk about DNS66 and go over some comments from
|
||
|
|
in the episode. This episode of HPR is brought to you by archive.org. Support universal access
|
||
|
|
to all knowledge by heading over to archive.org forward slash donate.
|
||
|
|
Hello and welcome to the episode of Hacker Public Radio, your host operator. I'm going to be talking about, um,
|
||
|
|
DNS66 for Android and Blocking ads. So this is in response to the podcast, uh, you random,
|
||
|
|
and Todd was talking about it. Now I'm obligated to do a show on it, which I've been using DNS66 for a while
|
||
|
|
and I've got some comments that will probably help some people out and I can put them in the show
|
||
|
|
and would see, but anyways, um, I'm going to kind of follow up on some other stuff too.
|
||
|
|
But anyways, uh, Todd said mention some of my comments from the random podcast, which if you haven't
|
||
|
|
watched it or listened to it, I mean, um, it's a great show. There's a lot of good chemistry there
|
||
|
|
and they've been around since 2016, so there's tons of stuff. I actually had to go back and tell
|
||
|
|
which one was, uh, who was Taj and who was Lyle. I can't remember and get him swapped out. So now, um,
|
||
|
|
anyways, I've got the names with the voices. But anyways, uh, let's see, what about the brave browser?
|
||
|
|
I'm actually going to look that up and see, um, all I guess I'll do that at the end. So I'll get to the meat,
|
||
|
|
meat potatoes first. So we're talking about DNS66. DNS66 is a lot like if you remember, uh,
|
||
|
|
for your kids back in the day, there's a thing called a host file and you get to add a bunch of
|
||
|
|
black lists to, um, you know, add stuff to your host file. And instead of that DNS request going out
|
||
|
|
for, you know, ads.google.com, it resolves locally to this Etsy host file. Um, it's kind of a,
|
||
|
|
you know, networking standard thing. So that was the technique early on to block ads. Now we've got,
|
||
|
|
you know, you know, all these weird content dryers and all that stuff and it's really hard to block
|
||
|
|
ads nowadays. So you have to do weird JavaScript stuff and look for specific keywords and
|
||
|
|
scripting languages and whatever. But anyways, back then it was just DNS and all the ads were hosted
|
||
|
|
at one place. So if you had a block list of servers big enough, dot coms, then those would
|
||
|
|
resolve locally, which would point you to the local host. Now there's other stuff like, um,
|
||
|
|
if you have a whole house proxy, you can set up the whole pie hole, which is an app that has a
|
||
|
|
bunch of DNS stuff in there. Um, and it pulls from all different places. Um, and what I actually
|
||
|
|
tried to do was parse out all the domains and IPs from every single input file that, uh, that,
|
||
|
|
uh, feed for, for ads and whatever that, uh, pie holes had. And I had this, you know, I don't know,
|
||
|
|
it was like a 60 meg hose file. Well, obviously in Windows, um, every time you
|
||
|
|
looked to a DNS request, it has to look up that, you know, 60 meg file and it completely took
|
||
|
|
the system down to a crawl. So, um, that's just because you have something doesn't mean you should
|
||
|
|
go crazy with it. Anyways, so if you have like a, you know, five meg or 60 meg, some ridiculous
|
||
|
|
DNS file, then it's not going to work. But anyways, um, getting back to topic here, I digress, uh,
|
||
|
|
DNS 6.6 is a local VPN. So things have kind of opened up for, uh, for Android over time, um,
|
||
|
|
allowing more access to low access, slow privilege, uh, apps. So you can do overlay stuff so I can
|
||
|
|
create an app that will search for objects on other applications, I think. Um, so that gives you
|
||
|
|
the ability to basically do whatever you want across multiple apps. Um, I'll go to get a
|
||
|
|
little bit like any of those apps that clean up your clean up something and they delete something
|
||
|
|
and they ask for the escalated privileges. That's when they're pulling that, uh, uh, that,
|
||
|
|
that security, uh, they're escalating their privileges so that they can have access to things
|
||
|
|
like clearing cash out or ending processes or killing tasks and they do it a bit wonky.
|
||
|
|
Where they click around the UI to, uh, clear out cash and stuff like that because
|
||
|
|
without route, there's not a whole lot you can do. I mean, it's limited to what access you have and
|
||
|
|
these guys are working around that by kind of hijacking your interface, uh, the input devices,
|
||
|
|
basically. So they're moving around, they're moving the, for the lack of a better term,
|
||
|
|
they're moving their mouse around on your phone and clicking these things and that's how you
|
||
|
|
grant them access to do whatever. So, um, what I'm saying about DNS X6 is it's one of those apps.
|
||
|
|
It's a good example of, uh, taking the minimum, the little privilege that you have within, uh,
|
||
|
|
within a, within a phone system, which is great, great security. We're better security than we
|
||
|
|
used to have, but giving that access to a program that you trust to do stuff. So they open that up
|
||
|
|
for, um, VPN, which is a virtual private network. Anyways, um, the idea is that you set up a VPN
|
||
|
|
and all your traffic gets encrypted and nobody can see what you're doing, whatever. I just think
|
||
|
|
everybody's watching anything. Anyways, especially if you have a, you know, VPN in the states,
|
||
|
|
and even outside of other countries, they're probably just copying the traffic from there to wherever
|
||
|
|
just to zoom. So, um, that the purpose of the VPN is that it's a local VPN. So all of the traffic
|
||
|
|
that sets up for DNS 6X, when you request a website, it goes through this VPN.
|
||
|
|
And that allows you to control the traffic at least, um, at a DNS level to, uh, do whatever you want.
|
||
|
|
Now, I don't know if there's any other applications that would be something that would process
|
||
|
|
JavaScript, right? That would process encrypted JavaScript and stuff, um, which, you know,
|
||
|
|
it's going to break a lot of things. And I'll talk about that later. But the idea there is that you
|
||
|
|
would basically have complete visibility into all the scripting that goes across the browsers and
|
||
|
|
applications, um, within reason. Um, I could probably tie it to just the browser. But anyways, um,
|
||
|
|
I guess we already have that somewhat with like, with, uh, you block things like that. Anyways, uh, so
|
||
|
|
when you say, for example, you go to a website, there's a bunch of ads on there. That local VPN
|
||
|
|
goes through, uh, pulls the traffic through that local VPN, which all it does is it kind of
|
||
|
|
says similar host file. It blacklists, um, specific DNS sites, specific ad providers. So it comes
|
||
|
|
with a few in there already. Um, and I think I've tried turning them all on before some of them don't
|
||
|
|
actually exist or aren't able to be downloaded from what I remember. Um, I had to add my own.
|
||
|
|
That was more inclusive. So even, I think even the ones that are already in there weren't
|
||
|
|
aggressive enough for me, which makes sense because, uh, the problem with blocking DNS and things
|
||
|
|
like pie hole, uh, a lot of stuff is going to go not right. It's not going to work. You're going to
|
||
|
|
get a lot of instances where stuff just won't work. And I don't know what people are doing when they
|
||
|
|
have pie holes set up, but you're, you're gonna have a bad day eventually. Um, but then I might be
|
||
|
|
wrong. Uh, but for all ints purposes, oh, I'm not gonna go crazy. Um, for all ints purposes, um,
|
||
|
|
the DNS six six stuff will, will need to have more, um, we don't want to say more, better,
|
||
|
|
better filter. And I think the filter that I'm using right now, I don't know which one it is.
|
||
|
|
So I'll just list off the ones that I have in here. And one of them is not the default.
|
||
|
|
Uh, seven black source file out of way host file, which is out of way for Android. I think that's
|
||
|
|
the one I added manually. Dan Poloxos file and add hill ADHELL. Those are the ones I haven't
|
||
|
|
able right now. And I'll talk about my Pinterest one too. So anyways, once you start the app, uh,
|
||
|
|
you start the VPN. And then you pick before that, before you start the DNS six six, you pick which
|
||
|
|
host files you want. And, um, which, uh, basically what, what providers you want, what blacklist or
|
||
|
|
ads providers you want to use. And I feel like, um, the ads ones weren't really all that good,
|
||
|
|
but I didn't do a whole lot of messing around. I just knew that I wasn't super happy with what I
|
||
|
|
had. So I think I added the add away one. I'm pretty sure that's the net new one. So you pick out
|
||
|
|
which ones you want. Um, you can also set which applications bypass the VPN, which I'll talk about
|
||
|
|
my issues later, but you can pick which applications bypass the VPN. And more importantly, you can set
|
||
|
|
a custom DNS server. So even if you have a local host file, you could, for example, set your DNS
|
||
|
|
to your house. And maybe your house is running, you know, some kind of advanced adblocker or whatever.
|
||
|
|
Okay. DNS based adblockers. And then if you wanted to use, you know, some other DNS besides your
|
||
|
|
phones provided DNS, you could do that in here also. Um, there's not a whole lot to it.
|
||
|
|
There's probably more that you can do with it. Um, because this is very exciting to me,
|
||
|
|
because this is, this allows you to have complete, the theory is, is that this will allow you
|
||
|
|
to have complete control over the network traffic coming across. So that's when I'll go into the issues
|
||
|
|
I have with it or not issues, but just, uh, problems I've had and I've had to work around them.
|
||
|
|
The first thing I noticed is that, um, sometimes it'll just get weird, um, specifically with
|
||
|
|
um, Google, I think Google system applications, things like play network, part of the anything
|
||
|
|
within the regime of Google, um, seems to kind of get weird sometimes. So if like I'm trying to do
|
||
|
|
something really secret squirrel, like pay for an application, I want to say I've had issues
|
||
|
|
with that. So like if I try to, and of course it's not really going to do anything right now,
|
||
|
|
but I feel like I've had issues with like doing Google stuff, um, and it not working.
|
||
|
|
For example, I want to say duo, which is, I don't even want to get on about it, but I've been forced
|
||
|
|
to use duo, which is Google's whatever. And I'm pretty sure duo doesn't like it, um, because
|
||
|
|
you're taking that traffic and you're pushing it to somewhere else. Um, and so a lot of that has to
|
||
|
|
do with CPU intensive, very CPU intensive, and that might be the problems that I'm having,
|
||
|
|
because you're taking full motion video when your phone is already struggling,
|
||
|
|
you're receiving and sending full motion video, um, through things like Teams and, and
|
||
|
|
these apps that want more than, you know, three windows of full motion video,
|
||
|
|
you're following a struggling, right? You're following a struggling to keep up with that. So,
|
||
|
|
um, what I'm assuming is happening is there's too much traffic going across the VPN, local VPN,
|
||
|
|
and it's eating up all the CPU on the phone, and then it's sacking, walking. Um, that's probably
|
||
|
|
more of what's happening now that I say it out loud. Um, but I did notice that it's like sometimes
|
||
|
|
stuff gets weird with, with like Google applications or streaming. Um, I will say that when I get phone
|
||
|
|
calls now, since it's a different episode altogether, but since I was using Hangouts Byler,
|
||
|
|
they're getting rid of Hangouts Tyler and all the phone stuff in Hangouts. So, I had to switch
|
||
|
|
to regular Google Voice, and I've been using that. Unfortunately, it's not the best, but, um,
|
||
|
|
when I receive and send phone calls now, I have to turn off the VPN, even though I have, um,
|
||
|
|
uh, even though I have Google Voice in the bypass list, um, it doesn't seem to work, so there's
|
||
|
|
probably other applications I need to bypass, so I can actually make the phone calls, not,
|
||
|
|
not get destroyed. Um, so anyways, when I send and receive phone calls, unfortunately,
|
||
|
|
I can't use my phone as a phone because of all the ads and BS I have on it. So, I have to turn
|
||
|
|
off DNS66 to, um, make or receive phone calls. It's fine in the beginning, um, but I have to turn
|
||
|
|
it off because it's all start lagging and blip and blip and all over the place because the CPU is
|
||
|
|
trying to keep up. Um, let's see. I will provide, um, there isn't a reason I was doing this,
|
||
|
|
is that I wanted offline blacklisting of, um, of Pinterest, and I don't know how I fell into DNS66.
|
||
|
|
I'm out of scene on a Reddit post, and I'm, I'm a Reddit post, I'm, I'm, I'm derailing again.
|
||
|
|
I'm a Reddit, like, oh, I'm a Reddit late bloomer. Um, if you want to understand something or
|
||
|
|
figure out a hackery way to do something, or whatever reason Reddit has become that medium. So,
|
||
|
|
you know, you're talking about like stack exchange and stuff like that is more for like programming
|
||
|
|
and server-based stuff, but if you're looking for like client side hackery and just, you know,
|
||
|
|
I want to do this with this application. Guarantee there's a Reddit app or Reddit, uh, post that
|
||
|
|
someone's asking that same question and four other people answering it in four different ways,
|
||
|
|
and I think I fell into DNS66 for that reason. Uh, I started to, I didn't start to get frustrated.
|
||
|
|
I had been frustrated with Pinterest for, I don't know, three, four years now because every single
|
||
|
|
Google search is a Pinterest, um, result. And that's, that's, that's by design. That's not by accident.
|
||
|
|
So I have a block here at the house. I have a blocked, um, on my phone now with DNS66 and my
|
||
|
|
wife's phone. So if you were accidentally to click a link in Pinterest, guess what? It's not going
|
||
|
|
to do anything more or less. Um, and there's a whole long story about getting all the DNS servers
|
||
|
|
for Pinterest, but there is a lot of them and, um, a lot, a lot of, a lot of, uh, Pinterest, uh,
|
||
|
|
Pinterest servers out there and domains, subdomains, things like that. So if you just block
|
||
|
|
the main Pinterest domain, no, you'll get .eu and .io and .io and .io and all the other, uh,
|
||
|
|
languages plus other domains that are weird, um, subdomains that are weird. And even to this day,
|
||
|
|
even with my list, I still somehow managed to get Pinterest, uh, sites to come up. I think the
|
||
|
|
login site I need to block or one of the login sites is not, uh, not blocked or their API sites,
|
||
|
|
not blocked or something. Anyways, I'll provide the Pinterest, I think I've got the notes in here.
|
||
|
|
I'll provide the Pinterest stuff to block. Um, I think that's pretty much for DNS66.
|
||
|
|
Um, I've been using it. I have the auto reconnect setup. Um, I guess that's sometimes,
|
||
|
|
sometimes something will get wonky, um, but it's, it's very few and far between. Here recently,
|
||
|
|
it's just the, the, the Google voice, um, it would basically destroy my phone and, and give me
|
||
|
|
no internet for a while. And then I would, even after rebooting the phone, the internet would work.
|
||
|
|
So it's like very odd the way that it was screaming at the phone. Oh, anyways, uh, other than,
|
||
|
|
other than Google voice, thanks pretty much it. I want to talk about the Brave browser,
|
||
|
|
evil stuff. I don't know anything about that. While I talk about that, while I look at that up, um,
|
||
|
|
I want to talk about, um, the script that I made for Windows that can also be written for Linux
|
||
|
|
or cross, you know, rewritten for Linux. Um, uh, Brave browser really that bad.
|
||
|
|
What does it consist of some Brave browser?
|
||
|
|
I don't know.
|
||
|
|
Client themselves politics liberal. Not use their browser.
|
||
|
|
Various schemes such as when you type URL, the equivalent send to browser at one point,
|
||
|
|
read right, you do a different URL that generates money. Wow, I've seen that
|
||
|
|
time and time again. Um, I had a famous, I'm talking about Brave now, I was in reading, sorry,
|
||
|
|
I had a famous, uh, uh, for a while there was a browser-based AV scanner that was beautiful.
|
||
|
|
And it was called Panda Active Scan. Now, if anybody's seen Panda, it was, I think it's, uh,
|
||
|
|
I want to say it's like from Mexico or Chile or something like that. Um,
|
||
|
|
there's not, I don't think it's developed from here in the States. It was developed
|
||
|
|
here. There's still around, but nobody uses them. Um, but you had here like,
|
||
|
|
kind of win, win, um, the killer, the malware killer, what's the famous one? Everybody talks about
|
||
|
|
ad block or ad, it's by, by malware bytes. When malware bytes and whatever the other one that
|
||
|
|
used to be popular started getting super popular. Um, you had all these AV players in a space that
|
||
|
|
were just like grabbing money, grabbing to try to find people to buy their services. So you had
|
||
|
|
some anti-ignorant and all that, but then you had like all of these guys that were getting into
|
||
|
|
the AV space because that was like, everybody needed AV, um, and viruses were everywhere,
|
||
|
|
everybody had pop-ups and all that crap. And people were trying to get their hands on,
|
||
|
|
hand around the whole, you know, ads and potentially unwanted software, uh,
|
||
|
|
programs and all that ad bots and all that. Anyways, this thing, these guys go all over
|
||
|
|
called Panda and they had a client and I purchased their regular client because I loved it.
|
||
|
|
It was a good lightweight thing, but it did do that thing where if you type in the URL wrong,
|
||
|
|
it would redirect you to like a, you are a Yahoo search for whatever you typed in wrong.
|
||
|
|
And that was through the AV. So your, the AV was the proxy for all of your web traffic.
|
||
|
|
And I'm sure they did other, other things like that, but you know, even, I think even at one point
|
||
|
|
my ISP was doing that and I have, um, if you've ever, uh, if you ever want, if you want a block,
|
||
|
|
um, when you type in a DNS name wrong or website name wrong and it goes to an ad,
|
||
|
|
that is not you, that is not your phone, that is not your computer, that is your
|
||
|
|
internet service provider taking a bad DNS request and redirecting you to an ad revenue,
|
||
|
|
generating, revenue generating ad. So, um, I know Charter was doing it. If they're not still doing
|
||
|
|
it, you Google, um, it's called bogus, bogus DNS. And, um, basically, the idea is you can
|
||
|
|
set up in most, it's a DNS mask. When you set up a DNS server, you can set up bogus DNS.
|
||
|
|
And that will, you get the black list of all the Charter DNS servers that are in that list.
|
||
|
|
And it will, if it resolves to those IP addresses, it will, um, say that that's a bogus,
|
||
|
|
DNS, uh, in the bogus DNS list and it won't, it'll just give you the 404 or whatever.
|
||
|
|
So, wait, works, you get a list of all the DNS servers that you get redirected to basically
|
||
|
|
or the ad servers or whatever it is you get redirected to if you type a, if you type a website wrong.
|
||
|
|
So, it's a catch-all, uh, wildcard, for example. So, if I type brf.com and nothing comes up,
|
||
|
|
instead of them saying 404, they're like, hey, let's cash in on this, uh, and people do it,
|
||
|
|
and people that set up hotspots and stuff for living, um, I've heard stories of people getting
|
||
|
|
two, three hundred dollars a month because they set it up to so there's, you know, ads on every page
|
||
|
|
or ads on the portal or you type DNS wrong. It goes to their, their ads, which, I mean, to their,
|
||
|
|
I just, it's, it's not funny, it's not, it's not nice, but I mean, it's one way to make money.
|
||
|
|
Um, and I just sit particularly like it. So, I use the bogus DNS stuff on the server here at the house.
|
||
|
|
I don't think I've had to do it here recently. So, um, maybe it's built into
|
||
|
|
ubiquity stuff or maybe charter quit doing it. Um, but for a while there, you type in a wrong DNS
|
||
|
|
and it would take you to the wrong thing. Anyways, it looks like the brave browsers just doing
|
||
|
|
the same thing. They're money grabbing and doing all this kind of political crap, um, you know,
|
||
|
|
they're, they're equal corporate, right? Um, let's see, the Pinterest stuff I'll drop in.
|
||
|
|
Oh, a YouTube VL script. Sorry, I didn't go explain all of that. Let me just bring up the script.
|
||
|
|
This is a standard. I'm supposed to be doing chores right now so I don't have a whole lot of time
|
||
|
|
to do notes. That's why I'm on all over the place. This is what it's like if I do an ad hoc ad hoc
|
||
|
|
episode of Hacker Moped Radio. So my script for, my bad script, which is a Windows script for
|
||
|
|
YouTube, you know, it's for Windows obviously, but that same logic can be applied to Linux. So,
|
||
|
|
I'll briefly go over what it does. You don't need WGit. Let's make up the calls. This is just
|
||
|
|
a hack that batch file. I'm a Downloads WGit, which most every Linux distribution already has.
|
||
|
|
ARIA C2, which is a multi-string downloader. So think of it as torrent for normal files. So I can
|
||
|
|
request, you know, 16 different threads to the same file and download it 16 times faster. Usually,
|
||
|
|
that's not the case, but you're more often than that. You're, you're surprised. I actually
|
||
|
|
update from four threads to 16 by default. In the GitHub, I think. Anyways, yeah, I set it
|
||
|
|
to 16 to 16. So 16 times 16 is how many things you can download at once from 16 different websites.
|
||
|
|
You can download 16 things from 16 different websites. And it will, it'll have that many threads
|
||
|
|
going at a time. Anyways, so ARIA allows you to download multi-threaded downloads something.
|
||
|
|
So for example, if you were to single thread download something from YouTube, it's going to be fast,
|
||
|
|
right? But it's not going to be as fast as a bunch of little files or a bunch of little short
|
||
|
|
requests. I think Charter Comcast calls it boosting or something stupid. But I know Charter
|
||
|
|
recently kind of got on that boat, meaning that if you request a small little tiny file,
|
||
|
|
it will download it at a phenomenal speed. That's why I use net. And that's a completely
|
||
|
|
different episode that I've probably already done before. Why use net is so fast because you're
|
||
|
|
taking 120 different threads and downloading little tiny files with each one of those 20 different
|
||
|
|
threads. And it's exceedingly fast. So whereas if you were to download a file, a single file from
|
||
|
|
a non website, and this is the whole net neutrality thing, I think a single file from a non-streaming
|
||
|
|
provider, it would come down at two megabits, right? I get locked down to like two megabits of
|
||
|
|
traffic, anything that's not known. It might even be just like HTTPS and HTTP. If it's not HTTPS
|
||
|
|
or HTTP, it throttles you down to two, which is not good, which is not the full speed of the line.
|
||
|
|
So what you can't do to offset that is I can take 16 different chunks and download a little
|
||
|
|
rummol at two and max out at 20. I think I max out at 20 and this is the cheapest Charter connection
|
||
|
|
we have here in Atlanta. And so instead of getting the file at two, I'm getting it at 20,
|
||
|
|
which is still not the full speed of the line because of the bursting and stuff. It still caps it
|
||
|
|
out, but it's definitely better than two. So what is it? Ten times faster, right? I suck at math. So
|
||
|
|
that's what that does. So not only can you use YouTube GL, you can use it with RSE2 in most cases.
|
||
|
|
Sometimes what I discovered is that the way the different parsers that get brought into the mix,
|
||
|
|
YouTube GL is like a multi-stream downloaded parser thing. So when it analyzes a URL or analyzes a site,
|
||
|
|
it looks at it says either there's a white listing or looking at the script on the page or whatever
|
||
|
|
it knows, it tries to guess what the best way to download the media is and it's pretty spot on
|
||
|
|
most of the time. Sometimes I have to use a app called bulk media downloader, along with
|
||
|
|
I've talked about these before, bulk media downloader and the other one you want is called
|
||
|
|
bulk media downloader and perbo something or other and I don't see it in here for whatever reason.
|
||
|
|
Turbo downloader, whatever. And those are but the same people. There's like addon.com all spelled
|
||
|
|
funny and it's a bit sketch, but they that's why I don't run as a user. I have a separate user
|
||
|
|
that I run my browser with. So that way if anything happens with the browser, then I'm not my
|
||
|
|
system is still protected because I'm running it as an internet user. I run the browser as a
|
||
|
|
different user than my home user. So if and when a plug-in gets compromised, like what's the
|
||
|
|
one that recently got compromised? The one that I like to like, nano block and nano block is one
|
||
|
|
of the ones that got used for spam or whatever. It will infect my home machine which is in fact
|
||
|
|
that internet user anyways. So Arya, we got the multi-threaded stuff. We use SFNPEG which is
|
||
|
|
it gives you better control and options for your media. So what you get with SFNPEG is things like
|
||
|
|
I think the ability to pull subtitles and stuff. You also get I want to say subtitles.
|
||
|
|
I don't know where the I don't know where SFNPEG comes into play. I just know that it allows you
|
||
|
|
to do certain things that this regular youtube.pl project doesn't have. Or if you want to
|
||
|
|
extend command lines out for SFNPEG specifically that isn't supported by youtube.pl. You can tell
|
||
|
|
it to do that through SFNPEG. So anyways that's that's the SFNPEG piece. Let's see.
|
||
|
|
After SFNPEG we check to see if it's updateable. So we run youtube.pl-u and that will update it.
|
||
|
|
And then it pulls in the list of all the URLs. It does this really long. There's a comment in
|
||
|
|
there that's called like I think I got rid of it. Yeah Linux dot dot dot youtube.pl. So I have
|
||
|
|
a mark and in front of that mark it says Linux and that's the same basically the same command
|
||
|
|
almost verbatim. But it's missing the start parameter and that's really all it does.
|
||
|
|
So you could essentially modify this script and swap out like three or four different lines
|
||
|
|
and make it a bash script that will do everything you need to do. But this automatically downloads
|
||
|
|
through I think PowerShell. Yeah. I think through PowerShell it downloads WGET and then WGET
|
||
|
|
it uses to pull the latest RIA and SFNPEG through WGET. WGET's a great tool to download
|
||
|
|
stuff from GET Hub without needing GET. You can do filters. So this is a really actually this
|
||
|
|
this bash script is a really good example of how to use WGET to download stuff
|
||
|
|
to as a as a downloader. So I have like some filters in here for for
|
||
|
|
SFNPEG so that it downloads the right you can use RegX filtering. My headset died I guess
|
||
|
|
because it wasn't getting any input and thought that I wasn't using it. But sometimes I'm just
|
||
|
|
using the mic the headset cut off. So that's interesting. I think at the HDR about this headset
|
||
|
|
it's really cool. Other than it cutting off when I'm trying to do an episode HDR. So
|
||
|
|
SFNPEG has a RegX filtering which you can do all kinds of cool stuff which essentially means
|
||
|
|
I can pick out what I want to download from GET Hub and with some magic you can download
|
||
|
|
kind of use WGET as a as a GET tool. So that's what I'm doing there. Instead of pulling down a
|
||
|
|
GET binary and checking out the GET I just pull the zip down and unzip it and then go from there.
|
||
|
|
YouTube BL is downloaded straight from YouTube BL. That's pretty much it for YouTube BL stuff.
|
||
|
|
We covered browser, we covered Pinterest and we covered YouTube and we covered DNS66 so I think
|
||
|
|
we're good. I know I was all over the place but at the end of the day check the show notes
|
||
|
|
for the URLs that I use for DNS66 and if it doesn't work if you're having issues you can always
|
||
|
|
just disconnect the VPN, see if it works and then reconnect it and then know that you need either
|
||
|
|
bypass that application or you need to figure out a way to you know turn it off when you need to
|
||
|
|
use it which I do for Google Voice right now. So anyways it's a long episode supposed to only be
|
||
|
|
like 15 minutes but I randomly went off tangent a few times and that's what happens when I do an ad hoc
|
||
|
|
HDR. So I hope you guys learned something. If you have anything to add again I would like to see
|
||
|
|
something where I have script control at the VPN level where I can decrypt on my traffic locally.
|
||
|
|
Pick for example specific apps that I know are ad heavy and do advanced you know pcaps style
|
||
|
|
filtering on them just to take out scripting languages or take out ads. That would be interesting
|
||
|
|
to see somebody if there's a project out there already. Almost like a better cap but for Android.
|
||
|
|
Would be really awesome and I would need to have this set up like nox and all kinds of crazy
|
||
|
|
crap to look at the traffic because I could just look at the traffic on the phone locally or even you
|
||
|
|
know dump it to a pcap pile or whatever. Anyways it's pretty much it.
|
||
|
|
I'll take it easy and check out you random if you have it it's great show.
|
||
|
|
You've been listening to hecka public radio at hecka public radio dot org. We are a community
|
||
|
|
podcast network that releases shows every weekday Monday through Friday. Today's show like all our
|
||
|
|
shows was contributed by an hbr listener like yourself. If you ever thought of recording a podcast
|
||
|
|
then click on our contributing to find out how easy it really is. Hecka public radio was found
|
||
|
|
by the digital dog pound and the infonomican computer club and it's part of the binary revolution
|
||
|
|
at binrev.com. If you have comments on today's show please email the host directly leave a comment
|
||
|
|
on the website or record a follow-up episode yourself unless otherwise status. Today's show is
|
||
|
|
released on the creative comments, attribution, share a like, 3.0 license.
|