Black Mirror
VoIP systems are getting us closer to your example. Properly provisioned VoIP (on-prem or cloud) can take a SIP user which looks exactly like an email address and direct digital calls to a physical phone. These days it’s likely going to be sent to an office desk phone or a Teams user, but many years from now it will likely be more common to dial out like that from/to any phone device.
I think your example is a bit more nuanced in that there’s some sort of regional database that I suppose one could register for when they change their address. But I don’t think we’re moving in that direction. Things are moving in a decentralized manner and folks hold onto their digital identities, regardless of their geographical location. So like others comments have said, the phone book system is not evolving any further, because modern communication systems are already the evolved version.
This is awesome.
The multi xxxx registration is god damned mad lad max level.
Very strange, but glad you worked it out!
I’ll keep this thread in mind if I ever run into something similar.
Well, dig is available also of course, but nearly all distros still include nslookup despite it getting deprecated. I like the simplicity of its interactive mode.
Host is also really great with more human-readable output.
Don’t get me wrong, when things are getting hairy, you’re going to make a lot of use of dig. I just find that most troubleshooting can be taken care of a lot simpler with host or nslookup.
nslookup is available on macOS and most Linux distros as well (and very helpful indeed).
Yeah if you can dig a record and received a response it’s not a routing issue.
But aren’t you on the same subnet as your DNS server? There’s no routing happening if you’re on the same subnet which I was assuming.
Even through dig defaults to outputting A records when no other options are specified, I would use the A option anyway just in case:
dig @192.168.0.249 study.lan A
If you use “ping study.lan” do you see it output the A record IP address in the first line of output?
Did you try using nslookup as I described?
How exactly are you testing this from your client, with ping? What are you using to query the DNS?
If you run nslookup from the client
I’m assuming you’ve run ifconfig to verify your client’s NIC has been assigned the correct DNS via DHCP?
JFC, thank you. I didn’t realize until it was spelled out for me. I’m definitely not that kind of smart.
This is why I always sucked at games like Myst
Yeah, I use that feature all the time. It’s really great. I can upload an image of text data and get an output in table or summary format.
My dude, I think they blocked you broski… /s
Just kidding…maybe you have the group silenced?
Ladypool and Wolverpool team up?
Nah, I was just kiddin’!
This was a great post and fun to comment with
These aren’t the post titles you’re looking for… 👋
But does she like your Torx?
( ͡~ ͜ʖ ͡°)
Nah, just missing
ana ,
FTFY
I don’t think I’ve ever really considered any of EFF’s articles “pointless” per se. But the article is a bit more nuanced than just setting in a pin (I mean the first sentence introduces the intent of the article: “Encrypting the data on your iPhone isn’t as simple as creating a password“), and I thought it would be interesting for anybody who didn’t know.
There’s also some notes about legal standings, which I thought was interesting:
In the U.S., using a biometric-like your face scan or fingerprint-to unlock your phone may also compromise legal protections for the contents of your phone afforded to you under the Fifth Amendment privilege against compelled incrimination. Under current U.S. law-which is still in flux-using a memorized passcode generally provides a stronger legal footing to push back against a court order of compelled device unlocking/decryption. While EFF continues to fight to strengthen our legal protections against compelling people to decrypt their devices, there is currently less protection against compelled face and fingerprint unlocking than there is against compelled password disclosure.
But ultimately I thought that it would be good for folks to know about the Advanced Data Protection feature, which takes your security beyond the scope of just your local phone’s PIN or password.
With Advanced Data Protection enabled, your backups and most important files get the end-to-end encryption benefit, better securing your files against mass surveillance, rogue Apple employees, or potential data leaks.
This protects your data in the cloud and makes it inaccessible to anyone including Apple, who wouldn’t be able to help you if you lost your recovery backups. You can also setup Recovery Contacts if you lose access to your device.
There’s some other interesting features this article does not go over like Stolen Device Protection, which changes the behavior of how your iPhone allows access to the device based on its location.
You sound like an experienced pro power user, so you may find this article pointless worthless.
I’m not seeing the issue here
How did these two even come to this position??