I tried searching for answers as to why these machines are reaching out to numerous locations despite not using PrusaConnect. Location lookup returns the expected Czech, as well as location across the US. I recently also set a friend up with with an Elegoo printer and that was expectedly noisy as hell, but I was surprised with Prusa being the ‘privacy pick’.

For those curious, here’s the logs since about midnight, it seemingly doesn’t talk during the day.

209.51.161.238:123
195.113.144.238:123
23.150.41.122:123
193.29.63.226:123
162.244.81.139:123
64.246.132.14:123
172.104.182.184:123
66.85.78.80:123
68.234.48.70:123
129.250.35.250:123
    • mlfh@lemmy.sdf.org
      link
      fedilink
      arrow-up
      14
      arrow-down
      3
      ·
      edit-2
      12 hours ago

      Good opsec, really.

      Edit: also I just realized this is the Privacy community lol

      • organ@lemmy.zip
        link
        fedilink
        arrow-up
        10
        arrow-down
        4
        ·
        9 hours ago

        There is no opsec in censoring RFC1918 private addresses. There is absolutely no PII involved 🤣🤣🤣

        • N.E.P.T.R@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          1
          ·
          7 hours ago

          I was taught in my IT Sec classes to avoid sharing any unnecessary information. Information on private IPs can be used to better understand your network, allowing a threat actor to better navigate your network without needing to do ip scans (which are very obvious and should trigger even basic detection). While it is most likely pointless (since OP probably isnt at risk of targeted attacks), it is still good opsec.

          • organ@lemmy.zip
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            5 hours ago

            Purely theatrical and serves no purpose or benefits. Any TA that penetrates the network would discover those subnets instantly.

            Performative opsec