I tried searching for answers as to why these machines are reaching out to numerous locations despite not using PrusaConnect. Location lookup returns the expected Czech, as well as location across the US. I recently also set a friend up with with an Elegoo printer and that was expectedly noisy as hell, but I was surprised with Prusa being the ‘privacy pick’.

For those curious, here’s the logs since about midnight, it seemingly doesn’t talk during the day.

209.51.161.238:123
195.113.144.238:123
23.150.41.122:123
193.29.63.226:123
162.244.81.139:123
64.246.132.14:123
172.104.182.184:123
66.85.78.80:123
68.234.48.70:123
129.250.35.250:123
  • organ@lemmy.zip
    link
    fedilink
    arrow-up
    10
    arrow-down
    4
    ·
    9 hours ago

    There is no opsec in censoring RFC1918 private addresses. There is absolutely no PII involved 🤣🤣🤣

    • N.E.P.T.R@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      7 hours ago

      I was taught in my IT Sec classes to avoid sharing any unnecessary information. Information on private IPs can be used to better understand your network, allowing a threat actor to better navigate your network without needing to do ip scans (which are very obvious and should trigger even basic detection). While it is most likely pointless (since OP probably isnt at risk of targeted attacks), it is still good opsec.

      • organ@lemmy.zip
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        5 hours ago

        Purely theatrical and serves no purpose or benefits. Any TA that penetrates the network would discover those subnets instantly.

        Performative opsec