

Kind of, though with rules. I think I’m describing something closer to structured, encrypted torrents.
Kind of, though with rules. I think I’m describing something closer to structured, encrypted torrents.
On a related note, it would be nice if there was a shared storage option for self hosting. It wouldn’t be the same as self hosting, but more like distributed hosting where everyone pools storage they have available and we could have an encrypted sharing option.
A benign scan could just be looking for an ftp server to connect to or a repeater or relay server of some sort. There are plenty of open services people make available for free and the fact that you would consider it an attack it doesn’t make it one.
At minimum you could be alerted to look for someone attempting to connect to your ftp server with a single basic anonymous authentication vs someone flooding that port with known malicious software attacks, and block the latter across your entire network and effectively ignore the former. Really it seems like you’re advertising your lack of imagination in this context than a legitimate lack of possible uses for spoofing open ports.
At a guess, you might tell the difference between some benign scan and an attempt to actually take advantage of the port, perhaps to use as a trigger to automatically ban an ip address? or a way to divert malicious resources to an easy looking target so they are less available in other areas?
The difference between someone scanning for open ports and someone attacking a port they find open seems significant enough to at least track and watch for patterns… Whether that’s useful for the majority of users or not is rarely why a feature is implemented.
Seems like you missed something there, op didn’t mention how much the China models actually cost. Only that they’re subsidized and that we should also subsidize