Boring

joined 9 months ago
[–] [email protected] -2 points 7 months ago (1 children)

Buy a pixel off marketplace then. You can brag about saving e-waste.

Google isn't a bad company, just a product of poor regulation. They have amazing engineers and produce valuable hardware and that should be praised.

Its the business side of things which needs massive regulation and an ethics check.

[–] [email protected] 1 points 8 months ago

Yes, but stoicism also preaches wisdom and being a good citizen.

It is natural for humans to form political systems and it would conform to nature to participate. It would be completely in line with the philosophy to protest, have an opinion against exploitations, vote someone they politically align with into power, and even revolution.

However, focusing on the depressing aspects of tyrants stains the mind and will lead to a loss of self discipline and will only allow the tyrants more power over your mind as they can keep you in a reactive state.

[–] [email protected] 1 points 8 months ago

Straight talk or similar services that you can buy in store for cash.

23
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/selfhosted
 

I have a little side business of doing minor repairs on phones and tablets and such.

I was wanting to host a wiki on my network with ifixit guides for the common devices I work on just in case my internet access goes out.

I host a lot already but I'm not sure how to go about getting the data to upload to the wiki?

Has anyone else done a similar thing?

[–] [email protected] 3 points 8 months ago

You're probably not exposed to the big internet. But that's no excuse for poor security. I'd look up a hardening guide for your operating system.

You should also look up hardening guides for any applications you plan to run, and follow simple security measures like not logging in as root/admin, strong passwords, 2FA.

Not to say you're at risk, but its good practice to make secure your default. Doing this will help you understand the basics of system security and the risks that systems have.

[–] [email protected] 2 points 8 months ago

Might be janky, but if you really wanted this for free you could get a speech to text program like futo, play the video and have it transcribe it and save it to a text file, then copy and paste in the subtitles

[–] [email protected] 3 points 8 months ago (2 children)

Direct source: https://www.amnesty.org/en/documents/act10/7245/2023/en/

Looks to be a pegasus like program, I didn't see any evidence of ISP's conducting mass surveillance on users.

Like pegasus, predator software is a commercial surveillance tool. So it will have to be distributed in accordance to EU law, the union the companies country resides in.

Unlikely to be a major threat to average Joe's, but journalist and politicians beware.

Please be considerate when publishing articles from indirect sources, third party blogs put on the tin foul hat very quickly.

[–] [email protected] 9 points 8 months ago (2 children)

Unless there's a super hacker or NSA agent in the class that can figure out your password in real time.. You should be fine doing that.

[–] [email protected] 2 points 8 months ago

Surley there is a switch out there that can detect voltage used by the device and only deliver that amount.

[–] [email protected] 0 points 8 months ago* (last edited 8 months ago)

Ooookay.. Took me a second to wrap my head around the layout.. Originally I only looked at the picture, which only shows a single switch.

This is an odd topography. Typically when working with switches, you want them connecting directly to the router and not connected to another switch.

You are going to have bandwidth issues out the ass, along with having a troubleshooting nightmare when something goes wrong and you need to trace packets.

Right now you have a hub and a spoke inside a hub and spoke.

Since it looks like your Asus is just an AP in this scenario, you'd be better off:

  • hooking both switches to the ISP router
  • enabling DHCP on the ISP router for the 2.5g switch
  • set your 1g switch to a different subnet, with default gateway to your ISP router
  • enable dhcp for different subnet
  • add Asus for WiFi ability on new subnet

You can then play around with VLANing on the managed switch. You won't be able to separate IoT and Personal WiFi signals with VLAN. Youd need to create a guest SSID for that functionality and change the channels to 6 and 11 so you get good bandwidth

Edit: this is assuming you have a layer 3 switch, if its a layer 2 I would use the Asus as a router/AP and hook it directly to the ISP router and hook the switch up to the Asus.

[–] [email protected] 6 points 8 months ago (1 children)

GraphineOS sandboxes google services. You can take it a step further and only install sandboxed google services on a work profile or user profile so you can have toggle-able google services, allowing bank access and whatnot.

[–] [email protected] 2 points 8 months ago

Depends on your definition of safe.

If you do a public port forward and set up basic security and proper SSL its safe from the majority of people.

[–] [email protected] 3 points 8 months ago (1 children)

Fair point. But GPS signal from a submarine is almost impossible considering GPS needs LOS.

LTE has a range about 10miles and 5G is also LOS. So its brings it down to unlikely that an Apple watch could connect to cellular.

Considering this is underwater and radio waves attenuate very quickly in the water, this is very unlikely to produce any valuable tracking as a majority of the packets would get dropped if any make it to the cellular tower at all.

Only real way someone could track this submarine via cellular would be if they used a cell site simulator and downgraded the signal to 2g, which would be possible with Chinese cellular providers.. But this would require already knowing where the submarine is and/or having stingrays all over the ocean.

 

This law allows the NSA to "accidentally" collect american communication and the FBI to access the "incidental" communication without a warrant.

It is set to expire in December 2023 and will likely be renewed if there isn't much public pressure.

 

I tried running sheltered from the f-droid repository with it not really working that well; refusing to show notifications during setup. I'm not sure of this is because it hasn't been updated in the last 12 months, or if its something on my end.

Any help is appreciated.

 

A bit of news about Clearview AI, who hasn't received enough news time for how invasive their software is.

view more: next ›