Musician, mechanic, writer, dreamer, techy, green thumb, emigrant, BP2, ADHD, Father, weirdo

https://www.battleforlibraries.com/

#DigitalRightsForLibraries

  • 8 Posts
  • 132 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle

  • Important excerpt:

    “Introducing a scanning application on every mobile phone, with its associated infrastructure and management solutions, leads to an extensive and very complex system. Such a complex system grants access to a large number of mobile devices & the personal data thereon. The resulting situation is regarded by AIVD as too large a risk for our digital resilience. (…) Applying detection orders to providers of end-to-end encrypted communications entails too large a security risk for our digital resilience”.




  • I’m nor a cash-only convert, but I have some anecdotal evidence for you.

    I’ve visited Boston five times in the past thirty years. Every single time I used my debit card at Thanuel Hall for food, my card was later used for fraud. Always caught and never a big inconvenience beyond replacing my card, but still not ideal. I only ever use cash there now.

    Online shopping, before the Amazon monopoly on e-commerce, my card would get compromised every few months.

    Now I use privacy.com for all transactions that allow it, and its amazing how often those cards are stolen. Thanks to the way the service works, the stolen cards are useless to scammers or thieves, but my declined transaction filter has a few charges declined each month.

    My point being that if you want to avoid fraud, and you can do it, cash is king.




  • I used to provide commercial end-user support for a network intelligence product that used as much metadata as possible to help classify endpoints, shuffling them off to the right captive portals for the right segment based on that data.

    I can tell you that the things you’re saying are transmitted in a DHCP request/offer are just not. If they were, my job would’ve been a LOT easier. The only information you can count on are a MAC address.

    I can’t view that link you shared, but I’ve viewed my share of packet captures diagnosing misidentified endpoints. Not only does a DHCP request/offer not include other metadata, it can’t. There’s no place for OS metrics. Clients just ask for any address, or ask to renew one they think they can use. That only requires a MAC and an IP address.

    I suppose DHCP option flags could maybe lead to some kind of data gathering, but that’s usually sent by the server,not the client.

    I think, at the end of the day, fighting so that random actors can’t find out who manufactured my WiFi radio just isn’t up there on my list of “worth its” to worry about.



  • Re: DuckDuckGo:

    You can sign-up and manage your aliases from any browser on any OS

    But not on the TOR or Mull browsers on Android:

    ETA: I use both DDG and SimpleLogin. I recently bumped up against the ten alias limit in SL, but I prefer the ease of creating outgoing aliases in their dashboard vs the DDG method of manually typing with underscores. That said, they both come in handy and I have dozens of DDG aliases that helped me break my dependence on gmail as my single email provider. Never tried Addy.


  • I’d use the find command piped to mv and play with some empty test folders first. I’m not familiar with Nemo, though I’ve used it for a short while. I’ve never tried the bulk renaming features if they exist.

    Depending in how much variation you have in the preceding underscores, REGEX may be useful, but if its just a lot of single underscores you can easily trim them with a single version of the script.

    Edit: corrected second command typo. I think there’s a rename command I haven’t used in ages that may have args to help here too, but I’m away from the PC






  • If you’re unfamiliar with the change being implemented, Google is using every android device to detect every other device and report that location to a central database. You can then go to the Find My Device app or website and your device can be located if it’s been seen by any other device.

    There’s no need for the user to access anybody else’s device.

    My concern is that my privacy is now being invaded by all the scanning devices in my area, and everybody’s movements are even more transparent for the data brokers.