NaibofTabr

@NaibofTabr@infosec.pub

This profile is from a federated server and may be incomplete. Browse more on the original instance.

NaibofTabr, (edited )

And even if the cooperation doesn’t last, it’s an opportunity for the open source developers to work with the product engineers and get direct information from them right now. There’s nothing as valuable as talking to the guy that actually designed the thing, or the guy who can make changes to the product code.

Even if that relationship doesn’t hold long term, the information gathered in the short term will be useful.

If I were part of this project this is what I’d be going for. Push the company to give you direct contact with the relevant engineers, right now while the negative public opinion is fresh and they’re most willing to make concessions, and then get as much out of that contact as you can. Take them at their word, make them actually back it up, take advantage of the offer to cooperate. Sort the rest of it out later.

The desire to build a self-defense kit from Google and the Internet as it is today

(if you don’t want to go through all my strident words) Thus, after this rant, my question is: where do I start from to build my surviving kit and my right to be private and disclose personal information to who and when I want to. How I become the actual owner of my device?...

NaibofTabr,

I completely agree with your point of view. If you don’t control your technology, then your technology controls you.

You should know that it’s really incredibly difficult to actually establish privacy on internet connected devices. They are designed to share information. Security is often an afterthought and privacy is often directly opposed to the goals of the corporations. It is possible to get a fair amount of privacy, but it is not easy. It will cost a lot of time in learning and configuring things, money to buy specific devices with specific features, and the sacrifice of the convenience that comes with mainstream products (you will have to do a lot more for yourself). There is no quick solution, it is an endless struggle - but personally I think the learning process is extremely rewarding and the skills you gain will be very useful.

So, where to begin? I would recommend learning about the technology that underpins all of the data gathering - computer networking. In order to make real decisions about how to use the technology and how to secure it, you need to understand how it works. You won’t ever know if you are leaking data if you don’t understand how that data is collected and transmitted.

I would like to point you to Professor Messer’s Network+ training course, starting with the OSI model. This will help you learn the terminology of computer networking, and the concepts that underlie everything on the internet. If you get through the Network+ content, do Security+ also.

I also want to recommend the Selfhosted@lemmy.world community. A major goal of self hosting is separating your internet services from corporate control. This community is great place to learn and ask questions.

You should get a cheap computer (old, out of date hardware is completely fine) and install Linux on it so you can start learning how to use it (you’ll need this to get away from Microsoft and Apple, and more importantly to have some control over your computing environment).

You might also be interested in the Murena 2 smartphone. It has physical switches for turning off the microphone and camera and network connections, and it runs /e/os (a de-Googled Android version).

There’s also the Privacy, Security, and OSINT podcast.

I could write about other resources but this post has gotten long. Please feel free to ask me more about anything that interests you.

NaibofTabr,

You’ll understand when you’re older.

NaibofTabr,

I like this idea because it fits with finding them in coin hoards and it seems practical - a simpler way for a merchant to check the value of coins without a scale and set of precision weights.

But this one presents a problem: https://www.historyen.com/wp-content/uploads/2022/06/Ekran-Alintisi.jpg

NaibofTabr,

DARPA in particular has invested in several projects to try to develop a synthetic blood alternative. There’s no chance anytime soon of reproducing all of the functionality of real blood. The research is mostly targeting something that could be transfused in an emergency that could keep someone alive while they’re transported to a care facility (maintain pressure and distribute some oxygen without inducing toxicity), especially something that would be field-deployable with a longer shelf life, preferably without refrigeration.

NaibofTabr,
  1. Assuming that you mean that you are using the domain name to point to services which are at a residential, dynamic IP address, you will need to set up a Dynamic DNS service.
  2. If a product is free, you’re the product.
NaibofTabr,

I trapped lightning in a rock, and taught it to do math.

Computers are arcane wizardry.

NaibofTabr,

Building codes? We don’t need no stinkin’ building codes!

NaibofTabr,

Nah, having your teeth growing out of your lip is totally normal. So is having your forearms merge into each other.

NaibofTabr,

You mean the stuff that people uploaded to YouTube, which YouTube didn’t create for themselves, and has no right to build a wall around?

NaibofTabr,

Just enjoy the gritty crunch that tastes just like chicken

NaibofTabr,

Well he’s definitely not in engineering.

NaibofTabr,

I think Data just sitting there like everything is normal is perfect for the ending.

NaibofTabr,

Thermonuclear reactions are very bright

NaibofTabr,

No, bad bike infrastructure is the standard.

NaibofTabr,

OK, but who is going to replace Sean Connery?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #