FutileRecipe

@FutileRecipe@lemmy.world

This profile is from a federated server and may be incomplete. Browse more on the original instance.

FutileRecipe,

but one look at the face…

The old paper bag trick does wonders.

FutileRecipe,

“There are no seeding rules…if you fall below a 0.5 ratio, your downloads will be disabled.”

That there sounds like a seeding rule.

FutileRecipe,

now that Google’s search engine has gone down in a bullshit flaming AI crapshoot

Tried Kagi yet?

FutileRecipe,

the ground should absolutely be on the bottom because gravity.

Not necessarily. You typically want the ground longer so it’s the first in and last out. Type G has the ground on top. I vaguely remember hearing that’s because if it comes slightly out and something sharp or metal falls on the plug, you want it to hit the ground and not the live part…but I don’t know how reliable that story is.

FutileRecipe, (edited )

Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device.

FutileRecipe,

I just checked Lineage OS and it looks like Google Play Services doesn’t let you disable sensors permission. Can you do it on Graphene OS?

Yep, there’s a toggle to disable by default globally. I also individually checked Google Play Services, Google Play Store and Google Services Framework, and all three can be denied the Sensors permission.

This is due to Sandboxed Google Play: “GrapheneOS has a compatibility layer providing the option to install and use the official releases of Google Play in the standard app sandbox. Google Play receives absolutely no special access or privileges on GrapheneOS as opposed to bypassing the app sandbox and receiving a massive amount of highly privileged access. Instead, the compatibility layer teaches it how to work within the full app sandbox.”

FutileRecipe,

It’s just hardware. Almost any device can act as your router if you put the proper OS and/or software on it.

I have started using fedora silverblue

Today, I made switch to fedora silverblue and then rebased to ublue image because it has flatpak included in the image. I am also thinking about making my own image based on silverblue. there is a video made by bigpod a youtuber about how to make your own custom ublue image and I learned a lot from that video. I am using toolbox...

FutileRecipe,

then rebased to ublue image because it has flatpak included in the image.

From Silverblue’s Getting Started Guide:

Flatpak is the primary way that apps can be installed on Fedora Silverblue (for more information, see flatpak.org). Flatpak works out of the box in Fedora Silverblue…

Just seems very odd to distrohop for one main reason (flatpak in this scenario), without even checking if that reason is available in your current distro…which it is, out of the box.

FutileRecipe,

Yeah, I’m not saying it’s hard, just illogical. To me, it came across similar as: “I’m moving to this other distro because they have Firefox.” Your current distro also has Firefox, so why are you moving again?

FutileRecipe,

I have like 5 years using Niagara and paying for it…

If you would’ve paid for the lifetime, you only pay once and it’s cheaper than annual once you hit 3+ years.

Yearly subscription: $9.99/9.99€/₹120 a year Lifetime purchase: $29.99/29.99€/₹360 (once)

Marketing Company Claims That It Actually Is Listening to Your Phone and Smart Speakers to Target Ads (www.404media.co)

A marketing team within media giant Cox Media Group (CMG) claims it has the capability to listen to ambient conversations of consumers through embedded microphones in smartphones, smart TVs, and other devices to gather data and use it to target ads, according to a review of CMG marketing materials by 404 Media and details from a...

FutileRecipe,

They (manufacturer) would just put it in the ToS that the user grants them that access, because very few actually reads those and just hit Accept.

FutileRecipe,

Except the device is already in your home, and most people leave their account logged in. That’s basically like you inviting someone into your house, they hang out in your spare bedroom…and they’re still there. So no need to re-grant consent to a situation that hasn’t changed. Unless you mean it auto-logs out (or you log out) and have to re-grant consent then? Most do require consent on logging in, and the average consumer would hate having to log in every time and would probably use weak passwords because of this.

But, you can at least kick them out (revoke consent).

I just don’t see how a proper law/regulation would fix/restrict this, except to make certain personalization attempts (targeted ads) illegal.

It's funny how google pretends the music on YouTube isn't straight up piracy and everyone just goes along with it

Most people have extremely weird ideas of what’s considered piracy and what isn’t. Downloading a video game rom is piracy, but if you pay money to some Chinese retailer for an SD card containing the roms, that’s somehow not piracy. Exploiting the free trial on a streaming site by using prepaid visa cards is somehow not...

FutileRecipe,

They posted it on the Internet, so it has to be.

FutileRecipe,

I use ProtonVPN’s Secure Core. Their entry nodes are in privacy-friendly countries — Switzerland, Iceland, or Sweden — and exit nodes can be to any of their VPN servers in dozens of countries around the world. It’s a double hop which increases latency slightly, but I don’t real-time game on this configuration.

protonvpn.com/features/secure-core

FutileRecipe, (edited )

Amazon’s logic is you paid a subsidized/cheaper price that is offset by included ads. You can buy it without ads (more expensive, obviously) from the start.

FutileRecipe,

It’s part of defense in depth. No single piece will protect you from everything, so you you use multiple layers of protection.

FutileRecipe,
  1. Blocking older known malware still blocks them, so that’s good (and saves bandwidth because the connection never happens, so this is really good).
  2. If the site is hijacked, it needs blocked till it’s unhijacked. So this is good as well.
  3. This is not really a point?

Number one above, stopping the connection before it happens, is really the best benefit, in my opinion. And if they boast a high false positive, you need better lists. You keep saying “they don’t block this or block that.” They are (nothing is) a one stop shop. Simply because they don’t block what you’re cherry picking does not make them bad. Use multiple layers. You say “don’t use a blocklist, use MS Defender instead.” Why not use both the blocklist, MS Defender, and even more stuff? Multiple layers. Defense in depth.

FutileRecipe,

Depends on how you want to use it. For home use, I’d say setup a Pi-Hole with Unbound. You can add your own blocklists and it cuts out the middle man.

FutileRecipe,

With Unbound, you can set it up as a recursive DNS server. Hence, cutting out the middle man. docs.pi-hole.net/guides/dns/unbound/

FutileRecipe,

tl;dr: Cut out Cloudfare’s recursive resolver (or anyone else’s) and run your own via PiHole and Unbound.

You don’t cut the middle man, you create the middle man with Unbound.

Umm, Unbound is on your machine. So you’re saying you are your own middle man lol…which is the same as cutting out the middle man as you (rather, your server) are you.

And Unbound needs to ask other DNS servers on the internet to resolve DNS queries.

It asks the authoritative nameservers, which is who external DNS servers ask. By using Unbound, you are cutting out those external DNS servers, because you/Unbound is the DNS server. You are asking the authoritative name server directly instead of inserting someone else to ask on your behalf.

Here’s an explanation by Cloudflare: A recursive resolver (also known as a DNS recursor) is the first stop in a DNS query. The recursive resolver acts as a middleman between a client and a DNS nameserver…Most Internet users use a recursive resolver provided by their ISP, but there are other options available; for example Cloudflare’s 1.1.1.1.

I copy/pasted the above quote from the article you linked. Again, Unbound (your machine) is asking the DNS nameserver. You’re saying you are your own middleman lol. I’m saying cut out Cloudfare’s recursive resolver and run your own via PiHole and Unbound. Did you read the article I linked?

FutileRecipe,

Trust me, I fully get it. You are trying to be pedantic and “technically correct,” Um Actually style. I am speaking from the perspective of this sub (privacy and enhancing it). You are your network. You are not a middleman in the context of yourself or your network. You are not losing privacy in relation to yourself. That’s being ridiculous. It’s like saying “I didn’t cook this steak at my house, um actually, my stove and pan did. Well, they (and I and the butter/oil) were the middleman. Let’s not forget the fire. Etc.” Again, ridiculous.

Also, you’re right in that you have to ask a DNS server to resolve a name to an IP. But in this context, DNS servers ask the root name server. Those DNS servers are the middlemen, rootname is not. With Unbound and recursive, you are asking the authoritative root name server. They are not a middleman to themselves…they are the authority in DNS (it’s in the name). Also, Unbound as Recursive does answer the question of OP which was “what DNS to use?” When you configure a recursive resolver, you don’t (shouldn’t) change it away from the root nameservers and insert a middleman (someone/something you don’t control), and it doesn’t do it by default. OP was clearly asking about non-authoritative DNS servers to use aka “should I use Quad9, CloudFlare, etc?” And my answer was…none. Cut out those middlemen that don’t need to be there/asked (which takes away some privacy as you’re asking a person who doesn’t need asked), and ask the root nameservers yourself via Unbound recursively.

You seem to be stuck talking from the perspective of the client/PC. Next, are you gonna say “you’re not actually going to the site. You’re going to the switch, then the router, and a firewall, maybe traversing a DMZ, could be a proxy in there, then going through the core backbone routers of the internet, down into their network. Of course, if there’s a VPN in there, that changes things. Let’s not forget the middleman of your own NIC and CPU, not to mention the keyboard, motherboard, mouse, etc. Oh, of course fiber and cabling. Those are all middlemen.” Do you see how fundamentally ridiculous that is?

FutileRecipe, (edited )

Which one do you trust?

As I’ve said before: myself. Using unbound as a recursive resolver and cutting out the middlemen of CloudFlare, Quad9, Google, etc.

Edit: or do you want the authoritative name/root servers my recursive resolver asks? Ok. I didn’t give these as that’s who everybody asks, to include Google, Quad9, etc…hence me harping on saying cutting out those middlemen and asking the root servers directly. www.iana.org/domains/root/servers

And…who do you trust?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #