Yeah I get that occasionally, swapping to another endpoint fixes it right up
Advocate for user privacy and anonymity
Yeah I get that occasionally, swapping to another endpoint fixes it right up
Its also about monitoring what people are saying privately about your shows
And even if it is your key, if you can’t see how they made the lock then you can’t prove other keys won’t unlock it.
OSS FTW
Linksys luckily still sells OpenWRT specific routers.
sure, and then you have to make sure you get the correct radio accessories, as the built in pi wifi isn’t going to do so hot acting as the hotspot for multiple video streaming devices.
Radios which you also have to vet against the approved hardware list for OpenWRT, and having multiple channels is even more of an issue with the lack of USB ports (depending on model)
In my experience it’s because it’s finicky as fuck and requires very specific (and often more expensive) router models, and even then it still crashes just as much as a proprietary os router.
Not to mention Epstein was able to operate freely for decades while flying out high priority definitely-surveilled-at-all-times targets out to rape kids
Make no mistake, intelligence agencies are every bit as complicit as Epstein himself, and they don’t give a flying fuck about “protecting” kids
And oh darn, didn’t you know the only solution is permanent extension of and expansions to all the patriot act bullshit that has been violating our civil liberties constantly for 20+ years?
Shucks. Welp, if it’s “for the children” or whatever excuse they use this time, I guess we have no choice!
Using weak examples and how they are better served in a different way doesn’t mean much
With push data like this you can identify something like every other member of an encrypted group chat by correlating the push notification metadata
They are demanding this for a reason
This.
If there’s a notification for an encrypted group chat, you can use that metadata to identify the devices of all parties involved in that chat, because the push system has to queue all that up and send it at the same time.
That’s just one valuable use of this data.
In steps, and you kinda drive onto it
Not great for mobile operation, however 😬
That isn’t what you’re getting with any cell phone?
A choice they are making in favor of a tech cartel instead of what is best for their customers, which is the problem we want addressed
No it doesn’t, because it’s generally monitor manufacturers that add display port, and people who want to run on large tvs are SoL
The way I solved this problem is by using an https://invidious.io/ instance.
Logins are easy to create, so you can have one for each subscription set you want to create
Private by default, so not even the fingerprint scripts are monitoring you
And the subscriptions page lists just your subscriptions in order of most recently released, nothing else shoved in
Probably the same reason you’d recommend c++ instead of Python to a new developer.
Yes, they’ll learn Python faster, but with c++ they’ll learn programming faster simply due to how much Python does on the programmers behalf.
There are valid arguments for both sides
garuda is one I’ve been playing with recently, and have been very pleased with
It’s build on arch, so not the most beginner friendly base, but they add all my favorite tweaks into the base install. Including fish as the default shell which is more beginner friendly imo
And it’s built and optimized for gaming any comes with all the needed software and drivers pre installed, so even less tinkering required to get it working.
I know this isn’t the answer you want, but consider switching away from compose
entirely
A local kubernetes instance handles all the routing for me, and since i was using that anyway podman was legitimately a drop in replacement for docker.
Podman is just the tool that creates the container for me, running it gets handled by something else entirely.
Also, i can run podman compose up
just fine, no hyphen needed. https://docs.podman.io/en/latest/markdown/podman-compose.1.html
It’s the signal metadata that they want to keep associated with an identity
They still can fulfill government requests for who is talking to who and how often
and any that code their way out of it using publicly audited and verified technologies will get sued out of business, at best.
Individuals who implement their own encryption will be targeted next, if they aren’t already.