You’re all still suckling at the opium teat of corporate media, whether via torrent or not.
- 4 Posts
- 56 Comments
The replacement battery you bought in 2017 was the last of the genuine stock for that 2012 Thinkpad model. Now it’s only poor quality aftermarket. Maybe just stick with the existing genuine battery – its 47 second runtime should be enough time for AC loss to trigger a custom script to make it hibernate.
rcbrk@lemmy.mltoAsklemmy@lemmy.ml•what forums are out there that people actually go to, besides Lemmy?English0·3 months ago- https://budgetlightforum.com/ flashlights et cetera
- so many automotive forums
- https://eevblog.com/forum electronics engineering
- https://www.audiosciencereview.com/forum/ audio, lots of diy
- https://www.finishing.com/ - metal anodising/plating/finishing. This incredible forum has been running since before the internet, originally a BBS.
- https://www.automaticwasher.org/ washing machines and dishwashers
- https://elektrotanya.com/ electronics repair
rcbrk@lemmy.mlto Privacy@lemmy.ml•Signal CEO dismisses Snowden archive research about NSA supply chain attacks, backdooring, civillian surveillanceEnglish42·4 months agoWhittaker’s phrasing is ambiguous. Could be read as expressing one of a number of things:
- The paper/article is misleading and distracting from meaningful threats to privacy.
- That the original tweet is using misleading accusations to distract us from the article’s revelations of meaningful threats to privacy.
- That Appelbaum’s authorship of the research is an unwanted negative association which undermines the attention deserved by the threats documented in the paper which are misleadingly justified as necessary by eg. governments.
It’s difficult to know without a better understanding of Whittaker’s position on the various matters at hand, so I don’t know.
rcbrk@lemmy.mlto Open Source@lemmy.ml•What projects does the opensource world lackEnglish3·4 months ago
rcbrk@lemmy.mlto Selfhosted@lemmy.world•Email with own domain service but local?English5·6 months ago- For incoming mail, on your server run a mail retrieval agent like fetchmail to fetch mail from the externally hosted mailbox into a maildir on your server.
- To serve that maildir to your clients, on your server run a mail delivery agent like the IMAP server Dovecot.
- To accept outgoing mail from your clients, on your server run something like Postfix with a
relayhost
configured with the details of your externally hosted SMTP server.
There’s nothing unusual or tricky about any of this arrangement.
(I have never used their commercial offering).
Jitsi works really well, and the developers seem to have made an effort to have it work well on any platform, even mobile browsers and PSTN. I’ve always found it the lowest friction teleconferencing method for all types of users.
It’s self-hostable, integrates with SIP, and 8x8’s commercial offering mentions HIPAA, BAA and GDPR.
rcbrk@lemmy.mlto Privacy@lemmy.ml•Forget Chrome—Google Starts Tracking All Your Devices In 8 WeeksEnglish51·7 months ago
rcbrk@lemmy.mlto Privacy@lemmy.ml•Finally ditched all Google apps/services on my phoneEnglish9·7 months ago
Migadu is a decent option if you don’t want to self-host.
rcbrk@lemmy.mltoAsklemmy@lemmy.ml•what would you put in space to break the scientists?English0·7 months agoI’d suggest 35,000 low-earth-orbit satellites but Elon is already working on that.
It’s no use. “VPN” means gateway/MITM service, just like “crypto” means digital tulip mania.
Today’s episode brought to you by our friends CoinSkank™ and EchelonVPN.
The article does not explain the primary design purpose of a VPN – providing an encrypted tunnel into or between two private subnets.
For example, your home subnet is typically all 192.168.nnn.nnn addresses – a class of addresses which the wider internet does not route, and which your router/modem does not allow the wider internet to access unless explicitly permitted.
Say you have a NAS on your home network, and you want to access it from your laptop while at a cafe; you could set up a VPN between your laptop and your home router, and it can make your home network appear as your local network to your laptop, giving you access to your NAS.
Or between two office locations of a business – their database servers, accounting systems, printers, etc can all be freely accessible between offices without being exposed to the wider internet.
rcbrk@lemmy.mlto Technology@lemmy.world•Australia bans social media for under 16sEnglish2·7 months agoSo it sounds like an ID will not be a requirement.
Sure, but gov ID is permitted as an option if another non-ID option is also available.
Simply choose between submitting your government ID or, say, switch on your front facing camera so we can perform some digital phrenology to determine your eligibility.
rcbrk@lemmy.mlto Technology@lemmy.world•Australia bans social media for under 16sEnglish391·7 months agoThe ban and age verification requirements apply to pretty much all services which allow communication of information between people, unless an exemption is granted by the minister.
There is no legislated exemption for instant messaging, SMS, email, email lists, chat rooms, forums, blogs, voice calls, etc.
It’s a wildly broadly applicable piece of legislation that seems ripe to be abused in the future, just like we’ve seen with anti-terror and anti-hate-symbol legislation.
From 63C (1) of the legislation:
For the purposes of this Act, age-restricted social media platform means:
- a) an electronic service that satisfies the following conditions:
- i) the sole purpose, or a significant purpose, of the service is to enable online social interaction between 2 or more end-users;
- ii) the service allows end-users to link to, or interact with, some or all of the other end-users;
- iii) the service allows end-users to post material on the service;
- iv) such other conditions (if any) as are set out in the legislative rules; or
- b) an electronic service specified in the legislative rules; but does not include a service mentioned in subsection (6).
Here’s all the detail of what the bill is and the concerns raised in parliament.
- a) an electronic service that satisfies the following conditions:
rcbrk@lemmy.mlto Privacy@lemmy.ml•Can a Unified Push push server see/read notifications?English2·8 months agoYeah, I was doing some more reading and I think it might only be the newest version of the UnifiedPush spec which requires the message to be encrypted.
- https://codeberg.org/UnifiedPush/specifications/pulls/1
- https://github.com/binwiederhier/ntfy-android/pull/98
- https://codeberg.org/iNPUTmice/Conversations/issues/428
I noticed that the examples given on https://codeberg.org/iNPUTmice/up/src/branch/master/README.md are unencrypted.
rcbrk@lemmy.mlto Privacy@lemmy.ml•Can a Unified Push push server see/read notifications?English2·8 months agoI mean ntfy’s primary purpose is not dependent on UnifiedPush – all UP functionality could be removed and ntfy would still work as intended.
Ntfy server knows how to be a UP gateway, and relays those messages to the ntfy app, which knows how to be a UP distributor.
As far as I understand it, a client app using UP to recieve push notifications does perform a registration step with the UP gateway (via the distributor app which communicates with the gateway via its own transport), which sets up and responds with the api endpoint details, which the client app relays to its servers, which can then send UP notifications via the specified gateway.
What are the odds for ejabberd becoming the best matrix server implementation?