

There’s also the question of what happens when Gabe dies or retires. Unless he’s a secret communist and has plans in place to make it into an employee coop it’ll be sold by his estate to private equity.


There’s also the question of what happens when Gabe dies or retires. Unless he’s a secret communist and has plans in place to make it into an employee coop it’ll be sold by his estate to private equity.
NVIDIA, FORK YOU!


Sitting on Lemmy waiting for some 338LM brass to dry in the oven then I’m back to the press to fill and seat everything. Have been putting off loading for my precision rig but recent events have introduced some new urgency to that task.


You raise good points, though I think the issue stands that our processors and farmers are extremely complacent to the point of being negligent. I can’t exactly fault Europe for not wanting any part of that, they generally care much more about food quality than we do here.


IIRC it’s not just hormones it’s bleached because we consider chicken with salmonella to still be fit for consumption. Our farming processes are so bad that we have to bleach the chicken to attempt to mitigate the hearth hazard.


deleted by creator


Currently Anubis seems to be the standard for slowing down scrapers
https://github.com/TecharoHQ/anubis
There are also various poison and tarpit systems which will serve scrapers infinite garbage text or data designed to aggressively corrupt the models they’re training. Basically you can be as aggressive as you want. Your site will get scraped and incorporated into someone’s model at the end of the day, but you can show them down and make it hurt.


It should be noted for the record, if you ever have to use your duress code, do it before you hand the device over, don’t offer it up to them, and SHUT THE FUCK UP.
If you have time, turn the phone back on and you’ll get a “recovery” screen asking to do a factory reset. Select this and let it boot back to the setup screen then turn it off again. It’s now in a state where, if you remembered to shut the fuck up, they’ll have a much harder time proving that you destroyed evidence and didn’t just hand over a device you hadn’t setup yet, as is a somewhat common (good) practice with border crossings.
As with all things you may have to depend on, ideally you should test this flow. Carefully make a backup, verify the backup integrity, then use the duress pin ensuring that everything works the way you expected.


I think in theory you could do it if you had a separate relay, you might only need one for the entire I2P Lemmy community. The relay would always be exposed to some degree but it’s just a relay so it’s not going to attract too much attention, especially if the operators were smart and didn’t sync spicy communities to the clear net


Your daily reminder that much of what they’re doing was started and enabled by Biden.
https://www.cato.org/blog/fbis-crosshairs-socialist-rifle-association
Edit: k so to expand on this because we’re having some difficulty with this concept, they’re likely going to be starting with lists that have existed long before trump 2, possibly even trump 1. Biden could have not created/destroyed (depending on timeline) a lot of that infrastructure but because he was just GOP-lite here we are with leftists being surveiled and concentration camps on the border.


That’s the question, what are they actually providing to warrants. You don’t need to provide a name to be able to identify someone. Do they provide logs or data that could be uniquely identifying before the police pull a tower dump? Who knows…


Okay I looked over their stuff, a couple thoughts:
I want them to be more clear in their privacy policy about what exactly they can and would reveal for a court order, what their screening process is for those orders, under what conditions they would fight one and if they will reveal anything outside the context of a full court order.
Reason: this is one of your biggest areas of vulnerability when signing up for a phone plan.
The lexipol leaks showed that many police departments use phone information requests so much that they include a set of request forms (typically one for each carrier) in the appendix of their operations manuals. Frequently the forms are the only data request tool in that appendix.
If you happened to have a call with someone who then did something Cool™ and got picked up, expect the detective to have your name and address on a post-it on their desk by the next morning. If you talked to them on some online chat platform they’ll send a court order to that platform for your IP then do the same to your carrier to unmask your identity.
Yes, if you were also sufficiently Cool™ they’ll start doing more invasive things like directly tracking your phone via tower dumps, but that’s a significant escalation in time and effort. If things got Cool™ enough that this is a concern though, it may buy you time to get a new phone if you live in an area dense enough for that to not be immediately identifying.
Also: I suspect the zip code is completely unverifiable so put whatever you want in there, basically pick your favorite sales tax rate.


Points 2 and 3 and just innate to the project, not something that can be fixed in a custom ROM. Point 1 is not something any of those projects choose to fix, you need to either root or use a particular ROM to get around that because of how baked into the network stack those limitations are.


We really need an open source mobile operating system that isn’t controlled by tech megacorps.
Android is far too compromised by corporate profit motives.
it helps network operators identify tether traffic and prevents it from being hidden by the systems VPN.
it facilitates vendor pre installed adware, bloat ware, and malware that can’t be uninstalled
it facilitates carrier locking to prevent users from switching carriers


That is in fact the reference


Hello fellow criminals, anyone get up to any good crime lately?


Problem: children are depressed, have nobody to talk to, and want to kill themselves
Solution: pervasive surveillance to make sure they learn that they cannot express themselves in any way, shape, or form, fully preparing them for the digital hellscape we’ve created
Like sure, the chat bots shouldn’t be encouraging people to kill themselves or be used in the first place but this is 100% the worst possible response.


But did you hear? The media dickheads want us all to vote for him because he’s… totally not just another useless establishment Dem.
Now this is fucking excellent
On Linux, selecting LUKS when you install encrypts the disk without the potential for this problem. So far it’s proven to be very reliable at stopping state level actors, just don’t use a password that you use elsewhere