Do you mind answering why you feel this way about homeless people? You or I could be among them tomorrow for all we know, I would hope that someone wouldn’t feel that animosity towards me.
Do you mind answering why you feel this way about homeless people? You or I could be among them tomorrow for all we know, I would hope that someone wouldn’t feel that animosity towards me.
I really dislike the idea of “needs ring 0 = nothingburger”.
There’s plenty if ways to gain ring 0 access like a user to approving a UAC prompt… Or for an attacker to utilize any number of existing ring 0 escalation vulnerabilities on an unpatched system, or for a UAC bypass to be utilized, or for the attacker to establish a RAT on the system using a tech support scam or similar.
Difficult? Yes!
Only viable via a supply chain attack as some like to suggest? Absolutely not.
Its a quote from Rogue One if I’m not mistaken
It’s a paid search engine, so their only priority is serving you good search results. It feels like using google before the 2012-ish enshittification.
Have you tried Kagi?
can be had around $500 US
attainable for most Americans in a fairly short timeframe
This is a frankly deranged take considering that 40% of americans dont even have the funds to save for a $400 emergency as of May 2023
I was pretty happy with tuta, but I just switched to proton for the IMAP/SMTP support.
The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.
A device is only secure as long as you are not using it, and it is not accessible physically, or by network.
You do you dude, I’m just saying your advice is awful for the average user.
Firefox with ublock origin and you will unironically have an near identical experience
Does your threat model involve The Mossad? There’s no way on earth that you are genuinely remembering multiple 512 byte random passwords, let alone actually taking the time to type them in.
Having a password manager, with MFA, a strong master password, and rule based device verification is ultimately more secure as you can have every password be randomized.
Best practices are best practices for a reason. I recommend you follow them.
Genuinely terrible advice. Every popularly available password manager service hashes all your passwords, if they have a data breach they have extremely strict reporting compliance and the majority of services will re-hash all your passwords. If youre so extremely concerned about that, host your own.
But what concerns me the most is
Unless they specify they only store the hash I refuse to sacrifice one of my strong passwords.
… What to you mean sacrifice?
I love driving too, but fewer lanes with more transit/cycling infrastructure/stricter testing would let those of us who enjoy driving (and are safe doing so) to have a more open road
Gaelic fire! I don’t usually like indica’s but I loooove Gaelic fire
You can still seed without port forwarding, not being able to port forward only affects how many clients can seed from you. Not being able to port forward causes it to be limited to only other people who are able to port forward.
See my edit for a little additional clarity but I’m glad I could help!
No port forwarding ever set up on my system! It’s bound to my interface and lockdown mode is enabled, all leeching and seeding is tunnelled fully.
Edit: as far as I’m aware, not being able to port forward only limits who you can seed to. Meaning you can only seed to those who do have port forwarding.
I can confirm that Mullvad tunnelled seeding still works even with the port forwarding changes
Tons of vitamin E, folates, and antioxidants apparently
I often think that to myself as well to be honest. Originally, it was mostly because it’s the only “secure” system that I’m currently hosting and I wanted the ability to airgap it without taking the rest of my homelab offline.
I mostly use my homelab for tinkering/applying what I’m learning without breaking a production system at work so needless to say I’ve learned a lot since I originally deployed bitwarden… Now it’s just because I’m too lazy to spin a new vm and migrate everything.
We Taught This Chimpanzee to Understand the American Political System and He Hanged Himself