Yeah I get that occasionally, swapping to another endpoint fixes it right up
Advocate for user privacy and anonymity
Yeah I get that occasionally, swapping to another endpoint fixes it right up
Its also about monitoring what people are saying privately about your shows
And even if it is your key, if you can’t see how they made the lock then you can’t prove other keys won’t unlock it.
OSS FTW
Linksys luckily still sells OpenWRT specific routers.
sure, and then you have to make sure you get the correct radio accessories, as the built in pi wifi isn’t going to do so hot acting as the hotspot for multiple video streaming devices.
Radios which you also have to vet against the approved hardware list for OpenWRT, and having multiple channels is even more of an issue with the lack of USB ports (depending on model)
In my experience it’s because it’s finicky as fuck and requires very specific (and often more expensive) router models, and even then it still crashes just as much as a proprietary os router.
It’s called an “MBA” and they are the tip of the enshitification spear
Not to mention Epstein was able to operate freely for decades while flying out high priority definitely-surveilled-at-all-times targets out to rape kids
Make no mistake, intelligence agencies are every bit as complicit as Epstein himself, and they don’t give a flying fuck about “protecting” kids
And oh darn, didn’t you know the only solution is permanent extension of and expansions to all the patriot act bullshit that has been violating our civil liberties constantly for 20+ years?
Shucks. Welp, if it’s “for the children” or whatever excuse they use this time, I guess we have no choice!
Using weak examples and how they are better served in a different way doesn’t mean much
With push data like this you can identify something like every other member of an encrypted group chat by correlating the push notification metadata
They are demanding this for a reason
This.
If there’s a notification for an encrypted group chat, you can use that metadata to identify the devices of all parties involved in that chat, because the push system has to queue all that up and send it at the same time.
That’s just one valuable use of this data.
In steps, and you kinda drive onto it
Not great for mobile operation, however 😬
SIM card tracks location and sells it too
That isn’t what you’re getting with any cell phone?
The way I solved this problem is by using an https://invidious.io/ instance.
Logins are easy to create, so you can have one for each subscription set you want to create
Private by default, so not even the fingerprint scripts are monitoring you
And the subscriptions page lists just your subscriptions in order of most recently released, nothing else shoved in
I know this isn’t the answer you want, but consider switching away from compose
entirely
A local kubernetes instance handles all the routing for me, and since i was using that anyway podman was legitimately a drop in replacement for docker.
Podman is just the tool that creates the container for me, running it gets handled by something else entirely.
Also, i can run podman compose up
just fine, no hyphen needed. https://docs.podman.io/en/latest/markdown/podman-compose.1.html
It’s the signal metadata that they want to keep associated with an identity
They still can fulfill government requests for who is talking to who and how often
We’ll make it AI trained on all the “best” citizens, fully automatic!
Can’t have those things being used unregulated or unmonitored
and any that code their way out of it using publicly audited and verified technologies will get sued out of business, at best.
Individuals who implement their own encryption will be targeted next, if they aren’t already.