Musician, mechanic, writer, dreamer, techy, green thumb, emigrant, BP2, ADHD, Father, weirdo

https://www.battleforlibraries.com/

#DigitalRightsForLibraries

  • 9 Posts
  • 127 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle



  • I’ve been reluctant to use Timeshift (in rsync mode) because I’ve twice ended up hosed by it (quite possibly because of a fundamental misunderstanding).

    Doesn’t Timeshift create snapshot files that your system ends up living in, much like VMware?

    Case in point, I misconfigured the Timeshift backup location and wanted to correct it. I deleted snapshot files and went about pointing to the new location. But on reboot, all failed because the snapshot files were apparently live, and could no longer be found. I was dead in the water and had to reinstall. A few weeks later I tried again and ended up in the same situation where a snapshot location was removed and the system failed.

    Now I’m afraid to use it.

    I frequently read posts and other info like this that lead me to believe I just did something wrong and can benefit from using Timeshift, but I also don’t want to rely on running from snapshot files, and prefer my backup to live in snapshots, rather than my live system.

    I’m used to snapshots in TrueNAS and virtualization, so this should be an easy transition, but experience has taught me fear.


  • I’m nor a cash-only convert, but I have some anecdotal evidence for you.

    I’ve visited Boston five times in the past thirty years. Every single time I used my debit card at Thanuel Hall for food, my card was later used for fraud. Always caught and never a big inconvenience beyond replacing my card, but still not ideal. I only ever use cash there now.

    Online shopping, before the Amazon monopoly on e-commerce, my card would get compromised every few months.

    Now I use privacy.com for all transactions that allow it, and its amazing how often those cards are stolen. Thanks to the way the service works, the stolen cards are useless to scammers or thieves, but my declined transaction filter has a few charges declined each month.

    My point being that if you want to avoid fraud, and you can do it, cash is king.





  • I used to provide commercial end-user support for a network intelligence product that used as much metadata as possible to help classify endpoints, shuffling them off to the right captive portals for the right segment based on that data.

    I can tell you that the things you’re saying are transmitted in a DHCP request/offer are just not. If they were, my job would’ve been a LOT easier. The only information you can count on are a MAC address.

    I can’t view that link you shared, but I’ve viewed my share of packet captures diagnosing misidentified endpoints. Not only does a DHCP request/offer not include other metadata, it can’t. There’s no place for OS metrics. Clients just ask for any address, or ask to renew one they think they can use. That only requires a MAC and an IP address.

    I suppose DHCP option flags could maybe lead to some kind of data gathering, but that’s usually sent by the server,not the client.

    I think, at the end of the day, fighting so that random actors can’t find out who manufactured my WiFi radio just isn’t up there on my list of “worth its” to worry about.






  • Re: DuckDuckGo:

    You can sign-up and manage your aliases from any browser on any OS

    But not on the TOR or Mull browsers on Android:

    ETA: I use both DDG and SimpleLogin. I recently bumped up against the ten alias limit in SL, but I prefer the ease of creating outgoing aliases in their dashboard vs the DDG method of manually typing with underscores. That said, they both come in handy and I have dozens of DDG aliases that helped me break my dependence on gmail as my single email provider. Never tried Addy.


  • I’d use the find command piped to mv and play with some empty test folders first. I’m not familiar with Nemo, though I’ve used it for a short while. I’ve never tried the bulk renaming features if they exist.

    Depending in how much variation you have in the preceding underscores, REGEX may be useful, but if its just a lot of single underscores you can easily trim them with a single version of the script.

    Edit: corrected second command typo. I think there’s a rename command I haven’t used in ages that may have args to help here too, but I’m away from the PC






  • If you’re unfamiliar with the change being implemented, Google is using every android device to detect every other device and report that location to a central database. You can then go to the Find My Device app or website and your device can be located if it’s been seen by any other device.

    There’s no need for the user to access anybody else’s device.

    My concern is that my privacy is now being invaded by all the scanning devices in my area, and everybody’s movements are even more transparent for the data brokers.