Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

@Darkassassin07@lemmy.ca avatar

Darkassassin07

@Darkassassin07@lemmy.ca

🇨🇦

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Hmm

Two possibilities:

Is the old device still plugged in while you setup the new one? Perhaps they connected to each other. My previous Samsung phone did this with my new one without prior setup of the 'feature', though after I signed into my Samsung account onnthe new phone.

Or it could have come pre-loaded with data on your account...

I'm not very comfortable with either option really.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

In other words: your amazon devices are freely giving your wifi info to any nearby new amazon device regardless of whether you've signed into that new device or not.

Begs the question: What other clearly private info do they give away with 0 auth or verification?

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Depending on a setting being disabled thats more than likely on by default isn't much comfort. Most people won't know about or look for those kinds of settings, especially with the deceptive descriptions often used for features like these.

To be clear, I don't use these devices either; I'm just concerned for those that don't know any better.

The verification still needs one of the devices listed in my post to be active on your wifi to allow the setup and communication.

Yes, that's what I said; your amazon devices are giving away your wifi info to new devices. As in once you've allowed an amazon device onto your network, any new device can add itself to that network via your existing device without your input.

This happens before the new device has authenticated into your amazon account as it doesn't yet have an internet connection (ie before its proven to be your device and not say a neighbours) and before you manually provide authentication for your wifi. Hence the 'with 0 auth'.

The auth is likely done by device to device handshake. Its just that there isn't a human involved.

A handshake between a device you own but have little control over and a device you've never seen before, may not have physical access too, and that could have been compromised before requesting your info. Great.

I'm not saying they're beaming it out in plain text for all to read; just that they'll give your info to a device you may not even be aware of let alone own or have any control over. That device may be a stock Amazon device, or it could be something more malicious.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Jesus, you can run more than one piece of software on each bit of hardware....

Why spread out across 12-13 machines? Seems like a huge waste of power, and a whole bunch of extra to maintain.

Darkassassin07 , (edited )
@Darkassassin07@lemmy.ca avatar

As someone who never learned to type properly as a kid, because I was never pushed to at all: no. No she won't.

I love tech, run a home server and am constantly trying out new bits of software and experimenting.

Can't type to save my god damn life.

/edit: fixed my shit spelling from typing errors :(

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Scams in India primarily target foreign nations while bringing cash into the country that then gets spent in the local economy.

As long as they're not targeting others within india, the authorities have little incentive to stop them.

That's before you get to the corruption poisoning the investigations/prosecutions that do happen.

Wi-Fi jamming to knock out cameras suspected in nine Minnesota burglaries -- smart security systems vulnerable as tech becomes cheaper and easier to acquire (www.tomshardware.com)

Wi-Fi jamming to knock out cameras suspected in nine Minnesota burglaries -- smart security systems vulnerable as tech becomes cheaper and easier to acquire::A serial burglar in Edina, Minnesota is suspected of using a Wi-Fi jammer to knock out connected security cameras before stealing and making off with lots of loot. Such...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Add it to the pile of reasons to not use cloud based camera systems.

Local storage, with wired connections, or expect it to be knocked out intentionally and at random due to errors/problems outside your control.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I was including wireless local cameras in that, admittedly loose, 'cloud' definition due to the instability wifi introduces.

A long as that cloud is your own: ie another site you own, or a VPS; mirroring the local storage the cameras are wired to, alright. But not as the primary and only destination.

There's been plenty of examples of cloud based systems you subscribe to (ie corporate online storage only), cutting off user access, shutting down, having their own network/systems issues, providing data to third parties including authorities without warrants, etc...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

If it's got local storage, it's not 'cloud based'.

I'm not saying offsite backups of your local storage are a bad idea.

Passkeys might really kill passwords (www.theverge.com)

Passkeys: how do they work? No, like, seriously. It’s clear that the industry is increasingly betting on passkeys as a replacement for passwords, a way to use the internet that is both more secure and more user-friendly. But for all that upside, it’s not always clear how we, the normal human users, are supposed to use...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

How do you remember 70+ different password+username combinations?

Or do you just re-use passwords....

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

The problem I have with a system like that is it doesn't account for leaked passwords/data breaches.

When you find one of those services has had a data breach and your password was compromised; you've now gotta adjust your mental algorithm to make an entirely different pattern, either for every site, or you've gotta remember each of the changes you've made for specific sites.

Long term it turns into a mess.

The White House wants to 'cryptographically verify' videos of Joe Biden so viewers don't mistake them for AI deepfakes (www.businessinsider.com)

The White House wants to 'cryptographically verify' videos of Joe Biden so viewers don't mistake them for AI deepfakes::Biden's AI advisor Ben Buchanan said a method of clearly verifying White House releases is "in the works."

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I'm more interested in how exactly you'd implement something like this.

It's not like videos viewed on tiktok display a hash for the file you're viewing; and users wouldn't look at that data anyway, especially those that would be swayed by a deep fake...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

The ones hosted by my government literally shut down outside business hours...

Try to login to view your tax info for example and it'll tell you to come back 9-5 mon-fri.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I don't understand; why does losing the ability to transmit AM mean they're not permitted to transmit FM anymore?

Darkassassin07 , (edited )
@Darkassassin07@lemmy.ca avatar

Litter box is fine, he was just going to hang upside down from the ceiling and shit on her floor anyway.

Needs the shower though, have you tried to shit while hanging upside down and not covering yourself in it?? No chance.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

(stock Android) I've yet to find any android call recording app that works on a device that doesn't have permission from Google to use the built in call recording features :/

~9mo ago they all got broken by an android update and haven't worked since.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

You missed the part where Meta reviewed it and didn't remove it because it wasn't done with AI. Created manually so it's fine.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

It's a reverse proxy infront of you're services. That's fundamental to how a RP functions. Just like your own reverse proxy.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Yes, because AI has a firm grasp on nuanced topics like law enforcement and civilian/human rights...

You may as well play the video to an empty room.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

It's America; anything but metric.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Make it publicly accessible. It'll most certainly get watched and problems will be reported to be investigated further.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Well, metric time, obviously:

https://metric-time.com/

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Amazon could soon be on the hook for safety of third-party products it sells and ships — Government order could classify it as a distributor, potentially exposing it to more legal claims (www.wsj.com)

Amazon could soon be on the hook for safety of third-party products it sells and ships — Government order could classify it as a distributor, potentially exposing it to more legal claims::undefined

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I never even noticed their 'battle' using YouTube revanced. (only youtube client I use)

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Perhaps via the contact information they provided to their ISP?

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

The ISPs don't need info on the routers...

The FBI has identified the routers; if they're able to connect to them and issue commands, they clearly know the IPs of those routers and thus the ISP servicing that IP. The ISP knows which of their customers is/was assigned a particular IP.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Took me a min to realize...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I work in an auto parts warehouse:

Yeah, they'd be fine. It's surprisingly difficult to break them apart. The load would spread out to almost the full width of the battery on either end (ie the plates attached to the terminals against the underside of the lid).
Some of the models I ship use plastic straps that hook onto the seam between the lid and base and you can really toss em around before they take damage. (some people are less than gentle with parts :/ but I'm not the manager so 🤷)

Some of the larger batteries with screw terminals might not survive, but the ones where these clamp style are used would be fine.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

You can also get that from just the label.
The CCA rating (cold cranking amps) is the max current that specific battery can supply in short bursts. 600 CCA is pretty typical, but I've seen up to 900 in the batteries I ship.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Say you made this, but insulated...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Edge re-installing itself after I've manually taken ownership of its files and purged them from the system 6 fucking times is what's going to finally drive me to abandon windows and go full linux.

I just haven't had the time or energy to rebuild my software stack on a still pretty new to me OS. (emby, the Arrs, Ombi, nginx, and more)

I setup a debian machine a while ago and have been slowly trying to get used to it while migrating a few things, but It's hard when windows is so engrained in most of what I've done on pc.

Darkassassin07 , (edited )
@Darkassassin07@lemmy.ca avatar

Mostly because they got there first tbh.

I started with Plex and was immediately unhappy with their always online model, shitty support, and data harvesting practices. (which has gotten significantly worse over the last few years)

Moved to Emby as the only alternative I'd heard of at the time (7 years ago), and was immediately impressed with how much easier it was to use, it's stability across all platforms I use, their friendly and helpful forums, and their stance on keeping your server your own (no telemetry or dependency on external servers). I pretty quickly purchased a lifetime premier license and it's never failed me.

From there I learned of Jellyfin but by then had no reason to move. Beyond that, I'm just not really a fan of Jellyfins origins (ie forking emby because they didn't like Embys licencing) and their development has regularly lagged behind the others largely because they lack funding to keep a dev team AFAIK. (keep in mind thats an opinion from a distance, I don't pay much attention to Jellyfin as I'm happy with Emby)

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I was spending a bunch of time fighting to get Windows to do what I wanted that I figured I might as well be doing all that work on Linux.

A damn good point.

I really got to get around to telling Microsoft to fornicate themselves with the wide end of a rake...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

There's nothing stopping it from harvesting the data (open tabs, bookmarks, history, etc) from Firefoxs files too.

Chrome just happened to be the non-edge browser the articles author was using.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Side question:

Know a good place I can learn linux user/group/permission management?

I don't understand it well enough so I do a stupid amount of things as root...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I don't care. None of the stuff that breaks is even remotely important to me.

If I've made a point of removing a piece of software; reinstalling it, re-adding shortcuts in 3 different places, and changing my default back to edge with every system update (and now automatically harvesting all the data from every other installed browser) makes me want to personally lynch Satya Nadella. (Microsoft's CEO)

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I do have a pro license (for RDP), but I'm not familiar with the group policy editor. Wasn't aware it could disable Edge. I'll have to explore that more. It's rather absurd a user has to go to those lengths to keep data they've deleted, deleted.

Still gonna move to linux. Been a long time coming.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

How do I manage what users can use sudo?

One issue is trying to create a user to run services under, but not knowing how to give it permission to access what it needs (while also not entirely sure what it should/shouldn't have permissions for).

Or just generally managing file permissions. I understand using chmod in a very basic capacity with a few letter arguments like +r, but then you toss in numbers (chmod 777, wut?) and I get lost.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

But is there any reason why you're looking into micromanaging service permissions?

Because I don't know any better, having very little base knowledge of linux.

The thought process here was that services like nginx should be running under a separate user from root and your main daily user account, only having access to the files it actually needs, but not really knowing how to achieve that. I know genuinely nothing about linux user management and feel a bit overwhelmed trying to figure out where to start :/ (especially comming from the all graphical UI experience of Windows)

Chmod is/was the only tool I've known about for managing permissions. I end up running stuff as root in my experimentations because I randomly run into permissions errors, but don't know how to solve them, particularly without creating more problems for other processes.

I'm using Debian as a first Linux desktop experience; previously I've done some experimenting with rpis managed via ssh, mostly to run pihole, that's about it. The rest has been windows where I was familiar.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Thanks for your help m8, I appreciate it.

I'll have to do some more reading once I've got some time.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

I kinda miss swapping mp3s via Bluetooth on my flipphone at lunch, because we only had the space for 3-4 of em, so you had to swap with friends to get fresh music throughout the week.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

That was presumed by those that have watched it (myself included), but this is the first it's been confirmed AFAIK. The special itself claimed to be AI written, but people weren't buying it.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Well, we left reddit for beginning to plant a walled garden, so...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Yeah... That's what I said...

How to get a private car

Hello internet users. Someone in my family is looking to buy a car and wanted some recommendations for a private one. They are looking to buy new, and need Android Auto and CarPlay. I know all new cars suck for privacy by default, but I was hoping someone here could offer some insight as to which cars can be made better and what...

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Android Auto and CarPlay or Privacy. You won't get both.

Your use of 'need' is quite a stretch.

Darkassassin07 ,
@Darkassassin07@lemmy.ca avatar

Lmao.

Shovels for sale! Get your shovels here! Now 25% off!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • incremental_games
  • meta
  • All magazines