Skip Navigation

Posts
25
Comments
2363
Joined
3 yr. ago

  • Part of the issue, admittedly, is that there's a bunch. Many have outdated info as well.

    NAACP guide seems written for a more peaceful era, but is a good place to start.

    Rescue our Democracy similarly has some oversights when it comes to tech safety, but at least mentions wearing a mask.

    I'm not finding the better guides right now.

    The big things as far as reducing identification that I'm not seeing is that beyond face coverings and the like to prevent facial recognition, don't bring your real phone and if you do keep it powered off in a faraday bag.

    Phones are still traceable when in airplane mode, and while powered off, through bluetooth low power mode. This is what many countries used for covid exposure tracking. The only defense agaist this tracking is having your phone in a faraday bag that it doesn't leave until you are out of the protest area, or simply not bringing it.

    There are a few ways to get burner phones not tied to your identity. If you wanted to go that route, you'd want to do the opposite. Keep the burner in the faraday bag at home and only use it out at protest locations, alongside the advice from those two guides as far as disabling biometrics, etc.

    I'll try and find some better guides later today.

  • In front of the window? Outside!

  • they’re about to make 3D printing illegal

    What now? Who and how? It's a fucking industry at this point and the equipment is already out in the wild.

  • Hey, that's I am a bunny! Didn't know Nicholas went that hard.

  • Huh? I'm having no issues with vsCode, and while I haven't used Discord in ages I didn't have problems with it either. Both are electron. Got any links about these issues handy?

  • The protest safety guides need to be more widespread.

  • That only mitigates. There are still a number of ways to potentially track a hardened phone, and countless ways to breach proper OPSEC on social media that have nothing to do with the platform.

    Don't rely entirely on system choices to keep you safe.

  • If you think that any nation-state with the money to implement this shit isn't doing it already, I have a bridge to sell you.

    Surveillance is a matter of power and maintaining it, far more than any ideological thing. There are already people being caught by this sort of shit in the UK and Europe as well.

  • While making this easier to access isn't a positive, there are a ton of ways that this can, and already is, being done at companies that actually care about this shit.

    Yeah you're totally in the office, but your laptop just magically has an IP from the subnet for devices connected over VPN 🙄

    Once again I must insist that people need to stop expecting any privacy on work devices. It is possible to find out anything on them, including location, it's just a matter of how much effort your workplace is willing to expend on looking.

    Edit: While I appreciate the article being short and to the point, a link to any documentation on this would have been nice. The claim is that it will display the SSID of the Wi-Fi AP you're connected to. While being able to get that from your phone is a new bit of reach, it's possible to gather that from work devices easily.

  • CARLOS!

  • Just enulation? Ducktales 1 got a remake/remaster. Kind of sad not to include that.

  • I work sysadmin/infra engineering, so I don't have any formal cybersec training, but I'm involved with implementing some of these controls upon direction by my workplace's cybersecurity team.

    Burning CDs, DVDs, etc and writing to flash drives should be restricted to only approved individuals or allowed temporarily for a documented business purpose for a limited time period.

    IT personnel should not be allowed those rights during notice period, or depending on job duties, IT personnel should not have direct access to the data which was exfiltrated.

    If they don't have direct access, but have a level of access such that they could grant themselves access: changes to security on folders or storage containing "risky" data should be tracked at bare minimum, and ideally fire a warning if there is no associated access request/ticket. The check for associated ticket would require a pretty mature environment, with ticketing and access management controlled by systems integrated with each other.

    There's also a number of various data exfiltration protection/detection systems on the market, so modern environments should probably have something to fulfill that role.


    No solution is perfect, that's why there's multiple layers to my suggestion. Ultimately, training people to have a security mindset and report things that look strange (as what happened in this example) is the final line of defense. There just should have been more hurdles before that point too.

  • There are limited edition lego crocs now too, but I think those are cheating.

  • Accurate.

    I was simplifying it for the type of person who could possibly think NewPipe was piracy.

  • Altman realizes most people outside of third world countries aren't ready to just hand over their biometrics for cash, so he's come up with a new way to get people to give them to him. Hooray.

    I don't get how anyone can trust a fucking word out of this guy's mouth.

  • On mobile I use Youtube Music Revanced to get Youtube Music for free with no ads. Every so often I'll add the new tracks I've liked to a playlist and download that with ytdlp for local play.

    At some point I'll get the *arrs set up to replace the shitty yt rip with higher quality.

  • This isn't a method to access any paid content for free. At "worst" it's an ad blocker.

    And before you come up with some other shit, I'm from the pro-piracy lemmy instance. I don't actually care if I hurt Google, and if I want to support a creator then pretty much any other fuckong option than giving them more ad impressions on youtube will get more money to the creator. We're talking like 10,000 ad views for a few cents. It's not worth it, and the majority of creators I watch actively endorse ad blocking.

  • It's only a thing if you leave smartscreen on. Think it might also only apply to stuff downloaded through Edge, but don't quote me on that.

  • It's also important to bear in mind that at early ages, conversation doesn't really work. You still do it, because eventually it will sink in, but a certain amount of it is more for the parent than it is for a toddler.

    My daughter is two and a half. She's better than I expected her to be about listening, but if she's already tantruming it's usually less distressing to her to just say no. Gives her less to fuss in response to.

    When she's calm, depending on a number of factors we might be able to talk her through it. We always try. But we're also going to be talking her through it countless times until she gets it.