• 0 Posts
  • 131 Comments
Joined 10 months ago
cake
Cake day: June 25th, 2025

help-circle


  • I’m confused by this comment, (and the up votes) OpenSnitch is the fully open source application. It even says so in the article.

    “If I ever needed to track down which specific application is making suspicious outbound connections, I would turn to OpenSnitch, the fully open-source, community-driven application firewall for Linux. It is not as polished as the new Little Snitch port, but every line of its code is open for inspection and it does not ask for blind trust.”


  • It depends on what kind of devices you’re using.

    It’s my understanding that SIM cards in phones are just to tie an account and identity to your phone, for purposes of enforcing people to be paying customers for the phone/data services, and tracking your usage based on what level service you’re paying for and what you should receive (5GB of data monthly, unlimited texts, etc)

    But if your phone doesn’t have a SIM card in it, its still connecting to cell towers for purposes of emergency dialing, and the phone itself can continue to be tracked by cell carriers based on what physical cell towers its connecting to, as you travel around. The cell phone modem itself can control and connect to networks independently of what the OS running on the phone tell it to do, its a self contained black box.

    If you have something like a desktop or laptop, both Intel and AMD have “management engines” embedded in the CPU’s themselves that can take control of the device for purposes of shutting down, wiping, etc a company machine that has sensitive information or access on it, and has been reported stolen, not returned by an ex employee, etc. These management engines have direct access to the network stack and can phone home whenever a network connections is present, either from a WiFi network, physical Ethernet cable, or 4G/5G WWAN card.

    https://en.wikipedia.org/wiki/Intel_Management_Engine

    If you have a device that is basically air gapped, no WiFi, no cellphone chip, no bluetooth, etc, than it’s still possible to exfiltrate information off the device, but the software running on the device would have to be programming to be searching for methods to do that. Your average device, unless it’s running malicious software, probably won’t be doing that.




  • I think if you reframe the action, it’ll make more sense why people are upset about this.

    The way you see it: Some idiots created a new law, this guy was just compying with an unenforceable law, and its unenforceable, so why are people even bothering to get upset. They’re not even using hardware assetation to force this yet. He was just doing his job to follow the law to get this software deployed.

    If you reframe it to this, I think it’ll make more sense:

    Some idiots created a new unenforceable law. Did anyone from the government specifically reach out to this software team and demand they add this field? Did the software in any way get blocked from being deployed? Its unenforceable, why even bother voluntarily adding features no one wants, for an unenforceable law? They’re not even using hardware assetation yet to force this. Why make the lives easier for people who want to ruin things, by voluntarily adding these features without even being demanded to?



  • I’m not a ROM developer but I had a Motorola phone and I could see why maybe it would have been ignored for custom ROMs, it had a few non-standard features that were great when using the phone, but I think a pain to support, it had a little touchpad in the bottom center that you could swipe your thumb on to do ‘gestures’ in android like back, recent apps, home, etc. I really liked it but its another weird feature you have to keep working when you’re supporting the phone after the manufacturer stopped providing updates.

    1000014893




  • My workflow now has my machine connected to my displays 24/7, but years ago I had a workflow where I would take my work machine home with me and bring it back in the morning and connect it to a dock. I got so fed up with all the windows piling into the ‘main’ monitor and not remembering their locations, that I wrote a script using some tool I can’t remember now, that i’d set to a shortcut key, and it would throw the currently in focus window to the opposite monitor. Made it really fast to get to my working state where I wanted stuff. It wouldn’t work today because it was exploiting features of the X window system, so I doubt it would work in Wayland.



  • Chiming in to say: I’ve had issues in the past where the WiFi router was factory resetting itself and it turned out this can happen if the power supply isn’t powerful enough for the device. In this case, I think I had gotten the WiFi router 2nd hand from Goodwill or something, and the provided power supply fit in the port, and it had the same voltage, but was an amp underpowered, instead of being something like 12volts 3.5amps, the plug was supplying 12volts 2.5amps, and I guess everything was fine until the unit needed more power (likely from routing high amounts of traffic, or more WiFi units connected)

    I had no idea factory resetting could be the result of something like this so I was at a loss for a while until I found the info online.

    So: check to make sure that

    1. The power supply matches what the unit is requiring, and if it is,

    2. If you have another power plug that matches the barrel jack size, volts and amps, try using that one in case the power supply itself is going bad.






  • I think this stuff sort of depends on how often you upgrade drives. I bought 2 4TB drives in 2015 running in a ZFS mirror, spinning 24/7 as I had heard that the hardest time on a spinning disk is the initial spin up from cold boot, or sleep. (I’m not sure is this if true anymore, but I had disabled sleep on the drives, regardless)

    5 years later, I bought 2 10TB drives to upgrade my storage capacity, and relocated the 4TB mirror to media content, and stuff that was replaceable if the drives failed, so I didn’t need to really back it up.

    Juuust now, at the end of 2025, 1 of the initial 4 TB drives failed and now my ‘old’ ZFS mirror is in a degraded state running on 1 drive, but the drive that failed lasted 10 years.

    I bet the average home lab or self hoster is probably upgrading and replacing their drives with higher capacity more often than 10 years, so they probably would never actually see a drive fail in real life use.