

Yeah, the systems in place right now took 40 years to build


Yeah, the systems in place right now took 40 years to build


deleted by creator


Currently Anubis seems to be the standard for slowing down scrapers
https://github.com/TecharoHQ/anubis
There are also various poison and tarpit systems which will serve scrapers infinite garbage text or data designed to aggressively corrupt the models they’re training. Basically you can be as aggressive as you want. Your site will get scraped and incorporated into someone’s model at the end of the day, but you can show them down and make it hurt.


It should be noted for the record, if you ever have to use your duress code, do it before you hand the device over, don’t offer it up to them, and SHUT THE FUCK UP.
If you have time, turn the phone back on and you’ll get a “recovery” screen asking to do a factory reset. Select this and let it boot back to the setup screen then turn it off again. It’s now in a state where, if you remembered to shut the fuck up, they’ll have a much harder time proving that you destroyed evidence and didn’t just hand over a device you hadn’t setup yet, as is a somewhat common (good) practice with border crossings.
As with all things you may have to depend on, ideally you should test this flow. Carefully make a backup, verify the backup integrity, then use the duress pin ensuring that everything works the way you expected.


I think in theory you could do it if you had a separate relay, you might only need one for the entire I2P Lemmy community. The relay would always be exposed to some degree but it’s just a relay so it’s not going to attract too much attention, especially if the operators were smart and didn’t sync spicy communities to the clear net


That’s the question, what are they actually providing to warrants. You don’t need to provide a name to be able to identify someone. Do they provide logs or data that could be uniquely identifying before the police pull a tower dump? Who knows…


Okay I looked over their stuff, a couple thoughts:
I want them to be more clear in their privacy policy about what exactly they can and would reveal for a court order, what their screening process is for those orders, under what conditions they would fight one and if they will reveal anything outside the context of a full court order.
Reason: this is one of your biggest areas of vulnerability when signing up for a phone plan.
The lexipol leaks showed that many police departments use phone information requests so much that they include a set of request forms (typically one for each carrier) in the appendix of their operations manuals. Frequently the forms are the only data request tool in that appendix.
If you happened to have a call with someone who then did something Cool™ and got picked up, expect the detective to have your name and address on a post-it on their desk by the next morning. If you talked to them on some online chat platform they’ll send a court order to that platform for your IP then do the same to your carrier to unmask your identity.
Yes, if you were also sufficiently Cool™ they’ll start doing more invasive things like directly tracking your phone via tower dumps, but that’s a significant escalation in time and effort. If things got Cool™ enough that this is a concern though, it may buy you time to get a new phone if you live in an area dense enough for that to not be immediately identifying.
Also: I suspect the zip code is completely unverifiable so put whatever you want in there, basically pick your favorite sales tax rate.


Points 2 and 3 and just innate to the project, not something that can be fixed in a custom ROM. Point 1 is not something any of those projects choose to fix, you need to either root or use a particular ROM to get around that because of how baked into the network stack those limitations are.


We really need an open source mobile operating system that isn’t controlled by tech megacorps.
Android is far too compromised by corporate profit motives.
it helps network operators identify tether traffic and prevents it from being hidden by the systems VPN.
it facilitates vendor pre installed adware, bloat ware, and malware that can’t be uninstalled
it facilitates carrier locking to prevent users from switching carriers


That is in fact the reference


Hello fellow criminals, anyone get up to any good crime lately?


Problem: children are depressed, have nobody to talk to, and want to kill themselves
Solution: pervasive surveillance to make sure they learn that they cannot express themselves in any way, shape, or form, fully preparing them for the digital hellscape we’ve created
Like sure, the chat bots shouldn’t be encouraging people to kill themselves or be used in the first place but this is 100% the worst possible response.


But did you hear? The media dickheads want us all to vote for him because he’s… totally not just another useless establishment Dem.


It negates the need for updates because it’s much less likely that BFU attacks are discovered that could compromise the phone.


Set a reboot timer. It’ll shut down and dump the keys out of RAM putting it in the more difficult BFU state. That way if you phone is taken and not unlocked successfully by you within a day or so it’ll render itself much harder to crack.


Harsh truth, the entire bandwidth of all the HF bands combined, not just the ham allocations, fully DC to ~30MHz, is smaller than a single mediocre home internet connection (per Shannon Hartley theorem). If even 0.1% of the world started using ham radios to do so much as send the bare minimum of ultra compact text messages to each other the entire spectrum would be clogged to the point of uselessness.
HF is great for very localized communications disruptions, but a nationwide or worldwide internet failure would not remotely be helped via HF.


deleted by creator


Vim, Emacs, Helix, Neovim


I think most people who have it figure this out pretty quickly. NT normies feel like they accept the world completely at face value by comparison and it can cause a lot of friction
No real substance here, the article seems to be editorializing the underlying research pretty heavily. Also, who knows if the underlying fmri research is any good given recent revelations about fmri studies:
https://www.nature.com/articles/s41593-025-02132-9