• 1 Post
  • 627 Comments
Joined 4 years ago
cake
Cake day: January 17th, 2022

help-circle

  • I actually asked this morning at the post office specifically thinking about your remarks.

    They do sell non denominative credit cards here. So your card is KYC (I imagine, I don’t think it’s possible to go around that) and they know who you are, ID and all, but stores, online or not, have no name associated to it.

    Regarding online stores I do again advise to be cautious and not assume that because a contact field is there, it is mandatory. Yes it might be important for deliveries of parcels but that’s a moot point if delivery happens to a 24/7 box.



  • Happened to me with another brand and model (can’t recall which to be honest). It did pair but appeared as a generic BT device, not headphones, and thus was totally useless.

    I was pissed.

    Then… I pair with something else, not a computer but something simpler, maybe a phone, I can’t remember, and it worked. So I was shocked, how can for this it works, clearly no driver installed on top and not my desktop?!

    Anyway long story short I tried again few more times and it worked. Headphones were now pairing as headphones.

    I can’t explain why but my point is, I wouldn’t give up. I would retry to pair few times (I know, sounds ridiculous, and yet…) without changing anything.

    PS: if you know the ins and outs of the BT stack and it makes sense to you, please do explain! I’d love to learn


  • IRL : I’d argue most security cameras are, AFAIK, on closed circuits. I don’t think they can upload the data somewhere nor keep it for a long time. Also it takes quite a bit of power to process so unless there is a good reason for it, I doubt anybody nor even a computer vision algorithm, will process it to the point of face recognition.

    Online : virtual credit card (not sure if they need your name) + PO box, post office or next door store compatible with the online shop. Most online shop I know do NOT require a mobile phone number. They might have a field for it but they are not using it for e.g. 2FA so if you were, by mistake or not, to put a random number I don’t think it would matter.

    So at least some of the constraints can be changed.



  • FWIW not only is the project alive (last commit 17 hours ago) but distribution too (cf links above) and project management too (cf e.g. https://github.com/orgs/LMMS/projects/1 as example of complex set of tasks mostly done toward a major release).

    So… I’m not going to give people working on LMMS any advice, but of course I hear you, and OP, when it shows for people who aren’t deep into it a project that seems abandoned.

    I do not know no why the project is in that state but what I hope I have shown is that for sure it’s very much active.





  • services

    • gitea (forge)
    • pmwikis (PIM) e.g. fabien.benetou.fr including… notes on self-hosting
    • affine
    • wg-easy (WireGuard, VPN)
    • copyparty (prototype collaborative filesharing)
    • ntfy (notifications)
    • peertube (videos) e.g. video.benetou.fr
    • Jitsi Meet (video meetings)
    • immers (federated Metaverse, really)
    • WebDAV (files)
    • networked-aframe (live collaboration in XR)
    • open-easyrtc
    • telegram-pim-bot
    • transmission (seeding linux ISOs)
    • fireflyiii

    meta

    • nginx (reverse proxy)
    • grafana
    • cadvisor
    • pushgateway
    • prometheus
    • caddy
    • nodeexporter
    • alertmanager

    also locally (and beyond thanks to WireGuard)

    • HomeAssistant
    • Immich
    • miniDLNA


  • Right… and to be clear every single Microsoft product can do so too. In fact every single proprietary software can do that. If you value your privacy and nobody can audit the code, you should assume it’s being used to report your behavior. It might be aggregated, it might be anonymized, but it might not be and it might be to your boss.

    That’s the “beauty” of closed source : you do not know, so you should assume the worst.

    Edit : “Oh but what about GDPR?” true, well check the ToS and probably find that data is being collected for “quality service and potentially other uses (including but not limited to AI)” in the fine prints.


  • My recommendation is to keep both separate. Your work phone should NEVER be your personal phone.

    Use you work phone at work or on a mission. Not outside, not at home, it does not matter what your contract says, what the law says is what’s important (so check locally, depends on jurisdictions).

    Now IMHO both options such. Apple is closed source and Android provided by work is not customizable so you have no control over. If you want a more radically approach and are serious about privacy, reconsider both.


  • Right, I still don’t understand how it relates to privacy though unless either it makes either fingerprinting easier (which I imagine could be limited if the UserAgent can be changed) or that the OS itself leaks information back, but at this point it wouldn’t matter anyway if you don’t trust the OS, so can you please explain specifically what information would be leaked and how?


  • Here is how I did it https://git.benetou.fr/utopiah/online-hygiene/src/branch/master/index.js namely a local NodeJS Web server tracking my habits.

    You can see the default configuration at https://git.benetou.fr/utopiah/online-hygiene/src/branch/master/index.js#L52-L65

    {id:"twitter",pattern:/.*twitter\.com.*/,perHour:1,perDay:12},
    {id:"proton",pattern:/.*proton\.me.*/,perHour:6,perDay:6*12},
    {id:"yt",pattern:/https:\/\/www\.youtube\.com.*/,perHour:2,perDay:12}, // allow for redirection
    {id:"yts",pattern:/https:\/\/youtube\.com.*/,perHour:2,perDay:12}, // allow for redirection, consider merged IDs
    {id:"linkedin",pattern:/.*linkedin\.com.*/,perHour:1,perDay:12},
    {id:"reddit",pattern:/.*reddit\.com.*/,perHour:3,perDay:12,redirect:'https://lemmy.world/'}, // redirection then enough to read private messages
    // reconsider the tridactyl check for permanently open pages, e.g TabEnter rather than DocStart
    {id:"element",pattern:/.*element\.io.*/,perHour:1,perDay:12},
    {id:"discord",pattern:/.*discord\.com.*/,perHour:1,perDay:12},
    

    In retrospect I should make available outside thus work on my mobile too when I’m not on my LAN, created https://git.benetou.fr/utopiah/online-hygiene/issues/3 accordingly.

    Anyway what is fascinating IMHO in term of minimalism is that… I’m NOT actually using it anymore. Why? Well because the habits is now, roughly, ingrained. I don’t use it because it became mostly pointless.

    That’s I’d argue what one should think of in terms of minimalism. Namely one provides a scaffolding that, yes, as others pointed out, might initially look like MORE work or tools than the typical situation. Yet, this only showcases how terrible the “normal” situation is. Once new habits are formed then remove the scaffolding and enjoy minimalism in a way most people expect, namely visibly less.

    The problem though is that until that final step, it looks like more, BUT during that final step, it looks obvious to others, whereas they entirely miss the process that lead to it.




  • If there was no user interaction needed I’d agree but here, AFAICT, the user still needs to ask. If it’s truly entirely pointless then once the novelty fades away it won’t be used which deprived of precious data points, namely user feedback. For non interactive use I imagine streaming provides already a lot.


  • utopiah@lemmy.mltoPrivacy@lemmy.mlHow important is a VPN to you?
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    6 days ago

    I use

    • ProtonVPN mostly to bypass geoblocking or when specific Torrent trackers demand VPNs
    • WireGuard self-hosted mostly to reach own devices outside my LAN
    • TailScale also for self-hosting access but I pretty much migrated everything to WG
    • ssh tunneling (arguably not VPN but still convenient)

    I also use split tunneling, inclusive (e.g. everything but Firefox) or exclusive (e.g. only qbittorrent) whenever I don’t want to tunnel all my traffic.