• 3 Posts
  • 31 Comments
Joined 8 months ago
cake
Cake day: November 14th, 2023

help-circle
  • Stupid people have the most kids, that’s how you know the world is full of idiots. Ocassionaly though you meet a really nice humble person that will make you think positive towards people again atleast for a while… Even better if you carry their torch and continue with those good vibes towards others. Gives you that touch of there’s genuinely good people still out there. Its refreshing.





  • Phone, wallet, keys, 5 USB flash drives of various uses, sharpie, kershaw knife, multitool: I recommend the wave plus with bit kit and ratchet driver from leatherman, ChapStick, and lastly Glock 43x. Plus I usually tote a backpack around and that’s a large list of goodies most people are shocked I use often. 32 oz insulated stainless tumbler and medication. If anyone has travel bag suggestions that’s easy to carry unlike a backpack please speak up! Links are appreciated.






  • If your using good 2fa auth. and generated passwords you probably OK. It wasn’t stated you had good measures in place. I was thinking more identity theft situation where someone could compromise your financials. If all they have is some medications, insurance, and basic info you really don’t have major concerns. Now if they have your DoB, Social Security, Address, etc then that’s where locking down all your accounts would be more appropriate. Your post sounded more severe than your reply here so that lead me to believe it was more dire.



  • They’ve had these systems since the 90’s. There’s a documentary about a guy that got caught from one of these its on Netflix. I forget the name. If I remember I will edit this. He went through an insane amount of court documents and files to uncover LE has been illegally using Stingray systems and other custom made devices in cars for decades. They pinpoint physical location down to the square foot.

    Edit: Avoid all networks but 5G if possible, use reputable VPN, VOIP. There are apps the send you notifications if your connected to insecure network types one on Fdroid is 5Gcell. The documentary is called Web of make believe: Death, lies, and the internet. Daniel rigmaiden is the guy who exposed the system. Highly recommend if you wanna learn to watch it.






  • What is unprivate about brave software? Assuming all telemetry is turned off and the browser is configured for strictest of settings no crypto, no ads, no telemetry, no java, session cookie delete, ect ect. Do we have RCP happening phoning home? I have never set brave up behind traffic analysis to see what outbound traffic gets sent that was not from the user. This can be directed towards desktop and mobile.

    Besides the above the only off putting thing I’m aware they have done is installed their VPN software without permission on dekstop which I found myself before I seen the news about it. Edit wording.



  • Brave has been thoroughly tested from many privacy advocate organizations EFF and more known names using default settings and ranks as the highest overall rated fingerprint resistant and anti tracking protected browser, again at default settings I have ran many tests once configured and get even better results even against librewolf with and without extensions and vanilla Firefox with privacy badger and ublock ect as well as without. (I use librewolf on desktop for those who are gonna down vote this) Gecko based browsers are advised against on Graphene and is spoken in length about on reddit from one of their Devs. Chromium and google is a bad combo sure reliance on Google and all to begin with, but so is supporting Google to degoogle with a pixel device. Could brave be a honeypot? Sure and many other services. So could VPN providers and any service for that matter. The biggest advantage I see using Firefox is promoting a non google alternative and balancing the scale against googles monopoly. In some cases Tor adds risk due to it being a giant vacuum for govt or other malicious entities looking to snoop. Its like taping a sign to your traffic. I think it serves a purpose but that varies from each persons use case.

    Edit typo.



  • Its my understanding the metadata is only stored on the home server that runs for the clients, so under a self host scenario the hoster would be the only party that could access such metadata. One big con to Matrix is that it lacks ephemeral messaging so I’m not sure if chat history is stored on client side once the server goes offline? I cannot find an answer through browser search or documentation. Couldn’t the hosted server be restarted anytime and it would essentially delete the metadata generated each cycle and chat history as well because the chat room would be deleted? Or ran inside say persistent Tails and with a device shutdown or unplug all data would be wiped due to its ram only nature while persistence only keeps the base setup of matrix not a full carbon copy so a new chat would be generated each power cycle. Similar to VPN services running on ram. Thoughts anyone?