Mordikan

joined 2 weeks ago
[–] Mordikan@kbin.earth 2 points 1 hour ago (1 children)

Are you sure linux-firmware was the only thing uninstalled? What are those XYZ's? you might just need to reinstall those items.

[–] Mordikan@kbin.earth 1 points 4 hours ago

Yes and no.

A lot of privacy threads focus on fantastical what-if scenarios that just never really come up. For the majority of Internet users, the biggest threat they would face comes from the adtech sector. Now most people aren't going to understand what is collected in realtime as that's usually company specific and usually encoded on the site/app, but standards are all open for anyone to read. Mostly this is going to come in the form of OpenRTB 2.6 (https://iabtechlab.com/wp-content/uploads/2022/04/OpenRTB-2-6_FINAL.pdf) or the Prebid library and its User ID Module (https://docs.prebid.org/dev-docs/modules/userId.html) with maybe some custom fields and VERY granular audience mapping.

Specific to that standard, 3.2.20 Object: User and 3.2.27 Object: EID and 3.2.28 Object: UID are the important ones, but honestly all of the information can be used in conjunction with other pieces. Now if you look through that info, you'll notice you don't really see that much. You're real name isn't present. Your email isn't present. Your physical address isn't present (although its likely your geo location info is accurate from the device object). The thing is that so many little bread crumbs exists and so many actors are mapping those bread crumbs that once human psychology is overlaid on top of it crazy amounts of information that was not collected can be inferred. People think info like "His name is John Smith" is important when really "This is device ID EA7583CD-A667-48BC-B806-42ECB2B48606" and the numerous IDs built from that or a dozen other things is what matters.

Just from that standard with enough data/time, its possible to determine your demographic/sociographic information. One could determine who you will vote for and political leanings, how much money you make, what your job is, your sexual orientation, etc. This is great if someone is trying to sell you Tide detergent, but its also really useful if you're wanting to start a "grassroots" campaign to add/remove rights for specific citizens. It allows you to know where you can get a foothold for your legislation (Cambridge Analytica comes to mind). And these things are all easily verifiable from your browser. Without an adblocker, go browse the internet and keep track of how many 1x1 tracking pixels get dropped on you. Checkout what's in your cookie store and what's sitting in sessionStorage and localStorage.

So, I think groups like r/privacy focus a lot on sci-fi inspired dystopia, when instead they could be focused on more real world dystopia.

[–] Mordikan@kbin.earth 1 points 5 hours ago

That's a valid reason. AirVPN is slower than Mullvad or PIA. AirVPN does fit some use cases better, like multi-port forwarding, but that's not going to be what everybody is doing. PIA does offer port forwarding but only single port for single instance. To do multiple, you'd have to have multiple sessions running which doesn't really work well from one machine.

So, if speed is your only criteria, don't use AirVPN. Better options exist.

[–] Mordikan@kbin.earth 1 points 5 hours ago

You might try Vortex through lutris: https://lutris.net/games/vortex-mod-manager/

I'm not sure why one of those is flagged. From what I can see its just the obnoxiously written write_file.content one-liners and lots of regex/sed, but nothing looks wrong with what its doing.

[–] Mordikan@kbin.earth 12 points 1 day ago

GDPR is not relevant to state monitoring. Article 23 provides the provisions to explicitly restrict data protection rights for the purpose of eavesdropping, detection, crime prevention, etc. Its wildly open ended to the point that it makes no difference in choosing a VPN: https://gdpr-info.eu/art-23-gdpr/

[–] Mordikan@kbin.earth 21 points 1 day ago (4 children)

If you aren't concerned with flashy setups, AirVPN might be something to check into. In terms of cost, 3 months of AirVPN cost roughly about the same as 1 month of PIA.

[–] Mordikan@kbin.earth 8 points 1 day ago

That mouse is probably using like 0.5W of power, that's way too much. Throw it away and keybind everything.

[–] Mordikan@kbin.earth 1 points 3 days ago

Might check the file permissions then. Who owns the file? Does VMM have read permissions to the file? UUID 1000 is root, so it sounds like VMM is being run as your user, but the ISO is owned by root. You could try chown'ing that file to your user.

[–] Mordikan@kbin.earth 1 points 1 week ago

I never really got their marketing campaign: https://www.youtube.com/watch?v=JNsKvZo6MDs

[–] Mordikan@kbin.earth 7 points 1 week ago (1 children)

Yeah, if the student devices are locked down its done so per policy. Creating VMs which allow students to bypass that policy is going to potentially get you into trouble with administration. IT could maybe setup those students with Citrix Workspaces or something similar they support to achieve that without having to throw student restrictions out the window.

[–] Mordikan@kbin.earth 3 points 1 week ago (1 children)

So, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.

To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone's house. We'd also build cantennas from junk laying around. Those were interesting days.

[–] Mordikan@kbin.earth 0 points 1 week ago (1 children)

If its compression related, have you checked your caching on that system?

You might try (as root - not sudo) to toggle swap off/on: swapoff -a && swapon -a Then just before running the installer (again as root - not sudo): echo 3 > /proc/sys/vm/drop_caches

view more: next ›