

On ios using the accessibility options is the same way.
“Hows the new os treating you?”
“Same as the last one, why?”
“What, lemmie see that fucking thing!”
instantly blinded by inverted colors, high viz, big letters, low motion, low transparency
On ios using the accessibility options is the same way.
“Hows the new os treating you?”
“Same as the last one, why?”
“What, lemmie see that fucking thing!”
instantly blinded by inverted colors, high viz, big letters, low motion, low transparency
No worries and no apologies necessary.
One thing I’ve been thinking about is the historical circumstances around traditional dress in the Arabic speaking world, Muslim religious proscriptions about clothing and how those could converge with outcomes in the present day.
Giant wraparound shades with a punisher skull veil dangling off em.
I don’t know about the particulars of other countries, but in America you’re mistaken.
The goal of my comment was not to “well actually” but instead to point out that, relevant to the post topic and concurrent with your recognition that technology has fundamentally changed in our lifetimes the understanding of privacy and anonymity we apply in everyday life, if you want privacy you have to take active steps to ensure you can go in public and maintain it.
That doesnt mean using graphene and libreboot, it means covering your face in public.
No. If you don’t jump through those hoops you give up the completeness of your anonymity, privacy or security.
If you’re uninterested in simply recognizing that fact, consider that the “push button, get privacy” level development is being worked on in reverse by every intelligence agency, data broker, state and municipality with astronomical funding levels.
Actual privacy tip: don’t go in public
How long is “in the long run?” How much can you afford to spend? What country? How many devices?
For what you’re describing it doesn’t seem like places like mullvad or proton are the right choice. Nord is a good way to get past geofencing for decently cheap. Windscribe can also be cheap. Air is cheap if you’re not Italian.
Anti malware VPN services can be okay sometimes, I wouldn’t call them a serious option though because they’re often tied to use of some antimalware suite and may have glaring flaws when used without the rest of that software.
No. For the purposes you’re talking about wired is fine.
How your network is managed and set up makes it possible to get more security from WiFi using a bunch of new technologies added to recent WiFi protocols but you’d have to be actually have set all that up and have compatible networking stacks on the computers.
Also, and I say this as no great lover of Microsoft or its products, windows isn’t snooping network traffic not meant for it and bundling it up in its telemetry uploads.
Used to be you could buy time on aws’s satellite link and listen there too if you wanna spend less than 800 bucks in equipment.
Anything where you put the file somewhere under profile A then read it under profile B will work.
Depending on why you want to transfer a file between profiles there are probably different tools you’ll like.
There’s a checksum program to test them on GitHub called gog-checker I think.
If you think you have malware, just backup, flatten and reinstall.
It was the switch to Microsoft accounts. Everyone started using online accounts to login and when people complained apple said “okay, you don’t need to and here’s some ways to make it safer” after some high profile leaks, google said “we’ll anonymize your data so when we use it for tracking it’s not tied to you, also here’s some ways to make it safer” after everyone realized they weren’t not being evil and Microsoft said “are you fucking stupid? It says right there in the tos that we’re gonna take and use everything!”.
Go to massgrave.dev and start reading. Convert your Microsoft account to a local user account. You will still have a Microsoft account but you won’t use it to login. You will lose access to stuff you bought under your Microsoft account until you sign in. This may or may not be acceptable to you.
Use your knowledge from massgrave to convert your windows edition to enterprise iot ltsc if you’re on 21h2, otherwise either downgrade or flatten and reinstall that edition. You will now be able to receive security updates and stay on windows 10.
Set up full backups you can reliably recover with before doing this.
With Luks there are several situations you can end up in where you can’t just pop your disk out and pull files from it, removing a first response to many common hardware failures.
If it’s fucking up your life, stop doing it.
If you need to do it, go do it in reality.
Seriously though, if you’re feeling paranoid about everything, stop doing the stuff that makes you feel that way.
Last time I said it was hard to figure out if this was some kind of malice or just someone without much experience/knowledge.
I been thinking about what this post and the one before it actually are though. They’re not disinformation, I don’t think they’re misinformation although I think that argument could be made if there was actual intent (and a person could also make the argument that there is intent).
This just kind of seems like white noise or what would be called slop if it were generated by ai.
It’s not useful in making a decision.
A vpn is a tool and you use the right tool for the job. A chart comparing the various similarities and differences between a box and open end wrench, flare nut wrench, socket set, power drill, impact driver and torque wrench would be useless for decision making about what tool to buy because they’re for different jobs.
If you need to take the lug nuts off a truck the right tool is an impact, if you need to replace brake lines you’re gonna use a flare nut wrench.
It’s not useful to compare pia and mullvad. If all you need is a cheap way to reliably bypass geofencing then pia is the right tool. If you need deniability and trust then mullvad is the right tool.
It makes no sense to compare air and nord. If you need the cheapest per device service for bypassing content blocks then the tool is nord. If you need port forwarding for torrents, soulseek and usenet all at once then the tool is air.
The problem with posts like this is that they don’t really provide any useful understanding or decision making process and wouldn’t be useful from an educational perspective like the comparison between various wrenches made above (if it were in some kind of Tools for Dummies publication) because they’re not even contextualized as such.
A better start for this kind of post would be “here are some reasons to use a vpn service” or “here are some actual important differences between different vpn services apps”, not weather they’re available on Jim’s cut rate Secure I Promise ™ alternative android App Store.
That’s not harsh. The closing sentences were not meant as an attack on you but as commentary on a pattern in this community.
It’s worth noting that appending a string to your password manager passwords would protect you from simple automated attacks after a password manager breach. Sometimes that’s enough.
3 is stupid.
The point of a password manager is to enable the use of multiple different passwords and usernames. The point of using multiple, hopefully unique, passwords and usernames is that when joes website gets breached and their passwords and usernames get leaked because they were storing them in plaintext it doesn’t mean all your accounts everywhere else are now compromised.
That happens a lot and if you want to learn how affected you are at this very moment just check haveibeenpwned to see what’s osint on your usernames.
So let’s say you’re appending the classic “monkey1” to your autofilled password manager passwords. You’d be protected from a password manager breach until one of your website logins is breached and someone realizes all your gibberish high entropy passwords have “monkey1” on the end. Considering there are billions of leaked credentials and millions get added each week, that’s kind of like putting wallpaper up so the tank coming through your brick wall has to work a little harder.
So what would be actual good advice? Key rotation. At some interval, clear your cache, browsing history etc and change all your passwords. Now you’re actually protected from breaches of old credentials and current credential breaches are rendered moot.
If you read all the way down to here, consider not relying on this community for privacy or security advice. The fact that “stupid asshole” was able to easily articulate why something on the list is a waste of time when no one else has done so should raise some eyebrows.
Your only “good” option is yubikey. They’ve been around comparatively forever, have all the problems worked out and make durable hardware. All that matters because you don’t want to get something from a company that goes under in a few years and leaves you high and dry and you don’t want the dongle to break because that’s your authentication, now you’re locked out of your shit.
I recommend against getting some doodad with a biometric reader. You’re adding complexity, attack vectors and not getting much out of it plus you’re locking yourself out of deniability and the possibility of handing a trusted person your dongle, telling them your password and having them act in your stead.