• 0 Posts
  • 33 Comments
Joined 4M ago
cake
Cake day: Feb 17, 2024

help-circle
rss

It’s probably not that interesting.

You might be able to request deletion and still get the data dump, since that request was first.


A VPN doesn’t do anything about the GPS location on your phone.

You’d have to find out why Google thinks you have a certain location, then determine if it’s worth blocking that somehow. If it’s not possible, you’d have to stop using the service entirely if you don’t want that data observed.


People tend to sign in and forget about it on computers, which are more often shared devices compared to mobile devices. That’s one reason they might relax restrictions on mobile vs desktop.




There is no real change. It’s a reauthorization. Continue following best practices to mitigate surveillance.


You can kind of do MFA on the database. You can require a key, which can be very long and complex, and you can store it on a USB drive. You might be able to use a key stored on a yubikey or something too, I haven’t tried it. It probably depends on which KeePass variant you’re using.


Never include a photo in the US. Most companies will immediately discard anything with a photo due to the risk that it can bias the evaluator, intentionally or unintentionally, in terms of race, sex, or age.


They’re all crowdsourced, but the non-Google/Apple crowd is much smaller. This shouldn’t be surprising.

Although I’m sure that Google and Apple also have people being compensated for adding places, either actual employees, contractors, or micropayment style. The FOSS ones don’t have that.



https://en.wikipedia.org/wiki/Acoustic_coupler

Slap your phone in one of those bad boys and go to town with your TST 3550 or whatever.

As for cell phones, I don’t think it’s really supported. I’d recommend using a separate encrypted calling app, or getting a dedicated encrypted phone device.


No, because a method that works on one implementation almost certainly doesn’t work on another.



That’s why they don’t ding you unless you do it often. If you have to do it often, you’re driving too fast.



Big-ticket items like PS5s and laptops have serial number barcodes on the outside of the box for that reason.

If you really don’t want it tracked for some reason, buy from a third party seller who, while they might record that info, isn’t going to share it with anyone and will probably lose the sticky note it was written on in a few weeks. Or go to a pawn shop and buy one in cash.

But if you’re going to use a PS5, aren’t you going to have to link a payment method for stuff like online services anyway?


The chat link is for telegram? It probably embeds a token in the link, either on creation or on click.


Seems sketchy. You give them access to everything instead? How do we know they won’t be an avenue to compromise?

This bit from their FAQ does not inspire confidence either:

Is Guardio Legit?

Guardio is definitely 100% legitimate, and it’s also a great product.

If it was, they wouldn’t need to say stuff like that.


Use a separate work device for work purposes and let the company worry about the rest of it.



If they have a warrant, which is at least in theory overseen by a judge to be respectful of someone’s constitutional rights against unreasonable search and seizure, what’s the issue?


nginx is free and reliable, I’ve set it up for http, tcp, and udp proxies


W3Schools used to be terrible, but it’s gotten better. MDN is still great, but it’s very much a pure technical reference, not great learning material.


Define “trackers”. They don’t put in a chip to track you, no, but if you connect to cell networks, that can be tracked.


Were the courts not enough control for creditors? Since when are they allowed to lock you out of your purchased property without a court order?

I don’t think courts are typically involved for civil repossession.

But it sounds like this is used when the device isn’t your purchased property, but leased on contract.

I guess it makes sense for them to do this if people started leases, paid the first month to get the phone in their hand, then walked away with the nice new phone they paid like $35 for, to sell or just use off-network.


If your DNS provider also provides filtering to block trackers, yes, they would be redundant.


To have e2ee, you’d have to have compatible software on both ends. But if you’ve got that, why bother with the private pipe to Verizon at all?


Actually, that would make it easier to fall for a phishing page. My browser extension will only offer to fill example.com. If I’m on exarnple.com, it won’t. This makes me say “hmm, why no match for this page? ah! the domain is different”. With a notebook, I’d happily type the password in just the same.


If it doesn’t already, that’s probably going to put you in the high-risk group with other car modders.


The whole point of giving you the discount is how they pay for the data. It wouldn’t make sense for them to give you a discount without getting the data.


Don’t. Just fucking don’t. Keep your personal stuff off your work equipment and vice versa. I don’t know why people keep wanting to do this, because it only leads to trouble.


Just curl a bunch of sites at random times? Under https, everything in the URL except the domain is encrypted, so it’ll look roughly like a regular user requesting a page.


All of society runs on people acting on the goodness of their hearts.