• 0 Posts
  • 68 Comments
Joined 1 month ago
cake
Cake day: January 21st, 2025

help-circle

  • If you’re mechanically inclined and can work with small parts, the old Sony branded walkmans are generally good quality and have a decent supply of replacement parts. Some of the new portables have awful wow and flutter that will make it seem like that two step is a polyrhythm!

    I listen on my phone in the world, cd and tape when I’m driving and on whatever at home. Today it was goat and escape-ism.


  • I was gonna say pit vipers but they’re American.

    You should get some vipes anyway, they make a safety rated ballistic pair.

    Once I had a pair bought from someone on eBay break on me and they just wanted to confirm there was a joke written on the frame before sending a replacement pair for free. I think I had to pay shipping or something but standing behind an eBay purchase from a third party is cool.




  • For the purposes of the average person the tech guy in your op is absolutely 100% correct.

    All the platforms listed use transport encryption and that’s enough to avoid mitm surveillance which is enough for most people.

    Most people’s “threat model” is the police or a pi. All the apps listed including signal have to comply with orders from American police and have “sidechain attacks” that involve stuff like getting some member of the groupchat’s device and scrolling up or tricking someone into giving up sensitive information.


  • Gayhitler@lemmy.mltoAsklemmy@lemmy.mlPassword Managers
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    21 days ago

    I would recommend people not do that unless they know they need to and again, if you know you need to you’re not asking on lemmy.

    Hosting your own secrets not only puts the burden of protecting, providing access to and preserving the secrets entirely on you, but puts a very unique set of hosting goals squarely on you as well.

    Even a skilled administrator with significant resources at hand would often be better served by simply using bitwarden instead of hosting vaultwarden.

    An example I used in another thread about password managers was a disaster. When your local server is inoperable or destroyed and general local network failure makes your cloud accessible backup unreachable, can you access your secrets safely from a public computer at the fire department, church or refugee center?

    Bitwarden works well from public computers and there’s a whole guide for doing it as safely as possible on their website.



  • Gayhitler@lemmy.mltoPrivacy@lemmy.mlprivate ways to buy music?
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    21 days ago

    Privacy from whom?

    I ask because the easiest way to do what you’re asking is to have your local record store sell you shit and pay in cash (that you’ve laundered so the serial numbers don’t match the atm). You can even be like “I’m trying to get away from computers man, can you order me this off eBay?” And guaranteed if you spent a hundred bucks or so on used releases they’ll say “absolutely!”

    Of course, you’ll stick out like a sore thumb and have a lie to keep up with, so you’ll not have any real measure of anonymity.


  • There’s a lot of arguments for one solution or the other based on security or privacy, but let me present a different scenario:

    Imagine you’re in a natural disaster. Your home based self hosted server is down because of a general rolling network outage or just irrecoverably destroyed. Your offsite on the other side of the county is in a similar state. Can your cloud hosted backup be accessed at generic, public computer in a shelter or public building?

    Bitwarden can. It has specific instructions for doing so as safely as possible.




  • SMTP is only encrypted if the second server responds correctly to the first servers starttls.

    The striptls type of attack, which prevents the servers from getting a valid starttls exchange, was in use over a decade ago by some telcom against its own customers.

    Even if you know the person you’re emailing has a correctly configured client you can’t control a man in the middle attack between servers which has been in widespread use for years.







  • Set an iCloud recovery passcode. It removes the ability to recover your iCloud account by verifying that you’re the owner but it also removes the ability of Apple to be compelled to access it.

    Op: read about pgp/gpg. Do it now. When you don’t understand something ask questions about it instead of giving up.

    Email was never intended to be private. It was never designed with privacy in mind and your use of a client employing an encrypted connection to your mail server does not solve the problem because tens of thousands of mail servers use unencrypted connections.

    No one needs your iCloud to read your email, they can just look at the plaintext mail coming to and from the server.