You might enjoy reading Extreme Privacy by Michael Bazzell
- 0 Posts
- 37 Comments
I second this. You need physical ethernet cable for the length of your house. Hard-wire anything that needs uninterrupted access. Then install multiple WiFi access points as needed for WiFi coverage. All WiFi access points can use the same WiFi SSID name. Note the difference between a “router” that connects to your internet provider and may also provide WiFi, vs a WiFi “access point” which only provides WiFi. You need one router and multiple access points connected to each other via physical ethernet cable. Keep in mind that even the best WiFi, being a wireless radio connection, will occasionally have dropouts due to radio interference. Prefer 5GHz channels over 2.4GHz channels for less interference. Another commenter recommended the Ubiquiti UniFI line, and I agree. Just avoid the cloud-based login that they try to push, and use a local-only login.
Edit: the “buy it for life” option is hard-wired (CAT-6 or better) ethernet everywhere. Wireless is convenient, but ultimately less reliable.
colournoun@beehaw.orgto Technology@beehaw.org•xAI’s Grok suddenly can’t stop bringing up “white genocide” in South Africa7·2 months agoNot defending Elon, but he did already become a naturalized US citizen in 2002.
colournoun@beehaw.orgto Chat@beehaw.org•Now that *V for Vendetta* and *Idiocracy* have essentially become documentaries, what other movies do you place in that camp?English7·2 months agoRollerball (1975) has similar corporate city themes
colournoun@beehaw.orgto Gaming@beehaw.org•Shower thought: Valve could do the ultimate boss-move this year3·2 months agoIn the year 9595 I’m kinda wonderin’ if man is gonna be alive
colournoun@beehaw.orgto Technology@beehaw.org•AI hallucinations are getting worse – and they're here to stay7·2 months agoI thought I just had a stroke. But it is not the first thing that I hear people do when I see a picture like that in a movie and it makes my brain go crazy because of that picture and it is the most accurate representation of what happened in my life that makes me think that it is a real person that has been in the past.
colournoun@beehaw.orgto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Anyone ever want to pirate for moralistic reasons?English4·2 months agoGo to their shows. Buy their merch. That’s where the creators get the most profit.
colournoun@beehaw.orgto Privacy@lemmy.ml•ICE Wants to Know If You’re Posting Negative Things About It Online8·5 months agoU.S. Immigration and Customs Enforcement www.ice.gov
colournoun@beehaw.orgto Gaming@beehaw.org•You stand at the edge of a ruined town square. (Textpocalypse.art)1·7 months agocheck pub
colournoun@beehaw.orgto Gaming@beehaw.org•You stand at the edge of a ruined town square. (Textpocalypse.art)1·7 months agodeleted by creator
colournoun@beehaw.orgto Gaming@beehaw.org•You stand at the edge of a ruined town square. (Textpocalypse.art)5·7 months agoapproach fire
That reminds me of this video about an AI learning bowling.
My boss doesn’t seem to understand this.
Happy Birthday! 🎂
Is it too late to plant garlic?
colournoun@beehaw.orgto Privacy@lemmy.ml•How can I make random names for email addresses?9·9 months agohttps://simplelogin.io/ (owned by Proton) is great for this. They have a feature to generate an email address by random word or even by uuid.
colournoun@beehaw.orgto Privacy@lemmy.ml•Is it the time for me to switch to Android? iOS is riddled with spyware.5·9 months agoiOS has Lockdown Mode which it sounds like you could benefit from.
colournoun@beehaw.orgto Programmer Humor@programming.dev•This is my life now, until I finally understand Cmake.111·11 months agoProfessional CMake: A Practical Guide by Craig Scott is an excellent guide to modern cmake usage. Well worth the $30 if you need to build, maintain, or modify a CMake project.
colournoun@beehaw.orgto Nature and Gardening@beehaw.org•What's growing on, Beehaw? (Weekly Garden Chat)2·11 months agoPost the video!
Tailscale (https://tailscale.com/) works great for remote access to your private services. Once the wireguard tunnel is established, then the traffic is peer-to-peer (assuming it’s configured correctly) and not through their centralized servers. Even from a mobile device.