Kensington? I don’t think an air tag can actually prevent theft (if they see it they’ll remove it - if they don’t see it they’ll still steal your stuff)
Kensington? I don’t think an air tag can actually prevent theft (if they see it they’ll remove it - if they don’t see it they’ll still steal your stuff)
I have no idea what a DreamMachine is (and wikipedia does not help) so here’s the long answer :)
If you want a VPN tunnel to your own home, for secure access to your LAN, I’d recommend you look into NetBird and/or TailScale, which at their core are wireguard plus NAT punch-through (you can also run wireguard or openvpn directly, but it may be a pain since you most probably have a dynamic IP and possibly a CGNAT).
If you want to hide your traffic while connecting through networks you don’t trust (such as the work one or some cafe’s wifi), you can either use NetBird/Tailscale as above and connect though your home (well, assuming you trust your ISP of course) or some third party VPN which connects to their servers (I’d say look into Proton first).
Keep in mind that VPNs actually do very little for your online privacy (ie. it’s not like google or facebook can’t track or fingerprint you). They do is prevent man-in-the-middle traffic analysis from your ISP (or the admin of whatever LAN you are using), but then the VPN provider can do the exact same things, so… make sure to double-check the privacy guarantees of your VPN provider and compare them with those of your ISP.
What do you (think you) need a VPN for?
Lineage OS is not designed to relock the bootloader.
I don’t understand why so many people worry about that… doesn’t it only ensure that data is wiped if some agent secretly installs a rootkit or sorts on your phone before giving back the device to you?
To me, bootloader locking is mostly a way for phone manufacturers to make it harder to run anything but the ROM they have chosen (and it’s a PITA and the most laborious part of installing a ROM).
https://wiki.lineageos.org/devices/ and make sure to double-check that unlocking the bootloader isn’t too much bother (ie. read the installation instructions)
I don’t see the reasoning in your answer (I do see its passive-aggressiveness, but chose to ignore it).
I asked “why?”; does your reply mean “because lack of manpower”, “because lack of skill” or something else entirely?
In case you are new to the FOSS world, that being “open source” doesn’t mean that something cannot be criticized or that people without the skill (or time!) to submit PRs must shut the fu*k up.
Those are outside Signal’s scope and depend entirely on your OS and your (or your sysadmin’s) security practices (eg. I’m almost sure in linux you need extra privileges for those things on top of just read access to the user’s home directory).
The point is, why didn’t the Signal devs code it the proper way and obtain the credentials every time (interactively from the user or automatically via the OS password manager) instead of just storing them in plain text?
Then your password (your other, “first” factor) is the only thing preventing an intruder impersonates you.
You’ll still have to go through the hassle the now useless second factor puts you through, so you might as well update your second factor even if you trust your first to be very secure.
It’s also on FDroid
Actually, it doesn’t seem to be there https://search.f-droid.org/?q=futo&lang=en
and available via Obtainium/Github
IDK about obtanium, but IIUC the sources are on their gitlab instance https://gitlab.futo.org/alex/latinime
That sounds a lot like “doesn’t matter what words actually mean. I am right nonetheless”.
…but I’m sure you’ll have some personal definition of “semantics” that will allow you to say you are still right, just like you could say “beggars can’t be choosers” in a context where no one is a beggar and there are in fact lots of viable choices.
If you actually read OP post, they are not asking for the moon and… definitely non “demanding” anything.
IDK about each specific requirement (especially the “inactivity” one, but … dude, just log in every 6 months), but I’d say a lot of “privacy” email providers should meet your needs.
Try looking into Proton mail (warning: you’ll have to setup a local relay if you need IMAP/SMTP) or maybe search the web for something like “privacy email provider free” and look into the results.
It’s pretty easy to find articles confirming the Musk/Signal thing https://duckduckgo.com/?t=ffab&q=musk+signal&iar=news&ia=news
Of course most of the rest is speculation, but… the article seems honest enough about it?
You should ask the seller to make sure, but I’d assume those cards will require KYC on activation? I mean, if Romania requires KYC it’s difficult to think someone can sell anonymous cards on ebay.
You seem to be describing the US system (or some other common law one… but I believe district attorney is a US-specific term?)…
IDK about other EU countries (I guess they are all the same in this regard?), but in my Italy the public prosecutor has zero discretionary power when it comes to indictment and must, per the Italian Constitution, proceed based on the investigation outcomes. So there is no “help me catch the bigger fish and I’ll only charge you with some minor crime” like in the movies.
So… yes, what you describe can happen to anyone, but it can’t happen just anywhere :)
To be fair: previous generations of police officers, back when most people used phones, have made extensive use of wiretapping (and current policemen still do, of course).
In your shoes I’d do just that (booting from a usb stick and creating/mounting the appropriate partitions in the new drives)… but you might find resilvering or resizing partitions easier if you are more familiar with those operations that I am.
It must be said that actually copying the files rather than working with block devices will let you switch to a different filesystem (or take advantage of updates/optimizations recently introduced by your filesystem) or use different mount options (eg. add compression) and should in theory lead to better performance (eg. less fragmentation). In a homelab the performance difference will probably be unnoticeable anyways so… just go with the method you are most comfortable with :)
You create a new raid array with the two new disks and move the data there? I fear you’ll have to be more specific about what doesn’t add up for you…
Makes perfect sense to me (not a lawyer, not a US person)… what doesn’t make sense is how many people still think biometric is high security (maybe because of how cool they make it look in the movies?)
It’s quite easy to get rid of all that crap: just come living in the EU