![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
Oof. I did not know about that. That’s unfortunate!
Oof. I did not know about that. That’s unfortunate!
Is there a problem with your Lemmy client? My comment renders fine on Raccoon.
Maybe Logseq, too.
+FOSS like Joplin and unlike Obsidian
+plaintext markdown files like Obsidian and unlike Joplin’s janky database
-less feature-rich than obsidian
-block-based instead of note-based, so a slight paradigm-shift is required
If you continue using our website, we’ll assume that you are happy to receive all cookies on this website.
You literally have an “x” button in the top-right of your web browser (or similar exit feature if you’ve disabled or moved that).
Resistance to carcinisation is futile!
In my country, we can buy pre-paid credit cards in the supermarket using cash. I guess that is still traceable using supermarket security cameras and facial recognition, but if you’re attempting this, I’d make it as difficult as possible.
My calculator uses a stack instead of brackets. #RPN4Life
“Sorry, I was trying to flirt and I can be awkward sometimes. Can I buy you a fresh beer to make up for it and have a do-over?”
I wouldn’t consider that desperate or easy, but I’d be icked out by it. I’ll buy somebody a drink, but I don’t want to drink a stranger’s backwash.
Nethack DROD
They’re rad, and you don’t notice the crease when the screen is displaying anything. I’ve had the zFold4 and now the 5 and I love it.
You might start googling things like “OSINT handbook” or “OPSEC guide” and see what people put together to protect yourself from data-mining, fingerprinting, and various other ways to protect your personal information.
Open Source Intelligence (OSINT) is the practice of using freely-available resources to collect information on something/somebody. Learning about the tools used to perform OSINT searches is a good first step to determine which databases you may want to scrub yourself from.
Operations Security (OPSEC) is a military term that involves the security and protection of any data – classified or unclassified – that could potentially be used against you. OPSEC sounds exactly what you’re looking for, but I mention both terms because looking at potential attacks from both a red team (attacker) and blue team (defender) is a good practice to make sure you’re not missing any vulnerabilities (in other words, even if your only goal is defense, it is beneficial to think like an attacker and visualize how you would attack yourself).
One such result of a search shows John Troony’s Opsec for the Paranoid gist.
Some example of people-finder sites like LexisNexus from his document would be:
## People-Finder Sites
- BeenVerified: http://www.beenverified.com/
- DOBSearch: https://www.dobsearch.com/
- Intelius: http://www.intelius.com/
- LexisNexis: http://www.lexisnexis.com/en-us/products/public-records.page
- Spokeo: http://www.spokeo.com/WhitePages: http://www.whitepages.com/
- WhitePages: http://www.whitepages.com/
But the nearby sections in that document may be of use to you, like “Opt out of Data Mining”.
OSINT/OPSEC is a giant rabbit hole you can go down, and you can get as paranoid as you want – scrubbing social media sites or poisoning the well of sites that collect data indiscriminately and don’t let you remove it, all the way to the ultra-paranoid burner phones and entire false identities (as long as you hopefully stay within the bounds of what is legal in your country or at least keep your laws in mind when you do step outside of the law). If you are interested in stuff like that, you might start looking at things like The Hitchhiker’s Guide to Online Anonymity.
The POSIX standard is more portable. If you are writing scripts for your system, you can use the full features in the main man pages. If you are writing code that you want to run on other Linux systems, maybe with reduced feature sets like a tiny embedded computer or alternates to gnu tools like alpine linux, or even other unixes like the BSDs, you will have a better time if you limit yourself to POSIX-compatible features and options – any POSIX-compatible Unix-like implementation should be able to run POSIX-compliant code.
This is also why many shell scripts will call #!/bin/sh instead of #!/bin/bash – sh is more likely to be available on tinier systems than bash.
If you are just writing scripts and commands for your own purposes, or you know they will only be used on full-feature distributions, it’s often simpler and more comfortable to use all of the advanced features available on your system.
Steve Harvey implicated in recent fake Mars photo scandal.
Oh, yuck. Yeah, I have a Samsung phone, too, and can’t figure out how to strip exif data from screenshots. You might be stuck with a third-party exif-stripper app.
What phone, what camera app, what Android version (and be specific if the manufacturer or service provider added their own customizations, as is common with Samsung and most major service providers).
ChatGPT has no burden to respect HIPAA in that scenario. The medical provider inputting your PHI into a cloud-based LLM is violating your HIPAA rights in that case.
What patient data?
I’ve been involved in a number of cults, both as a leader and a follower. You have more fun as a follower, but you make more money as a leader.