• 9 Posts
  • 110 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle




  • As part of a websites DNS info they have to provide a TTL (time to live). This value can be just about anything but is often in the 30s to 5m range, and serves as an instruction on how long a client should cache the IP address locally before checking for updates.

    This is because IP addresses can change, and you don’t want to experience hours of downtime for all clients every time your IP changes.

    Every time your client queries your tracker for server updates (every few minutes, give or take, based on tracker preferences) it should follow your system DNS settings, which should involve checking your local cache, then going to the upstream server indicated in your system DNS settings.

    If your system is set to a DNS server outside of your local network (e.g., 8.8.8.8) that request should go through your VPN

    If your system is set to use a local DNS server (e.g., 192.168.X.X…), typically either done through something like a pi-hole, or if your router sets itself as the DNS server then forwards all requests, this MIGHT create a DNS leak around your VPN.

    A good VPN like Mullvad should have an option to force their own DNS settings when enabled to prevent this leak.





  • Lots of creatures within the realm of benchable weight often have specialized defenses that could constitute a 1-hit KO if you fuck up in the slightest.

    A chimp could rip your arms off. A kangaroo could crack all your ribs with a kick.

    If you consider these “natural weapons” then sure, I guess that just limits you to fighting juvenile cows or something, at which point I’ll give it to you, I could probably take a newborn calf in a fight.




  • The advantage of Tile and AirTags is that they’re relatively dumb devices that leverage passing cell phones to snitch on their location. This means they can last months on a single charge while the phones do the heavy lifting.

    There may be more and less private ways to do what they do, but they’ll all have similar tradeoffs.

    A device that tracks its own location and reports it out over a cell network would basically require all the complexity and size of a smart phone minus the screen and cost similarly

    There are Bluetooth trackers that can be run privately and with enough creativity can be used to identify the location of something within the confines of your home (or know if something is not home), but won’t be much help if you’re trying to track down lost luggage or want to know if you left your wallet at work or the coffee shop. (e.g. https://www.youtube.com/watch?v=-fmBwINdsxQ)






  • I think you could do it but you would have to move quick.

    Slice the spaghettloaf into two slices, and spread mayo on one side of each slice. Keep the spaghettloaf in the fridge until youre ready to go.

    You want a sizable pool of oil with a high smoke point - heat it up until it’s nearly smoking, then quickly add 2 sliced spaghetti, mayoless side down. The first side in the oil will form the inside of your grilled cheese, let it sizzle until it starts to crisp, then flip, add your cheese and let both outsides sizzle a minute to gain structure.

    Once both outsides have some rigidity, fold the sandwich together. Continue to flip & cook until desired color is reached.

    Sprinkle with salt, pepper, fresh parsley, and a little parmesan cheese, and dip in your favorite marinara sauce.

    Recipe can be made vegan with vegan cheese and mayo.


  • save you a click: it’s in-app tracking and device screenshots. Don’t install apps that have a working website. Also don’t use Facebook.

    “There were no audio leaks at all – not a single app activated the microphone,” said Christo Wilson, a computer scientist working on the project. “Then we started seeing things we didn’t expect. Apps were automatically taking screenshots of themselves and sending them to third parties. In one case, the app took video of the screen activity and sent that information to a third party.”

    Out of over 17,000 Android apps examined, more than 9,000 had potential permissions to take screenshots. And a number of apps were found to actively be doing so, taking screenshots and sending them to third-party sources.






  • Use it? The US invented it. The US has historically funded it as part of their human rights initiatives. Like I said:

    Also many of the sponsored projects help people circumvent authoritarian government overreach, which is something that until recently has been considered “good” for the US. The more freely information can flow the harder it is for authoritarian regimes to exert control.

    Given the nature of the Tor network, it’s likely any “official” use within the US government would probably involve things like communicating with people working undercover / informants, etc., and not be something broadly discussed.