https://youtu.be/66pnt974mvQ?si=X1-f9ujCORjuiYA6
GrqpheneOS update with some nice features
#pixel
#Grapheneos
I think people should check out cryptomator (especially in the UK)
Live
#gaming
#linux
#magicthegathering
#live
https://www.youtube.com/live/0prl3u6GB5Y?si=UDesl3Hsw7M4Oyk-
Machdyne let's me shitpost 100 years from now
#data 
#usb
#coldstorage
If you're an IPhone User in the UK and the ADP being disabled makes you angry, you should migrate to the more Free and Open source security option GrapheneOS.
While I'm glad that apple Didn't backdoor their phones , I think that non walled garden options are far better #Grapheneos #Apple #uk
I love Digital preservation
#forever
Friendly reminder why these online platforms don't respect you and you don't own your media
Physical media is looking better then ever #fuckamazon
https://hackaday.com/2025/02/18/auto-download-your-kindle-books-before-february-26th-deadline/
https://fountain.fm/episode/9IHudNJKOT4aOs1UfW0v
(Okay I fucked up the audio on this one )
#encryption
#podcast
#backdoor
#security
#eu
Fun fact
You can run Syncthing over I2p
Why
No NAT
100% self hosted
No traceable connection between hosts
You get to run two I2P nodes
You don’t have to trust Syncthing relay servers with anything
More cover traffic for I2P
Here's a guide I found
https://web.archive.org/web/20171008035012/https://barry.im/post/2017/10/6/syncthing-over-i2p/
#syncthing
#selfhosted
#i2p
Fun fact
You can run Syncthing over I2p
Why
No NAT
100% self hosted
No traceable connection between hosts
You get to run two I2P nodes
You don’t have to trust Syncthing relay servers with anything
More cover traffic for I2P
Here's a guide I found
https://web.archive.org/web/20171008035012/https://barry.im/post/2017/10/6/syncthing-over-i2p/
#syncthing
#selfhosted
#i2p
I love Trains
Update Tails NOW!
Important security fixes
The vulnerabilities described below were identified during an external security audit by Radically Open Security and disclosed responsibly to our team. We are not aware of these attacks being used against Tails users until now.
These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.
Prevent an attacker from monitoring Tor circuits. (#20733 and #20744)
In Tails 6.11 or earlier, an attacker who has already taken control of an application in Tails could then exploit vulnerabilities in Onion Circuits and our Tor Browser wrapper that might lead to deanonymization.
Prevent an attacker from changing the Persistent Storage settings. (#20745)
https://www.youtube.com/live/-ECpCgiiL5g?si=7zQ-IVd2K86RQheS
We ball
#steam
#supermarkettogether
#linuxgaming
Looking at all of these Data breaches make me glad I use virtual cards
Xmr and aliases, its not bullet proof, but self hosting on my phone and my server that I physically own and have makes me feel much better
#selfhost
#databreach