Avatar
Dr. Hax
d30ea98ea65e953f91ab93f6b30ea51eb33c506f87d49f600a139aef00aa9511
Cypherpunk. Infosec veteran of about 15 years (vulnerability research, exploit development and cryptography). Cypherpunks write code. :-) Signet maintainer. Self-custody your passwords... in hardware! https://hax0rbana.org/signet Want to see wider adoption so Bitcoin can be used as digital cash and not just an investment vehicle. XMR: 44RDkTFmTeSetwAprJXnfpRBNEJWKvA5dBH5ZVXA4DofgoZ9AgjyZdSa2fo7pMD3Qe3pdKga8X22y3Lyn1xYde5kPQPzVUu

They get their name because they were used to season fish. They don't look like nor taste like fish. 😆

Question for a #radio person, perhaps nostr:nprofile1qqszw48usckkhs9hcwt3q3np9k2z2c73s8qc0gu3uxqw66cqlq88ukcpp4mhxue69uhkummn9ekx7mqpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3qamnwvaz7te3xsczue3h0ghxjmc3zk5tp?

If a dipole antenna is 59.14 mm in length (tuned for 802.11g, channel 1), and you attach it directly to the wifi card, that's great.

My question is: if you now extend that antenna by attaching it to the wifi card using a wire, like a normal person, would that cause it to no longer be tuned for 2412 MHz?

If so, what's the point of buying the "proper" antenna?

If not, how on Earth does that work?!

My savings are dried jalapeños, hungarian peppers, fish peppers, apple chips, dried peaches, cherries, blackberries, blueberries, and banana chips.

It's not entirelt fungible. You can't transmit it over the internet. But it is wonderful conversion of my past labor, stored for the future.

#gardening #homesteading #prepping #foodstr

Did you compile the firmware from source?

/s

Wow, the fediverse was poppin' today

Using Tor isn't super likely to avoid trouble with criminal groups (but it won't hurt either). Their main M.O. is to trick people or exploit known vulnerabilities in software and browser exploits are usually beyond their grasp.

Instead they'll try to get you to download some sketchy program, or they'll send an email to trick you into sending them money, guess the password to your accounts, exploit your router and send out spam/malware... that type of thing.

Tor can slightly help in that the sites you visit will likely be collecting less data about you, so when they get hacked and the data is leaked, there's less for the criminals to go through, but Tor is more focused on stopping big companies, data brokers and things like that.

The fact that you your your threat model is evidence that you're far agead of the average person. 💪

In my opinion, very low. I've not heard of any American ISPs closing someone's account because they use Tor.

As a bonus, if you use Tor, they won't be able to inject jacascript into pages you visit (I know for a fact Comcast does this), and the traffic flow data they may be selling will be less valuable to the buyer (orther than that they'll learn that Tor is getting more popular).

Now running a Tor exit node is a different matter. If your ISP gets complaints because someone is spamming or "hacking" from your house, they're going to send you a nastygram and threaten to cut off your access.

If you are just using Tor browser, you're nearly guaranteed to be fine.

Blending in is a legit strategy. Would recommend. Would also recommend it's not the only strategy.

Quitting ultra processed foods for one month.

https://mastodon.online/@CurlyParakeet/113050464472110201

If you are in a hurry, the punchline is that it's about 20% cheaper at the grocery store, but about 7-21 hours per week of additional time (and I suspect that is an underestimate) to make everything from scratch.

1. Use a password manager

2. Use #Matrix

3. Use #Tor

4. Use #privacy email addresses

5. Buy things with #cash, #Monero, #Bitcoin or prepaid credit cards

Pretty much in that order. If you want to dive into #VPNs, #FIDO2 #hardware, #passkeys, #Qubes, firewalls, burner phones, #VoIP lines, freezing your credit reports, and the like, that's cool, but get the basics down first.

No, it was in normal colors. I'm not sure why their page paying homage is like that. Maybe so people don't try to use it as if it was still functional nearly 30 years later.

Replying to Avatar CitizenPedro

Hi #privacy enthusiasts,

It seems like the EU is more and more undemocratically (no referendums EU, you are not representing the people's will...) clamping down on privacy with the ChatControl measure: https://www.patrick-breyer.de/en/posts/chat-control/

My question is what do you recommend as an alternative?

1. XMPP

2. Element/Matrix

3. Signal

4. Threema

5. Jami

6. Anything else?

I'm a bit out of the loop and was wondering what do you recommend?

Thanks!

#nostr #bitcoin #monero #privacy #eu #chatcontrol

Matrix. No centralized server that collects everyone's phone numbers in a huge database, true multi-device support, you get to choose your client, and much more popular than XMPP.

Nothing is perfect, but Matrix is good and continuing to get better.

If they get their p2p Matrix support to be reliable and easy to use, that'd be **amazing**!

https://arewep2pyet.com/

https://github.com/matrix-org/pinecone

Replying to Avatar B

I don't know why I wasn't already following you, but that mistake has now been fixed!

It took 7 years before we got our first fruit. If you haven't mulched around them yet, you should. That seemed to speed things up.

The best I can say on the flavor is "tropical". I guess somewhere between a cantaloupe and a pineapple maybe?

The texture is soft, similar to a banana. Skin is similar to a pear. I thought it was fine to eat the skin, opinions on that vary.

I've had my first #pawpaw and because you can't buy them in stores, it's a #homegrown pawpaw.

They are possibly the best #fruit I've ever tasted.

#foodstr #gardening #homesteading