Skip to content

MAGA Puts Wikipedia in Its Crosshairs

Technology
150 93 108
  • Breaking The Creepy AI in Police Cameras

    Technology technology
    39
    1
    312 Stimmen
    39 Beiträge
    85 Aufrufe
    dabster291@lemmy.zipD
    Ah, I see now.
  • UK government suggests deleting files to save water

    Technology technology
    55
    1
    265 Stimmen
    55 Beiträge
    326 Aufrufe
    A
    Authoritarian and incompetent. Just like all the other Fascists.
  • Google tests ‘script blocking’ in Chrome Incognito to boost privacy

    Technology technology
    15
    35 Stimmen
    15 Beiträge
    57 Aufrufe
    sharkattak@kbin.melroy.orgS
    mmyeah, 'Google' and 'privacy' in the same sentence is always funny.
  • Apple’s plan: Stall, cheat, repeat

    Technology technology
    37
    1
    215 Stimmen
    37 Beiträge
    553 Aufrufe
    E
    Why should Apple stop doing business in the EU that makes no sense. Why would they deliberately cut themselves off from a huge potential market.
  • Could Windows and installed apps upload all my personal files?

    Technology technology
    2
    1 Stimmen
    2 Beiträge
    35 Aufrufe
    rikudou@lemmings.worldR
    Yes, every application has access to everything. The only exception are those weird apps that use the universal framework or whatever that thing is called, those need to ask for permissions. But most of the apps on your PC have full access to everything. And Windows does collect and upload a lot of personal information and they could easily upload everything on your system. The same of course applies for the apps as well, they have access to everything except privileged folders (those usually don't contain your personal data, but system files).
  • 284 Stimmen
    134 Beiträge
    3k Aufrufe
    I
    I'm not afraid of that at all. But if you draw shit tons of power from a crappy socket, things start to heat up real quick. Like getting really fucking hot, as in burn your house down hot.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    572 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 325 Stimmen
    20 Beiträge
    196 Aufrufe
    roofuskit@lemmy.worldR
    It's extremely traceable. There is a literal public ledger if every single transaction.