Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)R
Posts
8
Comments
80
Joined
10 mo. ago

  • Check out internet in a box. The Wikipedia foundation supports it. IMO that is also over engineered for my needs, so built a lighter weight variant.

    That's how they get wikipedia on this btw.

    In my variant I have the complete English Wikipedia, a ton of official documentation on programming languages I use or might need to use, as well as calibre for eBook and pdf housing.

    All running in docker containers, behind an nginx reverse proxy landing page.

  • I have to second this. Even if none of that was true, they find you through the "you shaped hole" in the lives of the ppl around you. That's the best you can hoped for IMO

  • Checking out your project now and its very cool. Keep up the good work.

  • I know this to be true at some level, because it can be measured, and there are laws around it. Government publications have to be written for a certain grade level. I know military manuals are 8th grade.

  • For what its worth I'm interested. XDA has a lot of info, but its either dated or assumes you know a whole lot, which makes the whole process arduous. Especially considering that the consequences of doing it wrong are significant.

    The other problem is trusting custom ROM providers. If they are known/ have rep three is some trust. But I dont know anyone in that space

  • This is pretty interesting, thanks!

  • What paper specifically are you referring to? I couldnt get the paper from the url that was provided, but I am reading the paper from 2017 linked on their github and this project forked ublock, adding additional features, which is pretty interesting actually. Such as detection of visual ads out of the blocked objects, with a series of checks to see if they are "legitimate ads", then simulated clicks through ajax, with blocks on all response content, preserving security from any malware that may have been masquerading as a legit ad.

    Granted this is from 2017, but its a pretty interesting idea. https://github.com/dhowe/AdNauseam/wiki/Published-Papers

    The code itself was updated three weeks ago, so its clearly still being maintained at some level.

    Combine this with containerized user accounts, and seems like a pretty good idea to me.

  • Privacy @lemmy.ml

    Don't Delete Your Data - POISON IT INSTEAD

    yewtu.be /watch
  • Traccar was they best solution I've going so far. Have you found others?

  • Funny enough I just changed my daily driver to Linux as well. Long time Linux power user, stuck with a Windows main. Finally made the transition, couldn't be happier.

    Congrats

  • I just started messing around with it myself. It is possible to mess up your phone, so yet disabling services with adb first, see if you run into problems. Wait like a week. Then remind them.

    The cool thing is you can remove a ton of bloat via adb without root. It's pretty amazing

  • So? It's stored in the same folder locally

  • Deleted

    Permanently Deleted

    Jump
  • Can you explain a little bit more about how it will work. I get its a p2p torrent system, but it also looks like a media player? so like direct media sharing? is the plan to share it and store it in a library on the client side so they can watch it later and or share it later?

    I could probably help you a bit in testing. I am a linux guy. I dont really know go (not enough to help you code, but enough to maybe trouble shoot). but I could help you test on the distant end.

  • Deleted

    Permanently Deleted

    Jump
  • im not a proton shill, but they have a wallet. wouldnt any paid secure wallet option work? and yeah, i wouldnt trust google either

  • Deleted

    Permanently Deleted

    Jump
  • This is really clever. Not just because it's prompt injections and security research and funny but what because it really pushes the boundary on how we understand the inner working of transformer layers.

  • never tried flatpak, snaps were so bad as to never consider non-native installs or just use docker instances when I need to run something weird. so dunno.

    whats the use case for a flatpak exactly? maybe im not the target audience???

  • this was great! I hadnt considered leaked passwords. I already use uniques, but damn if this isnt a great reason to. Thanks

  • NSFW Deleted

    Permanently Deleted

    Jump
  • Check this out, its a pretty good view into good practice, beginner, intermediate, and advanced, with recommendations. https://digital-defense.io/

  • NSFW Deleted

    Permanently Deleted

    Jump
  • There is so so so much, and they do get caught, and when they do we keep a peek into how invasive they are. As someone who has had to worry about being targeted by intelligence agencies and nation-states, I was completely blindsided by corporate/capitalist surveillance.

    for example, look at this action by Meta, where they broke out of security sandboxes and exploited protocols in order to tie your browsing history (even private browsing) back to your identify saved in their databases back in meta land

    https://www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/

    the amount of data that is being harvested and sold, and resold, is absurd, and the greater threat is not just that they are exploiting you, its that they dont care who the data gets sold to. Bad actors (criminals, etc) can and will purchase information they can use against you.

    So, consider the unintentional ramifications of all that info being harvested and available in addition to the intentional ramifications of hyper greed, and couple that with the amount of available compute and you will see that you do not need to be a person of interest, everyone is a data point that can be and will be exploited.

    I would encourage everyone to take their privacy seriously.

  • Just saw this. Feel like the alternate title could have been "When digital privacy went mainstream", "I was into privacy before it was cool", or finally "No I am not wearing a tin foil hat!"

  • Privacy @lemmy.ml

    Degoogling - Getting your info from Google via Google Takeout

  • Privacy @lemmy.ml

    Use X without an account (if you really want to ig)

  • Privacy @lemmy.ml

    Life360 Secretly Sells Users’ Geolocation Data to Third Parties, Class Action Claims

  • Privacy @lemmy.ml

    Online Fingerprinting Techniques, lets list them out.

  • Privacy @lemmy.ml

    Palantir's "Kill Chain" and the Dark Side of Artificial Intelligence

  • Privacy @lemmy.ml

    DNS Black-holing w/ DNS over TLS - Personal Privacy Part 1

  • Privacy @lemmy.ml

    Meta: Coming after your data harder than ever