

@rumba Wi-Fi network, mobile network, dates, times, user profile, what’s watched, screen size, installation platform - probably a lot of the same techniques that browser fingerprinting uses
Back once again with the ill behaviour.
IT dad in #Perth #WesternAustralia reporting in.
I like:
#technology
#ITSecurity
#outside
#camping
#beer
#happiness
#Australia
And no matter how much I may like your image of whatever I probably won’t Boost it if it doesn’t have good Alt-Txt. You know it makes sense.
@rumba Wi-Fi network, mobile network, dates, times, user profile, what’s watched, screen size, installation platform - probably a lot of the same techniques that browser fingerprinting uses
@rumba @tatterdemalion if the app/device is collecting location and sending various other data then they’ll be feeding that into their decision making
@oldmansbeard @nfreak If the device you’re playing them on can run www.last.fm app then that would give you that kind of insight to the data it uploads on your listening habits
@Lodespawn @mesamunefire :honk: :goose_honk:
@SkaveRat @brygphilomena Do you keep it in a bag like me so I can one day commission a knitted cardigan?
@XeroxCool @Entitle9294 I often read of people claiming to have broken many ports and/or cables. I can’t understand how they do it.
@Profligate_parasite @thejml #PiHole sits in your network replacing your existing DNS server you may have configured. By using a specified blocklist(s) it’s mostly used to block adverts and malware sites. Can be very effectives. Can take a little tinkering, for example one side-effect for me was it blocking a local TV streaming app.
To start with I put one on a free cloud provider, with a VPN from my router to it and played with it until I was happy.
@Nollij @Toralv ahhh #Smoothwall… takes me back to dual Slot 2 Pentium 2 full tower in my cellar next to the old coal chute
@SheeEttin @AdrianTheFrog +1 Email for me is basically irrelevant. MFA resets, adverts from companies I forgot to unsubscribe from and a couple of bills. No personal correspondence or anything I would think is worth self-hosting it for these days. Other than many headaches.
@BigTrout75 @Squiddork and ffs print out some instructions on how to access it all. And tell someone where you’ve put that.
Consider using a decent password manager and you’ll only need to let your loved ones know how to get into that.
@Ek-Hou-Van-Braai depends what you’re labbing. any sort of virtualisation etc then a mini PC from Beelink or Bosgame etc. networking have a look at Ubiquiti stuff.
yes, you can get “refurbished” stuff pike Cisco switches or whatever. but consider if big, old, slow, power hungry, umsupported kit is what you are ok with (it may well be)
@TehBamski I’m going with:
The Beagles
The Beatle
Buns n Roses
STOOL
Slack Slabbath
Fleetwood Sac
Talking Beads
Jethro Dull
@IrateAnteater @yesman if they do the “show secret” or whatever the option is called when your 2FA setup shows a QR code then you can copy that plain-text and save it somewhere (safe!) to just plumb it in to whatever authenticator app you decide to use elsewhere.
If you use something like BitWarden then it can generate those 2FA codes for you and sync between whichever devices you use.
( • )( • )ԅ(‾⌣‾ԅ)
@Dust0741 transfer it to a VoIP number and have a VoIP app on your data-only SIM. Unless your data-only SIM provider does some blocking