Does ping work? Have you validated tailscale?
Check the iptables on the device.
If that doesn’t work it’s time to do tcpdumps on the different internal interfaces of the Nas and see where it stops
Does ping work? Have you validated tailscale?
Check the iptables on the device.
If that doesn’t work it’s time to do tcpdumps on the different internal interfaces of the Nas and see where it stops
Developer settings for newer androids.
GOS has it on by default https://grapheneos.org/features#wifi-privacy
Sure. But the point isn’t murder it’s reproductive success.
The males are not interested in killing their own children. If they were, evolution would quickly remove them from the gene pool.
It’s difficult to apply modern western morals to other cultures much less other species.
Did this ever work?
Does pinging by IP address work?
Go to your settings look at security, is the firewall enabled? Tried disabling it for now
In settings and security is autoblock enabled? Try disabling it for now
https://tailscale.com/kb/1131/synology
Did you follow the DSM-7 task setup? In DSM-7 tail scale cannot allow outbound connections unless you set up the appropriate tunnel permissions.
Other primates usually only kill infants when they’re not the progenitor. They don’t kill them randomly
Using randomized MAC on my phone’s, and observing the behavior on my network. It works fine, the router can’t assign a ip to the device because the physical address changes. The os fingerprinting still works, the gateway knows what kind of device it’s talking to.
This is actually a HUGE factor in human sexual selection. Other primates have visible Estrous cycles. I.e. what people commonly call going into heat.
This has a big impact on reproductive dynamics. Who mates, when they mate, etc.
Humans, for whatever reason, do not have a visible indicator of fertility, which provides females more sexual selection options. Because it’s not obvious when they’re in heat, they can choose who they mate with at the right time. They can also socially mate all the time, which can increase human bonding.
Soda water. Because getting drunk isn’t on my agenda. But it fits the vibe and people think your having a vodka tonic or something
The person doing free labor and providing open source software doesn’t use the preferred vocabulary… Still a net positive, no reason to brigade their issue tracker for wrong think.
Encouraging the internet to harass a volunteer is low.
Nothing stopping people from forking the project changing the vocabulary, and maintaining their fork. But that’s more work than drive by hate
The lights flicker at a specific frequency and those frequencies are ever so slightly different in different places. It can be mapped to a grid.
How will a vpn give away your location?
You don’t need a SIM card to have a TOTP app they’re totally independent
A VPN you pay for with crypto is probably more secure than driving to somebody’s public Wi-Fi for this use case. Driving to a location, sitting around while uploading a massive video on public Wi-Fi, it’s going to look very suspicious
Things like gapps are closed source, have full permissions, and cannot be installed only on some profiles.
Except in stock AOSP or grapheneos.
Agree that qubes is the gold standard. But not to let perfect be the enemy of good, the vast majority of people, the vast majority of people, the VAST majority, are going to be unable to run qubes, either by technical ability, availability of appropriate hardware, or portability reasons.
Mobile phones for all of their faults, are the most secure piece of general computing hardware most people have in their lives
The new Pixel phones get 7 years now. Things are improving
https://www.privacyguides.org/en/android/
There is no controversy. There’s a lot of people memeing. I haven’t seen a single security analysis, or survey of options, that didn’t put GOS at the very top. Look at privacy guides, they say graphene is great, but if you can’t use that divest is okay.
People may not like the leader, and the developers are very opinionated which turns other people off, but I don’t think there’s any questioning the pedigree and the level of security provided
I think lineage is a good operating system for a limited exposure use cases. Like a project phone on a safe network, or as a webcam, or is like a embedded hardware controller. But not on the raw internet, not processing raw internet data, not with open Wi-Fi, not with open Bluetooth.
Even with all of that, it should still be segmented from the rest of the network
I think it’ll generate 5 days converted into seconds number of operations.
To decrypt however, you have to do all those operations, so I think it would take 5 days to decrypt. Even if you wait 10 days to start the operation
You can use a hardware security key, like a yubi key, or a software fido2 equivalent.
That way it satisfies the two factor requirement, without using a phone number.
For initial registration you can use an SMS service like SMS pool or the others, you pay a little money, you receive a real text message to a real phone number. You just don’t have access to that number in the future
Your voice, vocabulary choice, lighting conditions, power interference frequency, can all give away parts of your location and identity. You have to choose what level of paranoia is sufficient
The most anonymous, would be to have a v-tuber like model, respond and parrot LLM generated voice audio, from a script that’s been translated a few times. Or pay a voice actor from Fiverr to read your script.
Of course this whole time, using a VPN.
This seems interesting. But for something so complex I would really like them to have a white paper to see how they achieve this.
https://eprint.iacr.org/2023/189 Other systems, for instance, use a third party network to broadcast the parts of the secret that are needed to decrypt over time. So you’re relying on a third-party service, and if that third party service disappears you can’t unencrypt
Pure evil, I love it.