reddit refugee

  • 0 Posts
  • 129 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle









  • Plenty of good answers here already. Just want to add a funny anecdote.

    I’ve had the same USB charging brick for years, using it for different phones throughout that time. When I check the battery settings when it’s plugged in it “warns” me that I could be charging at a higher rate if I plug into a higher amperage charger. Yeah… I know. I WANT to charge slowly. It’s gonna be plugged in all night, what do I care?

    I’ve had my phone for a year, 165 charging cycles, and it says it’s still at 100% health. I do cap charging to 80% and that hasn’t been an issue for my day-to-day usage.


  • Strange. You wanna be done so suddenly after being shown how obvious the solution is.

    we can talk about how batteries aren’t removable in most phones anymore

    So don’t buy those. Buy one with a removable battery….

    whether or not the act of suddenly buying prepaid phones isn’t itself incriminating

    Go use cash, in person.

    Again, use your imagination. I refuse to believe I’m smarter than you or anyone else. These seem like obvious solutions.

    My incredulity that the person further up the thread couldn’t think of a simple solution to the issue they posed came across as rude. I’m not sorry about it. Think for a minute….

    I think everyone in the thread ultimately wants women to be able to get abortions without fear of prosecution.









  • restic -> Wasabi, automated with shell script and cron. Uses an include list to tell it what paths to back up.

    Script has Pushover credentials to send me backup alerts. Parses restic log to tell me how much was backed up, removed, success/failure of backup, and current repo size.

    To be added: a periodic restore of a random file to have its hash compared to the current version of the file (will happen right after backup, unlikely to have changed in my workload), which will be subsequently deleted, and alert sent letting me know how the restore test went.


  • The basic flow of the attack is, first, infecting an Internet-connected device through a means ESET and Kaspersky have been unable to determine. Next, the infected computer infects any external drives that get inserted. When the infected drive is plugged into an air-gapped system, it collects and stores data of interest. Last, when the drive is inserted into the Internet-connected device, the data is transferred to an attacker-controlled server.

    Guys, storage devices move data from one machine to another. /pikachuface