

Never tested with gdrive but in Graphene I use storage scopes instead of full drive access.
Never tested with gdrive but in Graphene I use storage scopes instead of full drive access.
Can confirm, it is information they already have. Below is likely the API the telco exposes to the bureau. Each data point queried returns true, false, or a confidence score.
It is intended as an anti-fraud tool. Not saying I agree with it. Something like PGP is sufficient for building out a web-of-trust without needing to share my personal information.
Will check this out! Played around with it for a few minutes and a couple notes.
I do prefer Loop / uhabit UX for recording habits. Only reasoning is it is less clicks to record my habits on the main view. I see the check on the right now. Not sure if I missed it or it came with an update but I’m satisfied with the number of clicks parity with Loop.
Custom behaviors per habit I could see being useful and the possibility of milestone encouragements. Use case: Habit is tracking calories. I may want to do this until I hit a target weight. If I could set encouragements like every 30 day streak I can reward myself with a new outfit or something. The ability to set the streaks per habit and have it repeat by starting a new iteration upon completion would satisfy that. Not sure if encouragements are random or upon completion yet, so if its random, maybe an end of iteration reward to make this work.
I see there is already issue for auto-backups, so +1 to that.
https://github.com/newhinton/Round-Sync
I have it scheduled to sync the signal folder an hour after signal makes it’s backup. My personal setup is a crypt vault (so I control the encryption key) wrapping a B2 vault, but you can use any cloud provider that rclone supports.
No programming knowledge required.
Graphene only supports Pixels due to the titan chip. The versions with “a” are cheaper. Check when they go end of life to find the cheapest if you care about updates. So probably the 6a or 7a if you want at least 2 years of updates.
Not sure on this one.
The auditor is to make sure you are installing an authentic version of graphene. That it is not a modified version that has been tampered with (e.g., backdoors).
Automatically enables MAC randomization. This can help with being tracked on public networks. Fingerprinting techniques have gotten better though with deep packet inspection and even measuring radio characteristics. I’ve seen demos of two brand new and identical models of iPhones being distinctly picked out due to variances in the radios during manufacturing.
Doesn’t help with advertisers tracking behavior based on IP. VPNs help with “blending-in” by putting multiple users behind the same IP. Provider matters here. Needs to be a VPN provider that won’t just sell your data or cave to law enforcement. Mullvad is my preference. Paid with crypto. RAM only logs. That said, use Tor or I2P for anything you don’t want subpoenaed.
For additional tips:
LSPs, linters, AI auto complete, multiple ranked auto complete sources, contextual syntax highlighting abused to feed things like symbol tree views, type analysis, scoped file trees depending on what you’re working on, infinite undo since last commit, and all available in real-time.
I feel like I use up 8GB the moment I type “neovim” on a sufficiently large node project, lol.
I use LazyGit on the CLI for a “GUI-like” experience. I find it helps me make smaller more meaningful commits. If I’m working on a feature that enhances or fixes other modules in my repo to support, its trivial when done to make multiple clean commits out of the one feature that isolates the changes in functionality to individual commits instead of one medium commit.
On a large enough repo (e.g., monorepo), its a pain to do using git commands.
LazyGit with lazygit.nvim checking in.
Reddit post also states its been kept up to date with the last update in October of this year. Good find.
EOL support. I have a 11-12 year old System76 laptop. Works perfectly on the latest Ubuntu version.
Their shitty walled garden for both software (iOS) and hardware (soldered components that don’t need to be).
Overpriced.
Fake sense of privacy.
I used Mac OS 6.x through 10.4. When I was in college and couldn’t afford to replace my aging G4, I triple booted Fedora, Mac OS X, and Windows on a hackintosh where I gravitated towards mostly Linux and Windows for a couple games. Owned a couple iPhones but decided to role Android when the nexus 6 came out to save some money when I had my first child on the way and my current phone was dying.
I don’t miss anything I left behind. Had a short stint at work during COVID where I was given a MacBook. While not horrible, I ran into enough nuances I was able to justify to my work using a Linux laptop instead. I just don’t find anything appealing to give them my business.
In the same boat. The web versions have compatibility issues with the desktop versions when it comes to formatting. I’ve resorted to running Windows unlicensed in a VM.
It’s a font, there is no risk of data collection…
TeamViewer checks for a font their app installs when visiting their website to fingerprint you.
A few notes as I’ve been doing some PQ research for my own projects:
With that said, I’d want to know where and how the encryption is going to be applied.
An ideal solution for me:
I suppose you could use a PQ TLS, but if the payload is already AES encrypted, I see little value. You could use PQ to sign each object I suppose in case your AES key is broken, but that would mostly detect tampering of the data.
Been using jmp.chat. I didn’t have to give any personal info. It uses XMMP/Jabber to handle text/calls instead of wrapping your existing number. Their in-house client is pretty nice as it integrates with the dialer.
They straight up tell you its not private. That’s not what I use it for. I use it to make my online activity less linkable when companies try to KYC me by requiring a TN.
The phone network itself does not encrypt metadata or content. Therefore, if your concern is a state-level actor, exploit of a service provider, or rogue employee, you should consider all the metadata and content of your phone calls and text and picture messages to be not private.
Do what you can to challenge fear, anger, and hate (a.k.a. critical thinking).
They are the tools of the power hungry and wealth hoarders. Rage bait news articles, religious extremism, labeling the “others” (race, religion, sex, national origin, etc.) are how those tools are applied. They are applied to get voters to vote against their own self-interest or even conduct extreme acts like suicide bombings.
Feels grim stated like that as the hate machines and their incentives are already in place and controlled by the worst of us.
Using these tools is also an easy trap to fall into unknowingly. I’m passionate about privacy enabling technologies. I’ve slipped into fear mongering when on my soap box without realizing it until later upon reflection.
https://i.insider.com/5936b56079474ccf008b6f29?width=1500
Would pair well with the G4 era themed dildo speakers.
Looks like it comes in spools.
https://www.ixblue.com/store/ixf-hcf-10-100-950/
I don’t know the physics of it. I posted some info for the parent you responded to. My understanding is the applied physics is different from traditional fiber.
The main physical principle behind propagation of light in conventional optical fibers is total internal reflection (TIR). However, engineering of optical materials with features on the scale of the wavelength of light offers many new possibilities for manipulating light. In particular, some microstructured fibres make it possible to guide light by a mechanism different from total internal reflection. In these fibres, light is trapped in the core by an out-of-plane band-gap, which appears over a range of axial wavevectors and prevents propagation of light in the microstructured cladding [Cregan (1999)], allowing guided modes to form in the central hollow core.
https://mpl.mpg.de/research-at-mpl/russell-emeritus-group/research/about-pcf/hollow-core-pcf
But you’re making this point in defense of someone aligning themselves with a group who targets trans, women, and whoever else they can bully not like them for being their true selves… Do you not see the hypocrisy of such a point given the context of the quote?