• 4 Posts
  • 80 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle


  • If you leave your phone at home for one day, take a walk, get some coffee, meet a friend - but don’t use your phone, schedule in advance and tell them you’ll be phone-less, etc. You’ll find yourself feeling way less overwhelmed by a lot of these things. Phones keep us constantly aware of the changes around us. They make it seem like the world is whirring around much faster than it is. Basically, I guess, I’m suggesting “touch grass”. But I do think phones, in particular, are the worst for making us crash out like this.







  • I don’t do that and that seems pretty extreme to me - since most mobile hotspots are going to throttle you after a certain limit (even if they purportedly offer unlimited data). However, I understand the desire.

    TV Shows and Movies

    If you pay for streaming services, you might want to consider “sailing the high seas” (torrenting). Cancelling streaming services, pirating content, and then using the savings to pay for Spectrum might provide a better overall experience. If it’s not cost effective to do that, you should still consider torrenting at a public coffee shop or something to that effect (with a VPN). You can use Jellyfin to host your torrented content.

    Gaming

    A cheap Raspberry Pi and some peripheral controllers can be used to host a lot of fun retro games which you can play locally at home. I’m assuming modern games are too slow to download over a hotspot.

    Pictures

    You can host Immich locally and backup photos and videos on your phone over your local intranet. It was super easy for me to setup.









  • TBF if you want, you can have a bastion server which is solely whitelisted by IP to stream your content from your local server. It’s obviously a pivot point for hackers, but it’s the level of effort that 99% of hackers would ignore unless they really wanted to target you. And if you’re that high value of a target, you probably shouldn’t be opening any ports on your network, which brings us back to your original solution.

    I, too, don’t expose things to the public because I cannot afford the more safe/obfuscated solutions. But I do think there are reasonable measures that can be taken to expose your content to a wider audience if you wanted.



  • Holy shit the article is far less tame than the title. They provided several ways to run commands as root and they can be generated as an over-the-air HTTP call. As per the article, if you buy the Jooki domain, it’s very likely you can control every single Jooki on the market. You can make the speaker do whatever you’d like. Pretty scary stuff. One has to wonder what nerds can do with that kind of tech: turn speakers into a low quality mic? Use them as bots for a DDoS attack? Just start blasting heavy metal music? Or just brick every device?

    It’s pretty wild what the devs have done here. I can excuse executing commands as root from a file on the SD card. It’s not exactly safe or smart but it’s also not the most dangerous thing to assume only people with access to the device would do that. Hardly a worry for most parents as long as you’re not especially reckless. But to allow OTA root level commands to be run? That’s a horrible design. At least setup a user that can only execute a few pre-designed scripts. Don’t just give them carte blanch to run havoc on your hardware.

    Just another reminder that every wifi enabled device is likely a ticking timebomb. Especially low quality devices meant for kids. Baby monitors, speakers, etc. have a history of being built cheaply and poorly. That’s why I bought non-wifi baby monitors for my family.