

Anything where you put the file somewhere under profile A then read it under profile B will work.
Depending on why you want to transfer a file between profiles there are probably different tools you’ll like.
Anything where you put the file somewhere under profile A then read it under profile B will work.
Depending on why you want to transfer a file between profiles there are probably different tools you’ll like.
There’s a checksum program to test them on GitHub called gog-checker I think.
If you think you have malware, just backup, flatten and reinstall.
It was the switch to Microsoft accounts. Everyone started using online accounts to login and when people complained apple said “okay, you don’t need to and here’s some ways to make it safer” after some high profile leaks, google said “we’ll anonymize your data so when we use it for tracking it’s not tied to you, also here’s some ways to make it safer” after everyone realized they weren’t not being evil and Microsoft said “are you fucking stupid? It says right there in the tos that we’re gonna take and use everything!”.
Go to massgrave.dev and start reading. Convert your Microsoft account to a local user account. You will still have a Microsoft account but you won’t use it to login. You will lose access to stuff you bought under your Microsoft account until you sign in. This may or may not be acceptable to you.
Use your knowledge from massgrave to convert your windows edition to enterprise iot ltsc if you’re on 21h2, otherwise either downgrade or flatten and reinstall that edition. You will now be able to receive security updates and stay on windows 10.
Set up full backups you can reliably recover with before doing this.
With Luks there are several situations you can end up in where you can’t just pop your disk out and pull files from it, removing a first response to many common hardware failures.
Good! You’re on a public forum and people do that shit! Our instance is slightly better than the other Reddit offshoots but most of them haven’t kicked the social media curse and everything you read on lemmy needs to get the sidest of ways glances.
I have trouble taking your statement that you can see the required information seriously when the required information literally isn’t there. Important stuff like weather a service accepts cash anonymously, is owned by what company and what that company’s affiliations are (talking about kape and israel here, not the proton red herring) and how forwarded ports are allocated are not included in the chart.
Of course, that kind of information doesn’t fit neatly into a table so it’s another example of the format of the data being inadequate.
I can believe that a broad generalized table like this is useful in the context of learning the ropes of what’s out there in terms of vpn services, but it isn’t being presented in that way. If this kind of table were around years ago when I was getting my feet under me I would have made bad choices based on it.
My comments saying “hey, this is bad and not something to use” are not coming from my seat of power at the player haters annual dinner and awards ceremony but from clear recognition of misleading information based on experience.
So like I said, I don’t think the post is malicious.
I tried to be careful not to take a hostile tone. It’s possible you’re correctly identifying a critical tone, because my comment was intended as criticism of the post.
There are ways of presenting factual information that are not helpful or useful and actually serve the opposite purpose. You certainly don’t need to use prose to present information in a useful way, but consider how much closer to the old car paint color versus mileage chart (or whatever example they used to teach you about uncorrelated data in school) the posters chart is than the Wikipedia wrench table you linked.
The Wikipedia wrench table is in the context of “tools for dummies” that I said might be appropriate for that type of presentation, just as an aside.
The whole point of using some kind of chart or table is to make understanding easier, not more difficult. The posted chart does the latter. I think its because the op doesn’t understand both what they’re trying to say or the information they’re trying to show to convey it and because they chose a really excessively dimensional way to do so. A flowchart, infographic or anything other than a three dimensional chart would be better but since it’s so unclear what they’re trying to express, except possibly how much they love nymvpn and how people should really take a look at that previously underrepresented option, I can’t really make a recommendation.
If it’s fucking up your life, stop doing it.
If you need to do it, go do it in reality.
Seriously though, if you’re feeling paranoid about everything, stop doing the stuff that makes you feel that way.
Last time I said it was hard to figure out if this was some kind of malice or just someone without much experience/knowledge.
I been thinking about what this post and the one before it actually are though. They’re not disinformation, I don’t think they’re misinformation although I think that argument could be made if there was actual intent (and a person could also make the argument that there is intent).
This just kind of seems like white noise or what would be called slop if it were generated by ai.
It’s not useful in making a decision.
A vpn is a tool and you use the right tool for the job. A chart comparing the various similarities and differences between a box and open end wrench, flare nut wrench, socket set, power drill, impact driver and torque wrench would be useless for decision making about what tool to buy because they’re for different jobs.
If you need to take the lug nuts off a truck the right tool is an impact, if you need to replace brake lines you’re gonna use a flare nut wrench.
It’s not useful to compare pia and mullvad. If all you need is a cheap way to reliably bypass geofencing then pia is the right tool. If you need deniability and trust then mullvad is the right tool.
It makes no sense to compare air and nord. If you need the cheapest per device service for bypassing content blocks then the tool is nord. If you need port forwarding for torrents, soulseek and usenet all at once then the tool is air.
The problem with posts like this is that they don’t really provide any useful understanding or decision making process and wouldn’t be useful from an educational perspective like the comparison between various wrenches made above (if it were in some kind of Tools for Dummies publication) because they’re not even contextualized as such.
A better start for this kind of post would be “here are some reasons to use a vpn service” or “here are some actual important differences between different vpn services apps”, not weather they’re available on Jim’s cut rate Secure I Promise ™ alternative android App Store.
It can prevent man in the middle observation or attack and allow you to avoid a particular type of location tracking.
Another user on an instance I don’t see posts from talked about tls in response to your question about https. It’s important to recognize that the certificate based system for establishing identity when making a tls connection is cooked and has been for twenty years at least. It may have been designed flawed from the start.
Because of that, the combination of dns over https or dns over tls and a vpn you trust allows you to bypass certificate attacks.
That’s not harsh. The closing sentences were not meant as an attack on you but as commentary on a pattern in this community.
It’s worth noting that appending a string to your password manager passwords would protect you from simple automated attacks after a password manager breach. Sometimes that’s enough.
Anything tied to your existence, like domain names, professional or academic work, companies registered in your name, voting records, social media (lemmy is social media, Reddit is social media), depictions of yourself, legal records, publicly owned property or documents in your name (like a license plate and by extension the car attached to it) and probably stuff like that should be on your personally identifiable portfolio.
E: work completed under a pseudonym with someone else should also go on it and that pseudonyms use should be discontinued.
3 is stupid.
The point of a password manager is to enable the use of multiple different passwords and usernames. The point of using multiple, hopefully unique, passwords and usernames is that when joes website gets breached and their passwords and usernames get leaked because they were storing them in plaintext it doesn’t mean all your accounts everywhere else are now compromised.
That happens a lot and if you want to learn how affected you are at this very moment just check haveibeenpwned to see what’s osint on your usernames.
So let’s say you’re appending the classic “monkey1” to your autofilled password manager passwords. You’d be protected from a password manager breach until one of your website logins is breached and someone realizes all your gibberish high entropy passwords have “monkey1” on the end. Considering there are billions of leaked credentials and millions get added each week, that’s kind of like putting wallpaper up so the tank coming through your brick wall has to work a little harder.
So what would be actual good advice? Key rotation. At some interval, clear your cache, browsing history etc and change all your passwords. Now you’re actually protected from breaches of old credentials and current credential breaches are rendered moot.
If you read all the way down to here, consider not relying on this community for privacy or security advice. The fact that “stupid asshole” was able to easily articulate why something on the list is a waste of time when no one else has done so should raise some eyebrows.
Posts you have to squint at to figure out if they glow or are just inexperienced.
This bad and stupid advice. Terms of service are written in such a way as to obfuscate what’s happening and often when they change you need to use a tool like diff to figure out what’s going on.
What is even the point of this?
What the hell is wrong with you?
The best time to turn on adp was yesterday, the second best time is now.
That’s normal. What could you possibly be doing over tor that five million bits per second isn’t fast enough?
Why would you remove them?
What proton offers as a paid service is compelling. It does give you the opportunity to provide metadata that can be used against you, which is how the legitimate concern over its cooperation with law enforcement played out.
I would recommend against choosing security or privacy services based on the politics of their c-suite. In a lot of ways it’s similar to getting firearm training or equipment. You might feel like you’re materially supporting your enemy, but specifically in this particular political moment you aren’t in a position to sus out the depth or veracity of someone’s expressed politics and the point is to get the right understanding, equipment and systems, not to vote with your dollars.
Further, you want to understand how the system you’re purchasing access to works. Email, for example, cannot be private without some sort of additional cryptography. SMTP is best effort only, and even in the case that the system doesn’t fall back to unencrypted transmission, it relies on certs that are often spoofed by the end users isp as a matter of course and allow mitm attacks.
Information input to an llm will be used as a training dataset later on down the line so that means anything you use the llm for shines the panopticon beam onto you.
Used to be you could buy time on aws’s satellite link and listen there too if you wanna spend less than 800 bucks in equipment.