• 11 Posts
  • 157 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle
  • keep your data turned off. you load the tablet with books or whatevers, you don’t need no comms, hence nothing can leak.

    second, you should get the device based on LineageOS support, so check their devices page first. there’s but a handful of those, I was lucky to find a Tab S6 Lite for cheap and it’s hella supported. if you have money to burn then look into Pixel tablets and such.

    finally, when you eventually flash them, the battery life isn’t great. even just having them lying around not doing anything in standby requires you to connect it to power every other day or so. had an iPad like 10 years prior, that thing could be left for weeks and still be available when you need it. sadly, no such thing exists here.

    p.s.: not what you asked for, but take a look at old 2-in-1 tablets in the vein of Dell Latitude 5285/5290/7290 etc. those are fully featured i5/i7 machines, tons of RAM, expandable storage, you can install Linux on them with all the benefits and drawbacks that brings; battery longevity also ain’t a thing here, but at least you can tweak everything (limit frequencies, hibernate, etc.)





  • it doesn’t do none of those things. also, you should include less details, it’s fun guessing what your software stack is, how you installed it, and the term “if I use Wayland” is way too precise. likewise, that sentence of yours is enormously protracted, you should consider shortening it.

    seriously, are you for real?

    edit: hey, if you want people to help you, provide details as to your os, software, hardware, and maybe spend a bit of time describing your issue in detail as well as stuff you’ve tried. cheers!


  • whether telegram was setup as a honeypot or got taken over or somehow is still independent and free of nation-state influence is a) beyond the expertise of any and all participants ITT and b) besides the point.

    the main point is telegram’s honcho when faced with the perfectly valid question (E2EE when?) throwing out one smoke screen after the other, shit noone asked or cared about and conflating unrelated crap to spread FUD - signal is CIA backed, whatsapp turns over metadata, all crypto is blown by NSA so we’re better off without, we can’t have encrypted channels (no1 axed for that), etc.

    if he’s being cagey and lying about plainly evident things, what else is he untruthful about?

    there are FOSS telegram clients out there and adding on E2EE is trivial (remember Pidgin and OTR over Google’s XMPP?). the fact that that’s explicitly against telegram’s TOS and that they’re adamant about leaving all your shit unencrypted “in the cloud” draws but one conclusion.


  • just tried to re-watch “the girl in the spider’s web”, the not-sequel to fincher’s masterpiece that’s “the girl with the dragon tattoo”. I remember hating it way back when and went in with a “how bad can it be” attitude… dios mio, what a colossal mountain of shit. the “hacking” in OP is hard sci-fi compared to this turdistan, and that’s the least of its problems.

    someone posted already the gell-mann amnesia effect and this applies to everything. how guns are portrayed in movies as magical. cars and how they’re driven. the laughable naive cop shows. medical procedures. legal proceedings. journalists and their MO.

    you hafta run your brain at 110% at all times to be able to somewhat disregard the learned idiocy that was programmed into you from an early age. here’s hoping we have the infrastructure in place so generations that are coming can avoid becoming similarly handicapped.



  • well, living room, it’s a single-room-dwelling type of situation. but yeah, move the chair out of the way and browse Jellyfin. I’ll post an image in a minute or two when I clear out the desk, kinda embarrassing with the amount of random crap on it.

    edit:

    the macbook is unrelated, a recent acquisition and in the process of being tamed for Fedora.

    it’s a n-th hand monitor I got five years ago from some junker who fixes and resells used TVs, he got it by mistake and was super-apologetic for the “missing” remote; it’s a monitor, it ain’t got none of those. also had no stand so I screwed a VESA mount in a board and it’s hanging thus ever since.

    edit 2:


  • it’s way less neck strain than the usual dual 24" side-by-side. this is like having 4x 20" 1080p screens in a grid but without the annoying bezels, and that’s how I’m mostly using it. plus you have the option to expand a window in any direction when you need it, which you can’t do in a multi-monitor setup. I arrange the windows in a 2x2 grid, or go smaller, usually 3x2 with keyboard shortcuts, by way of Better Quick Tiles for Plasma 6 (Kwin extension). tried the auto-tilers, hated 'em.

    when I’m done with work, jellyfin-media-player in Fullscreen TV mode with a $5 bluetooth remote from the couch for movies and shows.

    gaming sure, I run the games in 1080p and the desktop in 4k, so older games allow me to turn on FSR. had problems with Gnome Shell crashing regularly, zero crashes since I switched to Plasma.






  • people are missing the mark; the “not hiding” is an imposed narrative, a straw man argument and a false dichotomy, all in one.

    the issue is not whether you have or don’t something to hide, as this “hide” part implies something inherently sinister. the issue is you being forced to share stuff you haven’t decided to do so.

    when I’m not sharing the quality of my morning’s stool across all my social media outlets, it’s not something I’m hiding, it’s something I haven’t decided on sharing with the public. consequently, I don’t allow my software, hardware, service provider, government, or whoever-the-fuck to do it for me.

    so what this false equivalency is doing is moving the onus from the evildoer to me, forcing me to explain why I don’t like what this fucker is doing. fuck him and the horse he rode in on.


  • I wish everyone and OP included would begin with their hardware, or at least mentioning if it’s a Nvidia system. if it is, I’ll just disregard everything written in regards to glitches and crashes.

    my (all AMD, F41) system gets updated and rebooted like once a month, if I remember (flatpaks are on an auto-update timer); it gets suspended in the evening and woken in the morning, tons of apps are open for days. that’s a month-long uptime on a workstation that also does gaming, with those same apps open in the background. this was impossible on Gnome - just randomly closes all apps and here’s your login screen. OOM? driver? who knows - alls I know is, since the switch that happened zero times.





  • first off chill out, Jason Bourne.

    the threat mitigation is handled based on your threat model, not on a “defend all bases against anyone” approach. once you answer what your specific model is, then you can start building your defences. if your threat model is spouse looking through your shit, a password is more than adequate. if it’s the border nazis CBP, you go for encryption at rest. if it’s a toddler walking around the house smashing stuff, none of those will do you any good.

    there are people with complex threat models but I doubt they post on lemmy and they def don’t scour the classifieds for used Thinkpads. the idea that there are threat actors out there infecting random devices and then see what they catch is… def possible, but highly unlikely.

    you’re perfectly safe using a 2nd hand enterprise-class laptop, like a Thinkpad, Elitebook, or Latitude, wiped clean. those are tough and resilient devices built for road warriors for everyday, heavy use. the good thing is, they get periodically swapped out for new models, so they can be had for cheap, and a huge majority of those haven’t seen a lick of any significant use.

    those devices are worlds apart from the laptops you’re advocating buying (I assume you mean the consumer-class models) and definitely way cheaper, like a couple times over, while being infinitely expandable and serviceable with cheap, widely available and cross-generation compatible parts.

    the final part is compartmentalisation and fungibility of devices. keep the minimum stuff you need on there, assume they will break, get lost or stolen, so encryption is mandatory, and have a tried and tested backup and restore procedure in place.

    I’ve noted the product families specifically and what I wrote applies to them only, not every used device everywhere.