• 0 Posts
  • 24 Comments
Joined 2 years ago
cake
Cake day: June 8th, 2023

help-circle




  • Yeah only use doh on router, expect per device security otherwise.

    I don’t use nextdns so I don’t know. Some mullvad stuff (like their http proxy!) is only functional when you’re using their vpn, but the doh server works fine without it.

    DNS over https makes a connection with the dns server using the encrypted https protocol. That means that when I want to go to hanksbuttplugemoprium.com my isp doesn’t see the request because it’s encrypted. Normally those requests get passed up the chain in plaintext and that’s a Big Problem.

    Like I said, I don’t know about nextdns, but it seems like it’s built around using dns level blocking.

    The problem with blocking stuff through dns at the router level (like pihole and nextdns and if you’re not careful with what you choose, mullvads doh) is that you might end up stopping normal legitimate internet use. I stopped using pihole and later uhh the one with home in the name for that reason. Shit didn’t work and people wouldn’t tell me when it happened so I couldn’t whitelist stuff.

    If you’re worried about your isp seeing dns requests and cataloging them, selling them or just blocking them and reporting you to the authorities, set up dns over https at the router level.

    What are you trying to accomplish?


  • You can pay for mullvad month to month by sending them five bucks and a piece of paper with your special number written on it in an envelope.

    Might make it more affordable.

    There is one thing you should probably change post haste (see what I did there?): get you one of those polarized privacy screen protectors and stop using biometrics. At least in the us biometrics aren’t protected by laws against unlawful search and compelled speech.


  • bloodfart@lemmy.mltoPrivacy@lemmy.mlHelp setting up Wi-Fi router
    link
    fedilink
    arrow-up
    2
    arrow-down
    3
    ·
    6 months ago

    Brand doesn’t matter. They’re all equally bad.

    There’s two passwords to change: your routers administrator password and your WiFi password.

    There’s mainly one setting to disable, but it’s often broken up into many across several parts of the device’s configuration page: wan administration or access to anything under any circumstances.

    The smart starting point with dns is: dns over https. It’s probably all you need so don’t worry about pihole or other stuff. You mentioned mullvad. Use theirs.

    These recommendations will provide a good baseline for security that doesn’t break the places you want to go on the internet. You could do more on the client side like use a vpn from your computer or configure your browser to use encrypted client hello and never store cookies or cache.


  • Buy unlocked. It’ll cost more and you won’t have the option of doing the carrier/manufacturers no interest payment system, but that’s what it costs to actually not be locked into a particular carrier for the foreseeable future.

    My actual advice about phone choice is to learn the unjailbroken ios way of doing things because what you’re asking for in your post knocks out a lot of the more specific things people recommend on android devices and pushes you to smaller or not privacy focused roms.

    You’re not auditing the code so you need the most eyes on it that you can get so running smaller or less privacy oriented software becomes more of an issue.

    If you haven’t already, make a threat model and see if/how that changes your requirements and desires.


  • The difference between a reference guide intended for plant identification written and edited by experts in the field for the purposes of helping a person understand the plants around them and the ai is that one is expressly and intentionally created with its goal in mind and at multiple points had knowledgeable skilled people looking over its answer and the other is complex mad libs.

    I get that it’s bad to gamble with your life when the stakes are high, but we’re talking about the difference between putting it on red and putting it on 36.

    One has a much, much higher potential for catastrophe.


  • Do not use ai for plant identification if it actually matters what the plant is.

    Just so ppl see this:

    DO NOT EVER USE AI FOR PLANT IDENTIFICATION IN CASES WHERE THERE ARE CONSEQUENCES TO FAILURE.

    For walking along and seeing what something is, that’s fine. No big deal if it tells you something’s a turkey oak when it’s actually a pin oak.

    If you’re gonna eat it or think it might be toxic or poisonous to you, if you want to find out what your pet or livestock ate, if you in any way could suffer consequences from misidentification: do not rely on ai.


  • You’re correctly assessing the situation but the conclusion you reach is wrong. Here’s how:

    As another person said, just tack on no ethical consumption under capitalism and you’re golden. Soon you’ll be crunching through critiques of Goldman and speaking in ways that make normal ppl make the brotha eww face. But the big difference between just doing my job and just following orders is degrees of separation and situation.

    Even though people in positions you describe at companies you’re talking about ought to be able to understand the connection between their work and the immiseration of all humanity, it’s very easy to imagine someone who through choice or ignorance doesn’t see that connection. Our higher education programs have been removing humanities and arts in favor of stem associated education and ideas like effective altruism are renewing the randian tradition. Further, the work of many people in engineering is partial and atomized. Who wouldn’t want to put in the time designing a hermetically sealed self oiling piston that never needs maintenance over a million cycles? Who wouldn’t refuse that job when shown the patent drawing in which it’s a crucial component of a captive bolt gun against a human head?

    The situation itself can’t be undersold. Soldiers (and hired workers!) on trial for war crimes couldn’t claim they were just following orders because they saw directly what their labor wrought. There was no degree of separation. Our expectations for that closeness to atrocity are different than when there’s a few veils between us and the subject. We expect people to get a different job, to defect, to sabotage, to kill their COs.




  • Why are you doing this?

    If you don’t know why you are trying to get personally identifying information off the internet then you can’t evaluate weather you should trust the third party you’re considering contracting the job to.

    If you don’t know why you’re trying to get personally identifying information off the internet then you can’t even evaluate advice people give you about it.