![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/q98XK4sKtw.png)
If you’re genuinely worried about this, you shouldn’t be using untrusted machines for remote access.
If you’re genuinely worried about this, you shouldn’t be using untrusted machines for remote access.
Apache Guacamole might be a good option. “Clientless” (browser-based), supports various mfa, uses ssh/vnc/rdp on the backend.
However, if the data on that machine is sensitive, or if that machine has access to other sensitive things on your network, I’d suggest caution in allowing remote access from untrusted machines on the wider internet.
Heyr himna smiður - a medieval Icelandic hymn, set to music by Þorkell Sigurbjörnsson
powertop is a cool tool that can analyze your machine and provide a list of suggested power optimizations
That’s awful, I’m sorry :(
Is your ISP’s infrastructure based on RFC 1149?
Can’t beat an X230 with an i5 for that use case, and you can still find them for around 100 bucks. Swap in an X220 keyboard, maybe a new battery, coreboot it, and in my opinion you’ve got the perfect laptop. I’ve daily driven that setup for the last 5 years and it’s been great.
Altruistic behavior in social creatures improves the fitness of the group, and has positive evolutionary pressure. Strong, cohesive groups pass on their genes, so actually pretty probable!
Any proclaimed prioritization of privacy or privacy improvements in stock Android serve only to bring your data more directly under the control of Google at the expense of other entities, so that those other entities must pay Google as a middleman to your data. On stock Android, there is no privacy - Google has access to everything, always.
In my opinion, one step that could reasonably be taken to improve the situation is for Google to go fuck itself, lose every anti-trust suit brought against it, and die.
It’s still right to complain and protest about something that is unjust, even when ways to circumvent it exist. Because the next logical policy step is to ban VPNs, as many countries already have, and the solved problem becomes unsolved again.
Bromite before it died, RIP :( Vanadium now with regular dns adblocking where security matters, Fennec where it doesn’t.
If you aren’t going to fully wipe your drive in horrible events like this, at the very least use shred
instead of rm
. rm
simply removes references to the file in the filesystem, leaving the data behind on the disk until other data happens to be written there.
Do not ever allow data like that to exist on your machines. The law doesn’t care how it got there.
If you can’t get a packaged apk directly from the developer/publisher, or from a trusted repository like the play store or fdroid, I wouldn’t resort to third party sources like these. If you can’t compare the signing signature of an apk from an untrusted source to that from a trusted source, you can’t be certain that what you’re installing hasn’t been tampered with.
I’d recommend a full battery calibration before running the command one more time, if you haven’t already (charge the battery fully, leave it on the charger at 100% for a while, then fully discharge until it shuts itself off, leave it for a bit, then fully recharge while off). If the calibrated values line up with a full:design ratio of ~80%, especially with a 10-year-old battery with almost 700 cycles on it, my take is that’s pretty great.
That said, I think the best way to get an accurate feel for the health of an old battery is to put it through one full cycle of normal use and time how long it takes to die.