Skip Navigation

Greg Clarke
Greg Clarke @ Greg @lemmy.ca
Posts
55
Comments
671
Joined
3 yr. ago

  • That's fair, I can appreciate an attack vector in cases where there are bad blocks and the drive was unencrypted. Luckily bad blocks are less common with modern SSDs and assuming the disk was encrypted, a few bad blocks are unlikely to expose any contents. So knowing the number of bad blocks and what data was stored would inform if a fill and empty approach would be suitable to sanitize the drive.

  • Fill the drive 100% using data duplicator then delete everything on the drive. Repeat a few times to ensure you scrub all blocks. There is no need to physically destroy the drive.

    edit: fair criticism of this approach in cases when the data is unencryptd and the hard drives has bad blocks. I just wanted to give a counter to the destroying hardware approach which isn't necessary warranted

  • Algorithmic advertising big tech companies (Meta, Google, Amazon, etc) generate profit at the expense of society. They blindly follow short term algorithms with no regard for their impact on society. We obviously should tax them but we should also make sure our laws enable us to prosecute people who profit by destroying society. Hold them accountable

  • Why do you believe that most people you know don't live and are just surviving?

  • Haha, that was literally the exact same point I stopped reading. I have emails older than this system and they weren't stored on floppys 😂

  • Have you downloaded your podcasts while I'm another country or with a VPN set in another country?

  • I can't verify this story with any reputable sources. Is this real or just boomerbait?

  • It's not implausible, Proton has a free privacy respecting tier

  • Gmail was initially advertising funded while respecting privacy. It's a false dichotomy to argue that a service can't have a free privacy respecting offering. We've just become accustomed to accepting targeted advertising as the norm.

  • Try and pee nonstop during totality

  • how would anyone know if a particular name is being unused?

    I have a couple of nice domain hacks and I use them for email and random services I run so the root domain appeared to be abandoned. I received so many messages from people wanting to buy them I just started pointing them at other sites so they would stop hassling me. I've had one of these domains for nearly 20 years and it's my main email address. I'm not selling because it would be a year long full time job just to update all my services 😅

  • The CCP should make the m4, Abrahams tank, F35 etc emblems. Checkmate

  • I hope US enemies don't find this. They could use it to force US soldiers to stand up during engagements and then force the US soldiers to kneel when they're doing fire and movement.

  • Do you mean E2EE for voice calls and SMS? Otherwise why not use a trusted or personal VPN to solve this problem? I wouldn't bother with trying to secure voice calls provided by a carrier as the recipient would also need those counter measures in which case why not use ab E2EE voice app like signal.

  • Your voice is great