Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)NY
Posts
0
Comments
105
Joined
2 yr. ago

  • If its only you and you want best security, setup a VPN system. (Tailscale, Netbird, or others are quite easy)
    If someone else should also, and you dont want everyone to have to use a VPN, then you can expose some services directly. Of course behind CGNat you need some third-party system to allow this (e.g. cloudflare or a rented server).

    I am not a big fan of cloudflare, they are a huge centralized company, easily allowing tracking across websites with clear-text access and kinda discouraging learning how to secure things yourself (which you have to do anyways, because you are a service provider and only cloudflare is not enough if its still publicly accessible though them)
    But in the end its your choice. They easily allow you as service provider to protect yourself from DDoS attacks or allowing IPv4 access when you are behind CGNat, things you just cannot easily do yourself, certainly not without costs.

  • I have EndeavourOS, but with the nature of Bleeding Edge packages, things can break, so setup automatic snapshots with btrfs (you want this for your data anyways).

    Bleeding Edge packages have the advantage of you getting the latest features, patches and improvements, which is required for some gaming cases.

  • This. You can also directly connect via IP address when enabled on the target, very handy.

    Its probably also one of the few which have started developing Wayland support on the host side.
    Currently only clipboard and video sharing works, mouse and keyboard are close..
    wayland is very restrictive and things like full keyboard/mouse reading/writing need special handling (and afaik a mouse write method wasnt really available from user permissions so far)

  • Find the escapees, put them on the list or find a list including them for your particular use-case.
    I dont have much things getting through, mostly small sites displaying things, so i just add a filter myself.

    Afaik Ghostery was bought and started tracking its users.. or was that another popular extension? Happened to alot of these.. pretty sure it was Ghostery?

  • W8 wot

    Jump
  • afaik it doesnt spoof the user-agent (which doesnt really hide your browser for more advanced scripts at all), but simply blocks the script responsible for checking.

    Because Google apparently cannot afford to do such checks in the backend, same with the Ads, all Client-Side, no wonder we can easily bypass it.

  • Basically: everything is extra and this almost illegal marketing everywhere.
    Go to Netcup or Hetzner if you have the money, much better quality.
    Even Contabo is better, but if you cac, go for Netcup if you want best bang for buck that works.

  • The Lenovo Business Laptops always were super strong for me.
    A bit on the heavy side (at least on the older models), but build like a tank and has an awesome keyboard.
    But any halfway decent Laptop will run Linux fine.

  • Some/Many robot vacuums can be flashed with custom firmware and then only communicate locally.
    Unfortunately it seems the software isnt as polished or well as cleaning, but i guess some less efficient cleaning vs phone-home crap is a good counter.

  • Ublock can strip it from the URL automatically, though if the website checkw this it might block stuff :/
    Would need some deeper integration to be able to separate the URL bar the Website sees and the one you see. (like the current separation of the DOM)