Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)TR
Posts
4
Comments
2,150
Joined
2 yr. ago

  • Where I live Aldi is the only store that actually has any workflow that makes sense for reusable bags. All of my reusable bags have been repurposed for storing contents of "ADHD doom boxes" so I now just have multiple bags of Aldi paper bags which float between my car, my office and the reusable bag storing spot at home, and I'll either buy a couple more bags when I forget or just keep reusing them until they're entirely worn out and get tossed into the recycling bin. I think I may have accidentally stumbled upon the best possible solution for my situation because I end up reusing single-use paper bags dozens of times before they get recycled (and because they're paper they'll actually break down within my lifetime unlike the single-use plastic bags that hold less)

  • Y'know what that was terrible writing on my part. Where I put "physical vlan" I just meant specifying each port be a specific vlan rather than a trunk port that has multiple clans on in

    I should probably proofread more and write less when tired

  • Physical wire tapping would be mostly mitigated by setting every port on the switch to be a physical vlan, especially if the switch does the VLAN routing. Sure someone could splice an ethernet cable, which would really only be mitigated by 802.1x like you already said, but every part of this threat model makes zero sense. You ultimately have to trust something (and apparently in OP's case that's a third party VPN provider that charges extra to not block LAN access while connected and they remain entirely on the free tier of)

    But at the very least, not trusting everything on the network is a very enterprise kind of threat model, so using standard enterprise practices of network segmentation, firewalling, and potentially MAC-binding and 802.1x if so desired isn't a bad idea, if for no other reason than it might lead to a career in network administration. And honestly I mostly want to get OP to not think of VPNs like a magical silver bullet and see what other tools exist in the toolbox

  • Sounds far more likely that either someone misunderstood that residential IPs change frequently/may be shared by multiple subscribers or the ISP made an error when responding to a subpeana and provided the incorrect IP. Unfortunately both are all too common with privacy enforcement

    If you really think the ISP router is snooping and can't by bypassed you could simply double-NAT your network with a trusted router and call it a day. Much less VPNing and much less unusual decisions of trust and threat model involved then

  • But supposing you absolutely do not want to tack on additional costs, then the only solution I see that remains is to set up a private VPN network, one which only connects your trusted devices. This would be secure when on your I trusted LAN, but would be unavailable when awat from home.

    Traditionally this would be performed by creating a dedicated network of trusted devices. Most commonly via a VLAN for ease of configuration. Set the switch ports that the trusted devices are connected to to use that vlan and badabing badaboom you're there. For external access using Tailscale or one of the many similar services/solutions (such as headscale, netbird, etc.) with either the client on every device or using subnet routing features to access your trusted network, and of course configure firewalls as desired

  • It's a direct reference to At The Mountains of Madness. The penguins make exactly that call in the book and are friendly with the Ancient Ones, and really only present in the story while the humans are in the domain of the Ancient Ones.

    Although the choice of showing Cthulhu in the final panel rather than one of the Ancient Ones is inaccurate. Perhaps it's meant to be a sculpture, since in Call of Cthulhu it was made clear that Cthulhu was specifically the shaman of the ancient ones, meant to wake them when the time is right

    Anyways I'd highly recommend reading the stories since they're quite a unique style and dripping with a mounting, growing intensity. You can even listen on LibriVox. Call of Cthulhu is about an hour long and At The Mountains of Madness is about 4.5 hours long, so one decent car trip's worth of audiobook basically

  • The "support" most importantly includes security updates. You better bet every hacking group has been working at finding fresh zero days for Windows 10 and is stockpiling them to start hammering any PCs that can't be upgraded this October

  • I'm out and about right now so I can't look it up, but most likely during the 50s. The United States transitioned away from steam in the 50s and was largely transitioned to diesel by the early-mid-60s

    Edit: this xitter xeet says 1957 which seems very plausible (and applied a filter to the photo for whatever reason) Also while reverse image searching in hopes of finding more details I found this very post but federated to dbzer0.com