Get the cheapest VM (called Droplets on DO) you can get.
Install Ubuntu on it.
SSH into it and open a SOCKS proxy (ssh -D 8080 <yourdropletip> on Linux, use PuTTY on Windows).
Configure Firefox to use localhost:8080 as a SOCKS5 proxy.
Win.
Bonus points if you set up Cockpit to manage everything over the web (localhost:9090 over your proxy), that way you don’t need to learn all about sudo apt whatever.
Are you comparing a living breathing woman who’s doing her job to your TV? Like, you do know you need consent to film in a private establishment, right?
I’m working on one called Soteria. It’s still early in development, but I’m focusing on both privacy and cloud availability.
It uses any WebDAV store to upload footage, but it’s designed to work best with my own WebDAV server Nephele. This lets it upload footage to any S3 compatible blob storage, end to end encrypted.
That way if your cameras go offline, you can watch the last footage they were able to upload.
Like I said, it’s in early development, so it’s not yet ready to use, but I’m going to be putting more work into it soon and try to get it to a place where you can use it.
It works with any V4L2 compatible camera, so laptops, webcams, and Raspberry Pi cameras should all work.
They don’t “need” to. There are games that companies refuse to let people run on Linux, so there will be a market for Windows, no matter how shit the experience is.
I would argue that averages actually don’t mean dog shit, and that they’re only used to pit the proletariat against each other. There is an absolute minimum someone can make, but there is not absolute maximum. At least not yet.
We need to stop talking about inflation and start talking about how WAGES ARE NOT GOING UP! Greedy corporations are not PAYING PEOPLE WHAT THEIR LABOR IS WORTH!
Cool, CVEs don’t tell you whether it’s remotely exploitable. What I’m talking about is an issue with the Linux kernel itself that can be exploited without having the existing ability to run code on the machine.
It’s very big news when there’s a vulnerability in the Linux kernel itself that can be remotely exploited. Like, everyone on any security show/podcast/blog is talking about it.
Sure, but those vulnerabilities aren’t just open to the network. Almost every one requires you to be able to run at least unprivileged arbitrary code on the machine.
“They call it deadnaming because it’s dead. My [Twitter] is dead.”