Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UW
Posts
41
Comments
748
Joined
2 yr. ago

Permanently Deleted

Jump
    • Firefox + uBO
    • NewPipe/LibrePipe/GrayJay
    • FreeTube

    They all are free, no subscription required

    And sorry Apple users, I don't know what option you have cuz I don't use Apple.

  • It isn't just about one company, but precedent. If today Asus can get away with this, other will look and copy the behavior. Apple and Samsung started a lot of anti-consumer precedents and no one can sure Asus isn't the next.

  • That's not vandal proof. What I mean by vandal proof is IK rated, like IK10.

    Best I can find is https://www.hikvision.com/en/products/IP-Products/PTZ-Cameras/Value-Series/ds-2de2a404iw-de3-w-s6-/

    You will have to set the camera pointing default to a non sensitive area, likely ground if you mount it directly above your doorbell, and only tilt up when it get some event triggers like motion (feet), audio (it does have a mic), doorbell (via home assistant), other cameras (mition alerts), or something else.

  • Now, as a new measure, if an underage user tries to set up a new Instagram account with an adult date of birth on the same device, the platform will notice and force them to verify their age.

    So another reason to force user to hand over PII for "age verification" if they "suspect" (with AI ofc) a new user is underage. Nice.

  • Is this a cyberattack, or pre-planted explosives?

    My dad used to have one and it runs on single AA bsttery. It will burn if exploded but I doubt will that make "man fell on the groud bleeding." Newer models might use recharable batteries, yet the BMC (logically thinking) should be sperated from the communication part as charging have nothing to do with it. How are you going to use SMS to hack a part of the system which isn't connected?

    If it is pre-planted explosives, that's just wet work and nothing to talk about it.

    Of course, the attacker can do a supply chain attack (by threating/hacking the manufacture, excluding explosives) as a stage to make the cyberattack possible.