• 2 Posts
  • 18 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle



  • The simplest explanation is that OP doesn’t have good opsec, and got a few tracking cookies after deleting cookies, before setting up their proxy/VPN. Then, on the VPN, the advertiser recognized their VPN IP address, and chose to exclude that from generating location data, deferring instead to the location indicated in their existing tracking cookies.

    Privacy is hard. The system is rigged against privacy. You have to do everything perfectly, because one simple mistake could leak your IP address.






  • Usually it’s this, but sometimes the Recaptcha doesn’t even load (looks like an IP ban). I just submit the form, and then get an error message saying I must complete a Recaptcha, but there’s no evidence in the page of any Recaptcha to fill out.

    I’m on a residential ISP. I’ve checked every IP address reputation system I can find, and see no problems (except from “Clean Talk”, but they’re so small that I doubt Google uses them).

    Also, I hate knowing that I’m doing unpaid labor to help train an AI that will make the world a worse place.



  • Actually, I just saw that the image could zoom in if I opened it in a new window.

    Regarding your connectors: If you want to have the different parts of the keyboard connect by USB-C, then you would need to add a USB-C hub inside each part that could have downstream devices.

    If you are willing to have each part be a different USB device, that would simplify the design a lot. Then, they could all connect to a USB hub.

    If you want to minimize cable clutter, you might consider interconnecting the components with something like QWIIC, which is pretty small. It would also require doing custom firmware.


  • Electrical engineer here. I can only answer a few of the questions:

    This will be a “USB Device” (as opposed to USB Host or USB OTG) so the correct USB connector to use is B receptacle, mini-B receptacle (obsolete), micro-B receptacle (obsolete), or C receptacle. You can pick any one of those. The obsolete ones still work fine, it’s just hard to find cables for them. Mini-B is actually very durable. Alternately, you could have a captive cable with a USB A male plug on the end.

    KiCad has pretty good facilities for making your own component layouts. Many components you simply can’t find existing files for. Unfortunately, this is part of the life of circuit design. It should only take an hour or so per component.

    Adding diodes can enable N-key rollover. If you don’t need that feature, you could skip it. If you’re going to the trouble of making your own keyboard, diodes are a comparatively small cost, so you should do it. The Chouchou keyboard uses a separate pin for every single key, so it doesn’t need diodes.

    Yes, you can hide the parts in a case. But you could also just make the back of the circuit board really long, and there should be enough space for it. Picking out connectors and cables and stuff is always a pain, so try to avoid having multiple boxes if you can. The electronics should be pretty small anyway.


  • I have self hosted my email since 2006. I gave up on self hosting outgoing mail in 2021, but I still keep the server up for incoming mail, and still set up throwaway accounts on there.

    The hard part of hosting email is getting Google and Microsoft to accept outgoing mail. Tons of businesses that do not have visibly outlook .com or gmail .com addresses are still hosted by those servers.

    I had SPF, DKIM, and a static datacenter IP address with no reputation problems. I still couldn’t get through to Microsoft, not even in people’s junk mail directory, until they manually whitelisted my address. Microsoft didn’t allow them to whitelist a whole domain. Google was a little easier, but they added new demands monthly.

    In 2025, I can’t get reliable delivery to gmail .com addresses even sending from a hotmail .com address in the outlook .com web interface.


  • need to charge it in a public space? You better hope no one had modified the charger with something like an RPI to silently exploit your phone

    Any secure Android device should be starting each USB session in device mode, set to charge only. It is usually not possible to change this mode without unlocking the screen. I don’t know what this has to do with sandboxing or unlocked bootloaders.

    Crossing a border into a country and they suspect you’re some sort of threat?

    How does this attack work? Are you saying they’d replace the operating system by using the unlocked bootloader? There are plenty of ways to prevent this with full disk encryption. Of course you need to check for modifications when you get it back, but that’s true even if you have a locked bootloader, because of hardware modifications and leaked keys.

    Not running software that updates the hardware’s proprietary software drivers? One text message and you’ve got a rootkit.

    In any of the open source Android distros, like LineageOS or GrapheneOS, those updates come as part of the operating system. The updater is open source, and doesn’t care whether your bootloader is locked. I assume a Linux Mobile system would be closer to Debian’s Apt system, which is also an open source updater than can install proprietary drivers, and also doesn’t care if your bootloader is locked.

    didn’t really need an “um ackshually” about people who don’t want a secure os

    This is pointlessly condescending.