The replacement battery you bought in 2017 was the last of the genuine stock for that 2012 Thinkpad model. Now it’s only poor quality aftermarket. Maybe just stick with the existing genuine battery – its 47 second runtime should be enough time for AC loss to trigger a custom script to make it hibernate.
- 6 Posts
- 81 Comments
rcbrk@lemmy.mlto Cybersecurity@sh.itjust.works•Steampipe: How to secure API credentials?English6·5 months agoStep one: don’t publish screenshots of your credentials on the web!
Never Use Text Pixelation To Redact Sensitive Information:
Let’s Enhance: A Deep Learning Approach to Extreme Deblurring of Text Images:
rcbrk@lemmy.mlto Privacy@lemmy.ml•Signal CEO dismisses Snowden archive research about NSA supply chain attacks, backdooring, civillian surveillanceEnglish42·5 months agoWhittaker’s phrasing is ambiguous. Could be read as expressing one of a number of things:
- The paper/article is misleading and distracting from meaningful threats to privacy.
- That the original tweet is using misleading accusations to distract us from the article’s revelations of meaningful threats to privacy.
- That Appelbaum’s authorship of the research is an unwanted negative association which undermines the attention deserved by the threats documented in the paper which are misleadingly justified as necessary by eg. governments.
It’s difficult to know without a better understanding of Whittaker’s position on the various matters at hand, so I don’t know.
rcbrk@lemmy.mlto Open Source@lemmy.ml•What projects does the opensource world lackEnglish3·6 months ago
What ideally I’d like is some sort of good encrypted email […], which can achieve decent Android integration. Proton apps are pretty useless to that effect […]
Don’t need provider-specific apps if their services use standard protocols:
- IMAP: Fair Email or K-9 Mail(/Thunderbird)
- CalDAV: DAVx⁵
rcbrk@lemmy.mlto Open Source@lemmy.ml•Sam Altman admits OpenAI has been on the wrong side of history with Open-SourceEnglish2·7 months agoAnyone can now provide that service. Why pay OpenAI when you can pay a different service who is cheaper or provides a service more aligned with your needs or ethics or legal requirements?
rcbrk@lemmy.mlto Selfhosted@lemmy.world•Email with own domain service but local?English5·7 months ago- For incoming mail, on your server run a mail retrieval agent like fetchmail to fetch mail from the externally hosted mailbox into a maildir on your server.
- To serve that maildir to your clients, on your server run a mail delivery agent like the IMAP server Dovecot.
- To accept outgoing mail from your clients, on your server run something like Postfix with a
relayhost
configured with the details of your externally hosted SMTP server.
There’s nothing unusual or tricky about any of this arrangement.
(I have never used their commercial offering).
Jitsi works really well, and the developers seem to have made an effort to have it work well on any platform, even mobile browsers and PSTN. I’ve always found it the lowest friction teleconferencing method for all types of users.
It’s self-hostable, integrates with SIP, and 8x8’s commercial offering mentions HIPAA, BAA and GDPR.
rcbrk@lemmy.mlto Privacy@lemmy.ml•Forget Chrome—Google Starts Tracking All Your Devices In 8 WeeksEnglish51·8 months ago
rcbrk@lemmy.mlto Privacy@lemmy.ml•Finally ditched all Google apps/services on my phoneEnglish9·8 months ago
Migadu is a decent option if you don’t want to self-host.
It’s no use. “VPN” means gateway/MITM service, just like “crypto” means digital tulip mania.
Today’s episode brought to you by our friends CoinSkank™ and EchelonVPN.
The article does not explain the primary design purpose of a VPN – providing an encrypted tunnel into or between two private subnets.
For example, your home subnet is typically all 192.168.nnn.nnn addresses – a class of addresses which the wider internet does not route, and which your router/modem does not allow the wider internet to access unless explicitly permitted.
Say you have a NAS on your home network, and you want to access it from your laptop while at a cafe; you could set up a VPN between your laptop and your home router, and it can make your home network appear as your local network to your laptop, giving you access to your NAS.
Or between two office locations of a business – their database servers, accounting systems, printers, etc can all be freely accessible between offices without being exposed to the wider internet.
rcbrk@lemmy.mlto Technology@lemmy.ml•ISPs say their “excellent customer service” is why users don’t switch providersEnglish14·9 months agoLoL, they misconfigured their test rig and it turns out they were measuring loopback’s bandwidth.
rcbrk@lemmy.mlto Privacy@lemmy.ml•Can a Unified Push push server see/read notifications?English2·9 months agoYeah, I was doing some more reading and I think it might only be the newest version of the UnifiedPush spec which requires the message to be encrypted.
- https://codeberg.org/UnifiedPush/specifications/pulls/1
- https://github.com/binwiederhier/ntfy-android/pull/98
- https://codeberg.org/iNPUTmice/Conversations/issues/428
I noticed that the examples given on https://codeberg.org/iNPUTmice/up/src/branch/master/README.md are unencrypted.
rcbrk@lemmy.mlto Privacy@lemmy.ml•Can a Unified Push push server see/read notifications?English2·9 months agoI mean ntfy’s primary purpose is not dependent on UnifiedPush – all UP functionality could be removed and ntfy would still work as intended.
Ntfy server knows how to be a UP gateway, and relays those messages to the ntfy app, which knows how to be a UP distributor.
As far as I understand it, a client app using UP to recieve push notifications does perform a registration step with the UP gateway (via the distributor app which communicates with the gateway via its own transport), which sets up and responds with the api endpoint details, which the client app relays to its servers, which can then send UP notifications via the specified gateway.
You’re all still suckling at the opium teat of corporate media, whether via torrent or not.