

Trump could get the case dropped right now though if he wanted to, right? Or is it too far along at the lower level for that to be an option?
Trump could get the case dropped right now though if he wanted to, right? Or is it too far along at the lower level for that to be an option?
What’s the play here? Why is trump’s DOJ still pursuing anti trust after having all the CEOs at his inauguration? Is he trying to extort concessions out of the tech giants or something?
400 for my use case, we’re trying to violate causality
This doesn’t do anything, all these aircraft are already in trusts. You can still track them, the N number/ICAO ID is what people are using
It comes down to looking at the chain they can use to link a post to you. You should be able to express yourself fully without fear of retribution.
First and most importantly, get a password manager and use unique passwords for everything, this covers the overwhelmingly likely scenarios. All your online accounts should either be ~14+ character “dl+ruHgGv6-c0$1hh7” style passwords or 4+ random word “correct horse battery staple” style passwords. The password manager should generate them for you.
Make sure your phone has a password and consider using it instead of biometrics (face/fingerprint unlock). Passwords can’t typically be compelled but they can force you to unlock things with your face/fingerprints. Enable whole disk encryption on any computers that have access to your password manager or accounts. Turn these systems off when you’re away or asleep. Enable automatic reboot on your phone if supported so it will reboot itself if not unlocked after a set amount of time, preferably 12-24 hours max. This sounds dumb but makes it 10x harder to break into if you’re taken into custody due to how phone encryption works.
If you like social media, create accounts that aren’t in your name and have no common links (different email addresses, passwords, user names, etc). Do so over a VPN or Tor, ideally with an exit node outside the country and use email aliases through proton or similar so they’re all different. Never access them from a non-VPNed connection, your IP is logged every time you connect and kept for who-knows how long on the servers. Rotate these accounts so that your opinions and posts aren’t all connected to one identity. If you accidently post something that identifies you (you will make mistakes and should plan for it), that limits the damage to only the posts associated with that account rather than all your activity on that site. Stay logged out of Google/Facebook/Twitter etc as much as possible or use incognito/container tabs to keep those logins isolated from your other web activity. Disable history on everything! Google search, Google maps, Google location history, YouTube, your browser, EVERYTHING. Most of the stuff you see in court is just “well their Google history said they searched for XYZ so clearly they’re a terrorist”.
If you’re really enterprising, setup an old computer that’s only for social media and has the VPN enabled full time. Bonus points for using Tails Linux as the operating system but if you keep to the above it’s just an added layer of safety.
Right now the stuff we’re seeing is mostly low hanging fruit, they seem to be targeting people by literally browsing Canary Mission. They’re not employing particularly sophisticated methodology yet. That may change though so the above guards against that, at least somewhat. Your mission isn’t to be able to resist the full attention of the NSA, it’s to be much more difficult than average so they turn their limited resources elsewhere because they have a quota to meet that week.
deleted by creator
deleted by creator
It’s mostly a nothing burger. You basically need to have code already running on the chips. It’s less of a backdoor and more of just an undocumented function. That may sound scary but it’s rather common in production chips. In some ways it’s a good thing, it means there are now more possibilities for messing with the chip and doing fun stuff with it.
There’s already a startup trying to get the FCC to give them half of the 915mhz band (meshtastic, smart home stuff, ELRS, ham radio) for a pay to win GPS alternative.
Blue marble is essentially an open source Google Earth desktop application. Idk if it’s exactly what you want but it’s not terrible.
OsmAnd is the same thing for Android and iOS and it’s absolutely wonderful.
That’s kinda what SAR sats do. They’re using radio waves but they illuminate swaths of the planet with a big dish/array and then look at the reflections. LIDAR sats too.
They’re the only hobbyist manufacturer with any scale. If you look at the Dedrone stats it’s just entirely the DJI show followed by AUTEL by a mile and then DIY stuff. The DIY drones can be built from anything and can be trivially designed to avoid surveillance so you’re not gonna get anywhere with them anyway.
Yeah the FPV community is way better because they actually have to know what they’re doing mostly. They’re mildly noncompliant but only regarding the regs that shouldn’t apply to the size of stuff they fly; RID, registration, and BVLOS don’t make sense for airframes lighter than a goose. They tend to avoid other people because they understand the public is wary of drones and they’re wary of Karens and untrained cops. They put far more hours on their airframes than any of the other amateur operators but every single time I’ve been near a drone doing something dangerous, stupid, or annoying it was a DJI.
IDK, most of the kits require soldering (because the industry is fundamentally braindead) and if you go look at the various online communities, you’ll quickly see that this is one hell of a filter.
I smell parallel construction. You expect me to believe a McDonald’s employee called in the shooter just off the shitty photos? The chances of that are astronomically low.
No, 9/11 security theatre
Let’s not forget that the Concord failed in 2003. I wonder what started happening around then that made that actual flying part a smaller fraction of the overall time spent traveling…
Even if you can step through a portal and instantaneously get to London from NY, if you still have to go through the rest of the airline process the time savings just isn’t that huge.
They mean the Bluetooth MAC address. It’ll capture your phone’s and can tell who the manufacturer is but the rest of the address is randomized. That said, lots of watches/earbuds/assorted smart Bluetooth things aren’t randomized because manufacturers are lazy.
What’s the deal with libreSSL at this point, it seems like a few distros added it then removed it a few years later, now you don’t hear about it much.