irotsoma

joined 2 months ago
[–] [email protected] 3 points 1 week ago

Last time I checked, it depended on where you live and if the laws in that area require them to allow you to delete certain information. It's on the a cache thing, it's in your account. You can set up a new account, but if you use other Meta applications like Facebook, WhatsApp, Threads, etc, you may have to abandon those as well.

Might be possible to use a VPN or something to pretend to be in a country that they allow to have more detailed deletion of data, but I'm not totally sure if it's just your current location or if the account has to have been created in that location or of you can change your account-level location, etc.

[–] [email protected] 3 points 1 week ago* (last edited 1 week ago)

Generally the key fobs have a circuit and antenna inside and the circuit has a code that it broadcasts when it is near the transceiver. Some systems are more complex, but at the lowest level the system disrupts a magnetic field around the transceiver in a certain way to generate the code or is powered up by the transceiver and transmits the code using that power. That way no battery is required and it can fit inside a thin card or fob. Some older ones have a very small battery to increase range or create a more complex or modifiable code or for proximity use rather than touch.

That code is then authorized or not to open the door in the security system. And yes every time the fob is used, it is logged. And depending on if the fob has a battery, it is possible it tracks leaving. If they don't have to touch the fob to a panel and just need to have it on them, then it logs any time they approach the door regardless of entering or leaving. If it requires touching or bringing it close to a panel and they don't have to do that when leaving then it probably doesn't log them by proximity.

Whether or not the log has the person's name or just the code or ID of the fob depends on how old or cheap the system is. But there's definitely some document somewhere that lists the peoples' names and which fob they were assigned if it's not in the system. So it's easy enough to find out.

Any system that has the same code in every fob would be either super old or super cheap and unlikely to be used on secure doors. Having unique codes means that if a fob is lost or stolen it can be deactivated among other things. Which is a no-brainer for security if there is no real significant cost. The only reason older systems didn't is because the tech couldn't create long enough codes on the circuits that existed. And super cheap systems don't want to create too many different codes since it's cheaper to mass produce the same one over and over. Basically why car fobs can often open other people's cars. Either they're old or the car company's too cheap and it's not their security at risk, so they don't care.

[–] [email protected] 1 points 1 week ago (1 children)

I'll take one. Feel free to DM me.

[–] [email protected] 1 points 2 weeks ago

Calgon, take me away...

please!

[–] [email protected] 2 points 2 weeks ago

If you want to keep your LDAP as the source of truth, then Keycloak is also a very good option. I did that originally, but decided I only had a couple of things needing LDAP and that wasn't worth keeping it around. Authentik was a good way to emulate an LDAP but with a different back end. But Keycloak is definitely my recommendation in your case.

[–] [email protected] 4 points 2 weeks ago (2 children)

Keycloak. Took me a bit to learn the basics, but it has been way easier to troubleshoot than Authentik and has more features. If you need something that mimics LDAP rather than syncing with an existing LDAP, then Authentik is pretty good. I don't use LDAP, though.

[–] [email protected] 1 points 2 weeks ago

Most could, but most are also designed not to because adding a virtualization type of layer allows for ways to circumvent it. Anticheat needs to trust the environment it is running in so it can rely on the information. Wine is designed to replicate things it trusts in Windows, but not actually necessarily replicate the way the kernel actually does those things, so the things they are relying on might not mean the same thing as the do in Windows. So they'd need to analyze and possibly implement things a bit differently. This takes time and money and for companies like this, the customer isn't the user, so they have little reason to cater to users needs. Pro gaming and a few online game companies are their primary customers and they generally don't want to support Linux anyway.

[–] [email protected] 1 points 2 weeks ago (1 children)

Usually it uses your IP address first, bit it's not the only information in cases where the IP address is a known VPN or similar. Are you saying you were tunneling over TOR the first time?

When you switched to VPN you didn't mention what browser. If it's one that supports advertising IDs, that could be used, for example.

And when you connected to copilot did you get a captcha popup? If so, did you have to actually solve a captcha or click a button? If not, then it likely is getting information from somewhere that you are trustworthy.

Clear all browser data, make sure enhanced tracking protection is not disabled for the site. Go to a site that tells your IP address and verify it's the Tor endpoint to verify the setup there is correct. Then try again.

Also, assuming you're not clicking through any popups to allow tracking info or logging in to any accounts on this browser beforehand. If you log into a Microsoft account or any other account for a site that Microsoft gets info from first, it can use those logins to track you. You can disable this in the browser, but so many sites will break without it.

[–] [email protected] 2 points 3 weeks ago* (last edited 3 weeks ago)

Nope it doesn't add anything for me. The _netdev option tells mount to wait until the network is connected before attempting to mount. And the nofail option tells it not to error or block the process that called it if the mount doesn't work or is delayed.

Now if the mount contains your etc or other critical config files, it could cause problems and maybe you want to wait, so don't want the nofail. And of course this kind of thing is somewhat OS specific depending on what boot system and service manager, etc., is used, so YMMV, but on Fedora, Rocky, and Ubuntu, it has worked for me for many years.

[–] [email protected] 1 points 3 weeks ago

But it's "just business". You can't blame them. That's the get out of jail free card, often literally.

/s

[–] [email protected] 7 points 3 weeks ago

Sounds like basically a faith-oriented streaming platform that does discriminate against certain content is marketing themselves by saying that they are better than YouTube TV because YouTube discriminates and using this as a way to say that the government is even "investigating" YouTube's discrimination to prove their point even though they were the ones who triggered the "investigation". Good marketing if you have a niche audience obsessed with discriminating and pretending they're the ones being discriminated against because people don't like their discrimination.

[–] [email protected] 2 points 3 weeks ago (2 children)

Try adding the nofail and _netdev options in your fstab entry. I have this on a few computers that connect to nfs shares including my laptop that obviously can only connect when I'm at home or on VPN. Example:

server:/path /mnt/path nfs4 defaults,nofail,_netdev 0 0

view more: ‹ prev next ›