Take a look at keeb.io, they have a few full size splits https://keeb.io/products/quefrency-rev-5-pcbs-hotswap-65-65xt-split-staggered-keyboard
whosdadog
The whole premise of the book is returning to earth, but The 100 starts out in the way you're wanting including multigenerational space stations and resource limitations.
I am using the pi hole for DHCP, maybe you just have to turn off the DHCP server on the att modem.
I know what we're going to do today!
Are you sure about that? I'm using the official AT&T fiber modem (Nokia white oval) and a pi.hole for DNS. I do remember needing to change a number of settings to get it to work though.
You probably want commercial displays. They'll cost a bit more, but they're also designed to run 24/7 (think the screens they use in menus, signs, etc) so they could probably last forever as a TV.
That sucks your apartment flooded, but depending on what state you're in you might be able to do something about it. Some states have laws that allow you to "repair and deduct" emergency repairs. Meaning if your landlord refuses or doesn't answer you, you can pay to have the problem fixed yourself and then deduct the amount you paid from your rent payment.
https://www.findlaw.com/realestate/landlord-tenant-law/how-does-a-tenant-use-repair-and-deduct.html
Words apparently don't mean things anymore, Merriam Webster added a new definition for "literally" this year
It's much more secure on 'less than trusted' devices and for less than secure people.
Instead of having to type your password in on your friends laptop that may have a keylogger installed, you just type your username in and then do your fingerprint on your phone. That's it; your phone verifies it's you and then transmits the passkey over Bluetooth, so it can't be phished or observed while you type it.
For less than secure people, you don't have to convince them to use a password manager and stop writing their passwords on sticky notes. They just type in their username and do their fingerprint on their phone. It can't be phished so even if someone is remotely controlling a victims computer the damage is limited to allowing access to a single account on that physical computer - they can't take that passkey and use it anywhere else, unlike a password for an email account that's used for online banking as well. They also can't keylogger it and then log in after they're disconnected from the victim.
There's a whole anthology book about this written by a bunch of big and small names, the pdf is free https://machineofdeath.net/ebook