

I love unboxing some new tech, but why an access point specifically?


I love unboxing some new tech, but why an access point specifically?


The cruelty is the point. Just keep repeating that and you’ll understand most of the decisions.


And now I remembered we’ve got over 3 more years of this garbage to fight through.
Based on the ingredients, it sounds like blended in a kinda almost pesto.


Not even close to that third comma, amateur.


Not already fascist enough


They’re likely imitating his posture. It serves the dual purpose of signaling their sycophantic loyalty and normalizes the absurd stance to the rest of the world.
Is that recent? I can’t find anything about it getting cancelled because of content, only ratings. At least that was the official reason given each time. Which episode number is this?


Sounds like it’s time to take to the seas me bucko.
Based on the date, this is like reporting the second one, imo. A third wouldn’t be at all surprising though, the Serial-Killer-in-Chief won’t stop until someone forces him to.


A layered defense is always best. Nothing is 100%, but knowing your threat model will help define how far you have to go and how many layers you want in the way. Defending against State level actors looks different than swatting the constant low effort bot traffic. You’re right, if a bad actor gets root on your machine, all security is forfeit. The goal is to minimize that possibility by keeping applications and packages updated and only allowing necessary connections to the machine. You mentioned wireguard or tail scale. Set that up first. Then set up the host firewall to only allow outbound traffic onto the VPN to the required ports and endpoints on the LAN. If the VPS isn’t hosting any public facing services, disable all traffic except the VPN connection from and to the public Internet both on the cloud provider’s firewall and the host firewall. If it is hosting publicly accessible services then use tools like fail2ban and crowdsec to identify and block problem IPs.


Firewall rules on outbound traffic from the VPS to the LAN would do it. Allow traffic to the hosts and ports that the VPS needs to reach and block everything else.


I’ve seen it explained elsewhere and it makes sense to me. Kidnapping usually implies a person being taken with the intention of negotiating for their release, where disappeared is more often associated with avoidance of giving any substantial information to a party seeking their return.
I tell my kids, never start it, but if someone hits you, hit them back hard enough that they won’t want to do it again. I feel like this works all the way up to state level doctrine.


I feel like you’re wrong here. Moses and Joshua were pretty big into the whole genocide thing. Deuteronomy 20:16 for example is pretty clear about that, among many other examples.
If you want to live vicariously, check out this playlist. A guy did just that and his channel is great.
https://www.youtube.com/playlist?list=PL0HiM4heFTOoxnxAnv_WJJArugTScPBUg


Except for the weapons we sold them, the intel reports we provided, etc, etc.


American here: can we please have measurements by mass not by volume and metric units. It would make repeatability so much easier.
While others are focusing on the legal aspect, which I guess is the question you actually asked, my first thought was bare minimum compliance while gathering evidence. Grab an old phone, wipe it completely, install the app with all new credentials not tied to you in any way, then just leave it running at work. They get their location data, just not anything usable, you get to submit a minimum number of receipts that doesn’t get you in trouble from purchases you would have made anyway, or not because why support scumbag companies. You get to gather more hard evidence of their assholery that way. Never install work apps on your personal phone. If they require something for your job, they should provide the hardware to run it on.
It’s not so much that she’s thinking, it’s that the language that she’s parroting requires training oneself to doublethink to maintain the illusion that the Trump administration is anything but a tool of fascism.