Living 20 minutes into the future. Eccentric weirdo. Virtual Adept. Time traveler. Thelemite. Technomage. Hacker on main. APT 3319. Not human. 30% software and implants. H+ - 0.4 on the Berram-7 scale. Furry adjacent. Pan/poly. Burnout.
I try to post as sincerely as possible.
They said straight up, “I googled you and couldn’t find a Twitter or Facebook account. What are you hiding?” I had to teach them who Armand Jean du Plessis was.
Opting out of social media these days is considered inherently suspicious. It definitely came up the last time I had to undergo a background check for work.
There are two models I’ve used for this over the years, the Linksys EA8300 and the WRT 1900AC. Here’s how I did it both times (though I only got around to writing up my notes the second time.
Just defining the threat model of hardware addressing, as it stands.
I don’t agree with them sending more than the first half either.
Not that the local DHCP servers falling over has anything to do with it…
A MAC address isn’t really unique. Each has six octets, of which three refer to the manufacturer. The other three octets have at most 16,777,216 possible values. That seems like a lot but it really isn’t; a MAC is supposed to be unique on a LAN, not globally. Rollovers during manufacturing happen, and collisions are rare but happen once in a while.
What do you mean, custom firmware? Are you trying to boot a different distro of Linux?
When you have the USB drive plugged in, how are you booting up? What’s the process you’re using?
The first three octets of a MAC specify the manufacturer of a NIC chipset. That could come in handy for driver debugging.
Manufacturers and firmware versions of storage devices? You can make the argument; perhaps it would have helped figure out the SSD firmware bugs years ago.
But stuff like whether or not you have video capture card or your current system temperature stats? Nah… that’s getting into “identifiable information as toxic waste” territory.
I think I still have a copy of that book in a box somewhere. I know I have a scanned copy in my archive. Lots of fun.
They sure make the task of keeping an eye on the chuds easier. Their OPSEC eats donkey ass.
Why would they hide anymore? They figure they won. No sense in not taking advantage of everything that implies.
This is a thing that folks have done in the past:
The Great Game continues, same as it always has.
You can have them installed next to one another. Just like you can have Firefox and Links installed at the same time. Or twm and gnome3. It comes down to how much work you want for yourself.
If only for the sake of one’s CV. Making your bones by having a couple of 0-days under your belt helps a lot of folks find jobs these days.
It is. That’s why Wayland is being pushed so hard, it’s a codebase that’s actually maintainable, with hopefully some more modern design and engineering principles.
You can install more than one desktop environment at a time. Your login manager should let you pick which one you want to log into.
I’m running MATE on my laptop. It gives me what I need (a task bar, space for some instrumentation, the usual desktop functionality, a way to start applications) and nothing that I don’t care about (wobbling windows, compiz, stuff like that). My DE is a tool; I use tools that don’t get in my way because I have work to do.
I might give COSMIC a try in a few months, I haven’t decided yet.
'till all are one. o7