What is the threat szenario?
If you are smart about parallelization and have access to custom hardware, couldn’t you turn 5 days into 1 hour or less?
Keyoxide: aspe:keyoxide.org:KI5WYVI3WGWSIGMOKOOOGF4JAE (think PGP key but modern and easier to use)
What is the threat szenario?
If you are smart about parallelization and have access to custom hardware, couldn’t you turn 5 days into 1 hour or less?
Syncthing is excellent for phone sync.
What I did was have it running on a system in the network of the nas, mount the nas on that system, and place the backups folder in the nas.
If you have a system that reliably runs, or can get syncthing running on the nas, I recommend doing that.
Synology has docker iirc, there aught to be a syncthing container.
Else, slapping a pi zero into the nas’ network should do the trick and be fully independent of what the nas is.
Firefox+PlasmaWayland+SystemD+portage+GNU+Linux
The problem is “indistinguishable” levers.
In the strict sense, if there was a lever you could see first, they would not be indistinguishable. They should not be distinguishable by any property including location
Noone noticed because noone reads the articles.
We really need an autodr bot that justs pastes the text verbatim like:
This is the best copy I could come up with:
[…]
The original article contains 568 words, the copy also contains 568 words. Saved 0%. I’m a bot and I’m open source!
Actually should I mark it nfsw?
Enabled async saves and it’s a gamechanger.
Is everyone getting the stutter when the save starts?
That would be a fail of the fingerprinting protection. A properly set up TOR browser for example should not allow that detection by any means. If you know how to detect it, please report it as a critical vulnerability.
I could think of maybe some edge case behavior in webrenderer or js cavas etc., which would mainly expose info on the specific browser and underlying hardware, but that is all of course blocked of or fixed in hardened browsers.
Further, if you have a reliable method, you could sell it off to for example Netflix, who are trying to block higher resolutions for Linux browsers but are currently foiled by changing the useragent (if you have widevine set up).
That can’t have been the reason, rather the fact it could tell.
Your browser sends information about its version and the os in the useragent string. It is supposed to lie and say it is a very commonly used useragent, specifically for purposes of fingerprinting. That would be windows, default configuration, firefox version something not you firefox version
Sample animated transparent webp:
https://xkcd.com/1683/