• 0 Posts
  • 19 Comments
Joined 1 year ago
cake
Cake day: August 19th, 2023

help-circle
  • Someone made a mistake here. It’s not getting your IP address. An IP address is assigned by the gateway when you’re connected to an access point. An IP address is not an identity. They are always changing and can be shared. This has already been tested and upheld in court.

    It’s actually collecting your MAC address. Which is exchanged when your phone or tablet scan nearby WiFi points or Bluetooth devices. However, this can already be defeated. By default iOS and Android both have the option to randomise the MAC address in intervals. Making it extremely difficult to prove anything. This feature exists because the devices real MAC address never changes. It is unique. Alternatively, users can disable WiFi and Bluetooth scanning entirely. However, your device no longer participates in the Find My Devices program by Apple and Google, location does take longer to acquire in some scenarios, and accuracy may take longer to triangulate.



  • From their own privacy policy they outline what they do:

    For research and development purposes, we may use datasets such as those that contain images, voices or other data that could be associated with an identifiable person.

    To provide location-based services on Apple products, Apple and our partners and licensees, such as maps data providers, may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device.

    Apple’s websites, online services, interactive applications, email messages, and advertisements may use “cookies” and other technologies such as pixel tags and web beacons.

    We also use personal information to help us create, develop, operate, deliver, and improve our products, services, content and advertising

    At times Apple may provide third parties with certain personal information to provide or improve our products and services, including to deliver products at your request, or to help Apple market to consumers.

    Apple may collect location, IP Address, network information, Bluetooth information, connected devices, accessories, personal demographics, browsing history, browser fingerprint, device fingerprint, search history, app data, usage data, performance, diagnostics, product interaction, transaction information, payment information, purchasing records, contacts, social graph, watch history, listening interests, reading list, call metadata, device information, messaging metadata, email addresses, salary, income, assets, health data, ad interaction, in-app purchases, in-app subscriptions, app downloads, music downloads, movie downloads, TV show downloads, Apple ID, IDFA, Random Unique ID, UUID, IMEI, Hardware serial number, SIM serial number, phone number, telemetry, cookies, Nearby WiFi MAC, Siri request history, Web sign-in, songs played, play and pause times, playlists, engagement and library.

    Literally all of this is what Google does. The only thing Apple does differently is hinder 3rd party apps to a greater degree, whereas Google is more permissive. But to be fair, Google has been improving the Privacy features of Android with each version.

    https://tosdr.org/en/service/158




  • so much for track day, I guess?

    Stuff like this is likely planned in advance with sports and super cars. Since this technology has existed for a while. Assuming you visit a recognized track, wherever it may be, the limiter simply turns off. For example, the 2009 and later Nissan GTR is sold in Japan with a 112 MPH artificial limiter in the software. The limit is there by law. GPS / Sat Nav is standard on this car. If you visit say, Fuji or Laguna Seca, the car knows where it is and turns the limiter off. Allowing you to achieve the ~200 MPH top speed. Examples sold for other markets such as US and EU need not worry. The redline in 6th gear is your physical limiter.

    On a slightly related note, clever people have figured out ways around limiters. Such as tricking the GPS or modifying the ECU. Unfortunately, these days it gets harder to do this as manufacturers like Mercedes, BMW, VW, and a few others, are encrypting the communication network physically located in the car. It’s not the traditional low and high speed CAN Bus. FlexRay is becoming more commonplace unfortunately.








  • Apps that are considered “bloat” are of course installed to the system partition. Which is something you don’t have access to. The link to the app is created for your user account during device setup. It’s still available to the system. Without root access they’re not permanently removed. Removing them from your user means they don’t run. If there is an OS update that updates apps for feature or security reasons, they have the potential to come back. You must remove them again. It does actually save battery once they’re removed. You can verify this by using debug tools to look at all running services. You also don’t need this app to remove bloat. It just makes it easier for those who don’t want to use ADB command line.

    A majority of apps won’t ruin your stability if removed. The only app I know I can’t remove is My Verizon Services. If I do, I lose certain functionality. If you’re unsure, look up what each app does.


  • You’re a bit confused.

    • Sleep keeps the system on but in a low power state. User and kernel sessions are kept in RAM. If power is lost, you start from a clean session. The system can resume full power with a key press or mouse movement.
    • Hibernate dumps the user and kernel session from RAM to disk and completely powers off. Upon startup, the hiberfil.sys file is read and put back into RAM. The physical power button must be pressed to turn on.
    • Hybrid Shutdown uses a feature called Fast Startup. The user session is discarded, while the kernel session is written to disk before the system completely powers off. Upon startup, the hiberfil.sys file is read and puts the kernel session back into RAM. The last logged on user has their profile preloaded, including any apps that support the feature. The physical power button must be pressed to turn on.

    You can disable Fast Startup or simply hold SHIFT and click Shutdown. The feature requires the user to press the Shutdown button within Windows for it to function. If you press the physical power button on your case, that is an ACPI initiated shutdown and bypasses the Fast Startup feature. This is by design.

    Your motherboard firmware controls whether or not the USB ports will continue to supply power when the system is off. It’s essentially like a wall brick at this point.

    Fast Startup was really meant for HDD. With SSD it’s not really necessary. It’s negligible time savings and with how buggy drivers can be, days or weeks old kernel sessions are bound to start causing problems.






  • Once you agree to letting friends and family access your hosted services, you become the tech support for any problems. Whether that be your fault, user error, etc. You should absolutely limit who you give access to. In my case, only three people can and that’s immediate family. No friends, no extended family. I don’t wanna deal with all that mess when I deal with it at work. Don’t over extend yourself by being nice.

    Using Cloudflare is against the ToS when used for services like Jellyfin. Your account can be limited, closed, or find yourself getting a several hundred dollar bill for data usage because you’ve breached the terms of service. Additionally, streaming content on free accounts incurs higher latency which I’ve confirmed myself Argo smart routing massively reduces. https://github.com/jellyfin/jellyfin/issues/9295 - Don’t abuse what’s free or you may lose it.

    Google shouldn’t be indexing your domains anyway. If it’s flagged your domain, it’s been indexed and scanned. Alternatively, it could indicate you have a weak point somewhere on your server and you’ve been breached. Google’s scan picked up whatever it was. Though I doubt this is the case and just a false positive. Double check your robots.txt files and disallow everything. Most index bots respect this. You can use a community sourced bot blocker. https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker

    I’ve been running my own self hosted services for almost a decade. Though I have a background in IT directly doing this kind of stuff daily at work. As long as you have a strong firewall, modern TLS, relevant security headers, automatic tools like fail2ban, and have a strong grasp on permissions, you should be fine. Before I moved everything to non-root docker, it was given its own service user and SELinux policy. Using direct DNS isn’t so much of a problem. You shouldn’t have any issues. Feel free to reach out if you have any questions.