Just get some raspberry pi camera.
What to do about IR vision though?
Disclaimer: I don’t represent KDE in any interaction with this account. I am just freeloading off of the kde.social server.
Just get some raspberry pi camera.
What to do about IR vision though?
I feel like we can do the same in other places too.
It just doesn’t make much sense for me to buy one of those, considering I don’t expect to be using a copper endpoint anywhere else I go.
I probably will get my own Fiber modem when viable (as in, I get a provider that doesn’t force their own modem on me).
The major Fibre player here, requires use of their modem, of which, even the WiFi password can only be changed using their Android app. Said app connects to the internet and most probably tells their systems the new password to change to (which would of course, be in plain text), which then remotely changes the WiFi password.
Most probably, other major ones do the same.
There are some smaller players (probably Tier2/3 ISPs), which would let us have our own modems after enough effort, so I’d probably go with one of those.
The malware argument is a bit weak
It’s much more than just a bit weak, unless you are somehow continuously monitoring it, so yeah, in most end-user scenarios, it would hardly make a difference to keep it on, even if there were no updates.
Not illegal, but the ISPs are seemingly under no obligation to give you those details. In Germany, there’s the “freedom of routers” embedded in the telco law. So they HAVE to give you everything you need to get your custom router online via their wire/fibre.
OIC, so, same as here. Germany seems to be having pretty well made laws in these cases.
Bridge mode is just using the ISPs router and bridge that into your router. It’s not the same - you still need the ISP’s access device instead of just yours.
Except that it is a layer 2 bridge and I couldn’t connect to the network directly, either way, because their line is copper [1] and consumer routers/modems are usually RJ45/RJ11.
Mine is pretty expensive too (at least for me, it is). I just make sure not to fly without a rebuy.
Sorry. I’m addicted to knowledge. I need to know.
you’re not supposed to get this kind of information from your ISP
Wait, do you mean, it’s illegal to ask for it?
In my case, it just depends upon the ISP’s policy.
In fact, with the current ISP, even though they provide their on modem (copper line), it has a pure bridge mode available, which I can connect to my other router and have fun looking at those packets with full transparency and the tech even went ahead and explained to me what I messed up, before resetting the modem for me, when I did use the bridge mode.
Read the title and went: What? They want you to keep your network hardware ON, when unattended, to increase the undetected malware entry opportunities?
Turns out it as their own devices they wanted to push updates to.
I would really prefer to use my own device though and even better, configure it myself after learning how the ISP’s network works. But convenience is what it is.
I’ll probably get one, once enough of its vulnerabilities are discovered and post-mitigation benchmarks are released.
And once I have enough money.
plugin/extension
that seems like the way to go for this
I hear what I say and it feels unpleasant.
Also, I don’t like adding senseless* words in my speech.
* Unless it’s funny or sth.
I see. When using X11, I was using xinput
to set MMB scrolling, but at that time, it had the problem of activating the MMB paste function, if I didn’t click and hold properly.
Over time, my habits changed and I kinda stopped using it. But maybe I’ll try again once it comes in Plasma 6.2 (it’s actually in beta rn)
P.S. I’m guessing OP doesn’t actually have a CA and is just using simple self signed certificates without any private CA that has signed them.
You’re right. I’m talking about making a certificate using gpg
and storing it on your system. Then adding it to the root CA list and signing all your Local SSH stuff with it.
Room service now!! or kiss your data goodbye
Even better. If you are programming all networking H/W yourself, you can even ignore address conventions and reserved addresses.
vacuum cleaners
Why would someone bring their own vacuum cleaner in a hotel room?
My router doesn’t have an HTTPS control page.
Sometimes frustrating.
I’m a keyboard guy.
Also, I intend on using the same nKRO keyboard for Elite Dangerous, X4, Nanotale and other games.
It’s not very frequently, that I notice a ghosting problem, but over time, it has become bad enough for me to want one.
I actually bought one, recently. ANT Esports, Mechanical, 24 KRO with anti-ghosting. Took about an hour to realise, it was false advertising.
Even normal key combinations, which worked on a cheap Dell 100, didn’t work on this.
So, waiting to get a good one.
For the certificate errors, just add a root CA of your own making.
Disabling auto-https, no idea. Maybe fix the source?
That would be pretty useful.
I’m still looking for how I might manage to use my old phone’s camera anyway. Seems like a waste of good engineering to keep the pinout and protocol closed.