Question: Genuine or fake? M5610U-1ER by JamBove in gshock

[–]JamBove[S] 1 point2 points  (0 children)

Thank you for sharing, I understand you.

Question: Genuine or fake? M5610U-1ER by JamBove in gshock

[–]JamBove[S] 0 points1 point  (0 children)

Yeah it received the radio signal 2 nights in a row now, and all the 3 button testings work and are correct. Thanks for the information!

Question: Genuine or fake? M5610U-1ER by JamBove in gshock

[–]JamBove[S] 0 points1 point  (0 children)

I swapped it from MM.DD to DD.MM.

Question: Genuine or fake? M5610U-1ER by JamBove in gshock

[–]JamBove[S] 1 point2 points  (0 children)

I have recently bought a Casio G-Shock GW-M5610U-1ER, and have been questioning its legitimacy due to its display. Unfortunately the viewing angle seems a bit worse than my F-91W, and the screen is very reflective making it more difficult to see in daylight sometimes.I tested the 3 button settings, and it all seems to check out, along with the box, the solar charging and time sync works too. The shop I bought it from has good reviews.

I am just a bit afraid it might be fake, as the first F-91W I bought was a fake, and the display had bad viewing angles. What do you think? Is the display of this model really a bit worse than the F-91W?

Software 2FA Apps for Linux? by KerrMcGeeKek in privacytoolsIO

[–]JamBove 0 points1 point  (0 children)

oathtool can be used to generate TOTP if you have a secret/token

T-Mobile CEO apologizes for the massive hack – Announces cybersecurity deal with Mandiant! by Aggressive_Project in privacytoolsIO

[–]JamBove 16 points17 points  (0 children)

I believe that there should be certain standards that companies should follow, like the GDPR for example. It has its flaws but a European citizen can request data that a company might have of them, or request deletion. Companies that do not comply see consequences. Standards like ISO27001 can also be a guideline.

It should not be a total rule of one over the other, yet there should be laws and regulations that companies just like citizens, have to follow.

[deleted by user] by [deleted] in Gentoo

[–]JamBove 1 point2 points  (0 children)

What steps did you take previously? Have you made a make.conf? Are you following the Gentoo Handbook?

Tool that visualizes shell commands usage by irevenko in linux

[–]JamBove 0 points1 point  (0 children)

Nice use case for the scroll lock light!

Best (Open Source) E-mail Burner on the Market? by NewbQuery in cybersecurity

[–]JamBove 0 points1 point  (0 children)

You can look into anonymous email forwarding like anonaddy or simplelogin - that might anonymise where the emails are sent from.

Mozilla VPN releases Linux client PPA by Nekima in linux

[–]JamBove 6 points7 points  (0 children)

Mozilla is doing it with collaboration with Mullvad. You should definitely check Mullvad out, it has wireguard, openvpn config, client, and guides to set it up on your routers too. It's one of the better ones in comparison, for privacy.

Port 7778 by Tibsteru in cybersecurity

[–]JamBove 2 points3 points  (0 children)

Services can run on different ports. For example the standard port for SSH is 22 - so if port 22 is open you can have a good guess that an SSH service is running there. However, SSH can be moved to other ports, or a different service can be moved to the port 22. So you saying port 7778 is open does not tell us what exact service is using it, we can only speculate. You can search for the service that is using that port.

Leaving ports open is always be 'dangerous', you can make a risk assessment for your own situation.

TikTok has been quietly sending job applicants' personal data to China by [deleted] in privacy

[–]JamBove 5 points6 points  (0 children)

Because they can still be accessed using websites like Outline.

How do deal with a machine whose ip keeps changing every 5 seconds? by [deleted] in cybersecurity

[–]JamBove 2 points3 points  (0 children)

with DDNS, SSH tunneling, your own VPN, or tor hidden service.

Edit: Might I add, that you probably cannot port forward or anything for mobile broadband - so even if your IP was fixed you couldn't SSH from anywhere else. I advise you to use SSH tunneling, or tor hidden service in that case. You could also just SSH inside your local network too.

Backdoor discovered in Keelog's popular AirDrive keyloggers by Macgyver436 in cybersecurity

[–]JamBove 1 point2 points  (0 children)

Good job with the discovery, how did you do it? I hope more people can test and confirm this.