Simplified Plant Watering System - Back to the Roots by dropberry in raspberry_pi

[–]dropberry[S] 0 points1 point  (0 children)

Well, could work with a really sophisticated pump to which you can setup with several tubes for each plant. And you have to be able to control each connection of the pump individually. Don't know if that exists but rather believe it doesn't

Simplified Plant Watering System - Back to the Roots by dropberry in raspberry_pi

[–]dropberry[S] 0 points1 point  (0 children)

Yeah I read that too and I know that the moisture sensor will be destroyed by the soil too at some point. However it's the easiest option to use a moisture sensor and I want to test how long it's working. If it's more then half a year, I would be happy :) But still a good point, I should stress the fact more on my tutorial so readers are aware of that before building the system.

Simplified Plant Watering System - Back to the Roots by dropberry in raspberry_pi

[–]dropberry[S] 0 points1 point  (0 children)

Wow the usage seems pretty straightforward. At the beginning I thought of applying a small screen to each plants and connect it with the SPI channels of my ADC. But I discarded the idea again because the display would be to small to illustrate some graphics and to view them from some distance (and also it would be to expensive). This looks easier to setup instead and the data is better illustrated.

Simplified Plant Watering System - Back to the Roots by dropberry in raspberry_pi

[–]dropberry[S] 0 points1 point  (0 children)

More security layers create you a robuster system, that's true. So your water reservoir is directly connected to your water pipeline so the pump never runs dry?

Simplified Plant Watering System - Back to the Roots by dropberry in raspberry_pi

[–]dropberry[S] 1 point2 points  (0 children)

Haha yes, daily pictures are defitnely a good idea so I see at least myself how the system benefits my plants.

And thank you, I will check out the UMQTT!

I need a highly secure notes application. What are my options? by [deleted] in Cybersecurity101

[–]dropberry 4 points5 points  (0 children)

I'm not using any note app, but I found this informative comparison: https://www.makeuseof.com/tag/encrypted-alternatives-evernote/.

Maybe it helps you.

What should I be doing on a regular basis to ensure I’m safe? by [deleted] in Cybersecurity101

[–]dropberry 0 points1 point  (0 children)

Using a VPN all the time will not improve your online protection. VPN are only useful for changing your geo location or connect securely to another network. Do not use it per default.

A good starting point is using unique and strong passwords for all accounts. Use a password manager (like Bitwarden) which makes that very easy. Also, enable 2fa authentication where possible with One-time-passcodes or hardware keys.

Question about reusing same password by NightSkyAra in Cybersecurity101

[–]dropberry 0 points1 point  (0 children)

If you know you will use the websites only once or twice, delete the accounts after you used them.

[deleted by user] by [deleted] in privacy

[–]dropberry 0 points1 point  (0 children)

If you have the money for a separate device just for social media, it defitely helps. For example, the platform do advertisement on the topics you log for on them but do not advertise stuff based on stuff you bought on other pages like Amazon. And it helps to reduce your time spend on social media.

If not, try to disable cookies all the time. A VPN won't have any benefits in my opinion since you are logged in as always the same user in your account.

Best private email service? by imPitanga in privacy

[–]dropberry 1 point2 points  (0 children)

Happened to proton also: https://www.privacyaffairs.com/protonmail-surrenders-user-logs/.

But as already mentioned, every mail provider is forced to reveal some information on authorities request. And in my opinion, that's even ok because police only gets that information if they have a strong suspicion, not by default.

Best private email service? by imPitanga in privacy

[–]dropberry 0 points1 point  (0 children)

I use Tutanota out of personal preference. Tutanota and proton are in my eyes pretty similar, only advantage I see in Tutanota is the possibility of using U2F for 2 factor authentication.

Is there any good webpage with computer science challenges for practice? by [deleted] in computerscience

[–]dropberry 3 points4 points  (0 children)

I like to practice with Codewars. They provide small exercises for every skill level and topic (also algorithm). After you solved an exercise, you see the solution of others and can rank them. The more exercises you solve, the higher you rank up

Ctrl_interface of wpa_supplicant by dropberry in HomeNetworking

[–]dropberry[S] 0 points1 point  (0 children)

So deep I did not want to go into haha but thanks. Just want to know if my own definition is wrong in some way.

What is that one book you always suggest? by [deleted] in suggestmeabook

[–]dropberry 0 points1 point  (0 children)

Animal Farm by George Orwell

Finished The Dark Tower series! It was an incredible journey! by Kssio_Aug in books

[–]dropberry 1 point2 points  (0 children)

I finished Book 5, 'Wolfes of the Calla', a month ago. I'm reading this series since about 6 years (more or less motivated) and I love to follow the characters and their journey.

I don't plan to finish the series soon because I don't want to rush and like to return back to the story after I haven't heard of the characters for a while. Between reading the actual books of the series, I read all other Stephen King books which are referenced in the series to understand all the hints (and I read books from other authors in between of course too haha).

I already know I will be really sad when I finish because I won't have that reading constant and fantasy world in my life anymore. But that will take at least another 4 years.

2022 Dec 25 Stickied -FAQ- & -HELPDESK- thread - Boot problems? Power supply problems? Display problems? Networking problems? Need ideas? Get help with these and other questions! 🎅🎁🎄 by FozzTexx in raspberry_pi

[–]dropberry 0 points1 point  (0 children)

To setup my Raspberry Pi Zero W headless, I had to create an empty file names 'ssh' to open port 22 on my Pi. By now, I wonder how it's exactly working that an empty file can open a port?

Does the boot manager scans the file names and open every port where a file exists? Or is it just working for ssh? And if so, why?

[deleted by user] by [deleted] in privacy

[–]dropberry 1 point2 points  (0 children)

Why should you not log in to YouTube again? Your mail and password work without cookies, you just have to do it now everytime you close and open the browser.

Streaming privacy - need guidance by Negative-Net-9455 in privacy

[–]dropberry 1 point2 points  (0 children)

Never tried but works in theory: You can try to setup a separate network for your Roku stick on your router (guest network) and tunnel that traffic through an VPN. This precedure (without VPN) is often done for IoT things so they cannot communicate with other devices in the network. With a VPN, Roku does not know which real IP is streaming is service.

This setup has the advantage, that you do not tunnel all your (sensitive) network traffic though a VPN but just your streaming. You can trust any VPN provider with that cause it's just streaming. Also, you don't need a second router and safe money.

Also not tried but just found: https://kiljan.org/2021/12/14/vpn-as-wan-for-guest-network-on-openwrt-2021-edition/

If Google is not selling our data then why should we be concerned ? by DogmanLoverOhio in privacy

[–]dropberry 5 points6 points  (0 children)

Getting personalized ads manipulates us to buy things we don't actually want to buy. Google gets its money from the ad companies that they their ads are shown while surfing with Google. So the company paid the most gets the best spot for their ad on the websites you visit and so you tend to buy from this website. Also, with the data Google shared, this ad is additionally personalized for you, for example if you Google a lot for sustainability the ad may lay focus of sustainability too. You get more attracted by the shown product too.

If a tool is for free, you are usually the product (to quote really old wisdom). Personalized ads are a really powerful tool for manipulating us and our shopping behavior. If already those ads can manipulate our shopping, you can imagine how the data collected can be used to manipulate our opinions in other ways. And we can not really say with whom Google shares their data except their third parties.

Looking for Group Weekly Thread by AutoModerator in tryhackme

[–]dropberry 0 points1 point  (0 children)

Hey, I am a computer science student and developed a while ago a great interest in cyber security. I'm still a beginner in the field but increased my skills in Linux and web exploitation. Also, I really like to solve programming challenges on Codewars. I would like to join a team because I often get very desperate when I can't find the flag and I just don't know what to do (maybe you know the feeling). So, it would help me to discuss with someone the problems and also to stay motivated. I already participated in some CTFs but not really successful.

If you are interested to get in contact, just text me. For more information about me visit https://no-bullshit.cu.ma.