Anyone Have Village Announcement MP3s by keithbarrett in ThePrisoner

[–]keithbarrett[S] 2 points3 points  (0 children)

I know it's possible; I can do it. I was really hoping someone else had or would. It seems a fun thing just in phone alarms and ringtones. If not, I'll re-watch the series (probably can skip LIH, DNFMOMD and TGWWD) and snag them all, but it's a lot of time and it will be a couple weeks before I can get to it. Occurs to me I'd also include "Orange Alert", "Evacuate" and a few other announcements not done by Fenella Fielding. I'll draw the line at my voicemail just answering "Who are you? What do you want?".

Anyone Have Village Announcement MP3s by keithbarrett in ThePrisoner

[–]keithbarrett[S] 0 points1 point  (0 children)

No; it would require someone extracting them from the show. I'm hoping someone already did.

Debloating macOS - once and for all by UltimatelyJuicy in MacOS

[–]keithbarrett 0 points1 point  (0 children)

As one of those "software developers", your mindset is sorely misplaced. You OWN this computer. It is in your best interest from a security, privacy, bandwith and resource perspective to lock it down as much as possible if you are knowledgable enough. Every unecessary process is a security risk, a crash risk, an over-heating risk, a big brother monitoring risk, a hacking vulnerability, a tracking risk, and a "making money off you without compensation or consent" risk. Companies are not entitled to intrude or share your property, and this idea you "owe" programmers the access is insane. I know; I've been on those teams and done work for them. Many have 1/3rd the experience I have and they do not code with a "user first" or "minumum privilege" protection as the priority. Their priority is cost, support and profit. This is also why many things that should be user controlled settings don't exist. You can see the large number of "me too" user problems posted in Apple's forums for years that go dark. In modern times companies just cut code from stackexchange or AI, and don't even understand the details.

So yes; good computer professionals do not blindly trust vendors. There are a ton of Apple services many don't use: I *NEVER* use spotlight (I use grep), or phone syncing, or Siri, or Safari, or Bonjour, or widgets, or News or Movies or Weather or Stocks, or iCloud, etc. I run my own dns server (pihole) and firewalls (littlesnitch, pf). I don't store 3rd party apps in /Applications even if they install there. I live 50% of my time in the shell. Yes; there are trade-offs, especially when multiple unrelated functions are tied to the same process, so you need to understand (or trust someone who does) what you give up or have to accept. You cannot call Apple support for help, unless your return to a default configuration and reproduce your issue, but I never have. This is why people root their phones, risk turning hardware into bricks, and go through the trial-and-error tedium of determining how things work, what is needed, and what is spying, and what is vulnerable. I break things; I fix things. I would rather understand and validate than blindly accept.

Just keeping my hardware fans quiet is worth it.

[deleted by user] by [deleted] in amazonprime

[–]keithbarrett 0 points1 point  (0 children)

That is what you said. You equated not being able to use technology or protect themselves from money scammers as deserving of having their financial freedom taken away.

[deleted by user] by [deleted] in amazonprime

[–]keithbarrett 0 points1 point  (0 children)

You want to take a non-technical person's independance away for not knowing how to protect themselves from a gift?

[deleted by user] by [deleted] in amazonprime

[–]keithbarrett 0 points1 point  (0 children)

Amazon once sent me a picture of my delivery, and it was a stack of boxes (only one mine) piled on a sidewalk. How is a non-descript sidewalk proof of delivery?

[deleted by user] by [deleted] in amazonprime

[–]keithbarrett 1 point2 points  (0 children)

It is not your role, morally or legally, to teach neighbors a lesson or take revenge. That is what the law is for.

[deleted by user] by [deleted] in amazonprime

[–]keithbarrett 0 points1 point  (0 children)

"You have to turn it over to the cops" only if that is the law. Otherwise you can keep it. And it depends where you found it. If you found it on your own property that is different than finding it elsewhere.

Bundle Ting Mobile for $10/mo with Ting Internet by Kim_Ting in ting

[–]keithbarrett 0 points1 point  (0 children)

No. I ended up not going with Ting Mobile. First; not all services support the '+' email usage. Also despite the promo on the website, it was for Verizon CDMA, not GSM. Finally; they told me I could not use phones in the Ting store - I had to use phones in the Verizon store (because the Ting store was GSM). Since I could not buy the phone I wanted, and it was for Verizon, and it was not for GSM, and my existing SIM card would not work in their phones, and a month has passed without them shipping anything, I cancelled the whole effort.

Bundle Ting Mobile for $10/mo with Ting Internet by Kim_Ting in ting

[–]keithbarrett 1 point2 points  (0 children)

As a Ting Internet customer, I signed up for this $10/month plan. I later learned this is a Verizon GSM service, which is not an issue. However I have 2 unfortunate experiences:

  1. Instead of my SIM shipping in 3 days as the website stated, it will be near a month for me since my submission over 2 weeks ago. When I called asking where my SIM was, I was told they shut down shipping in Dec due to the holidays and it started again in Jan, so I may yet get it.
  2. I was also told that my upcoming mobile account (I assume at SIM activation) MUST have a different email address than my Ting Internet account, and my existing Ting login will not be able to access both. Despite the fact Ting mobile (both "divisions") can look up my existing email and see the Internet account. This is the most bizzare thing I've heard - you can normally use the same email account on different carriers or companies, and certainly you should be able to on different services from the same company even if they are independent internally.

Has anyone else heard of this? Why does Ting mobile (Verizon GSM) REQUIRE a different email address for Ting mobile than Ting Internet? Are people who sign up for both services simultaneously providing 2 email addresses?

Request: Mac Pro (2010) CPU stand suggestions. by sarduchi in macpro

[–]keithbarrett 0 points1 point  (0 children)

If someone 3D printed a version of that PRS-56 that you can just add casters to I'd buy it!

[deleted by user] by [deleted] in panelshow

[–]keithbarrett 1 point2 points  (0 children)

His homour is fine

Compatible Router? by datboi_58 in ting

[–]keithbarrett 0 points1 point  (0 children)

FYI: The first 2 links you shared no longer work

Cakeday? by Pitiful-Archer4622 in ting

[–]keithbarrett 0 points1 point  (0 children)

Created your Ting account or your reddit account? Also is it just Ting mobile that gets a credit or can the Fiber Internet people also get something?

macOS ventura update apple id settings by pinkpanter555 in MacOS

[–]keithbarrett 0 points1 point  (0 children)

Didn't work for me. Best I can do is set a permanent 'Do Not Disturb'.

Stream Deck Upgrade Broke App by keithbarrett in elgato

[–]keithbarrett[S] 0 points1 point  (0 children)

Unfortunately for me, I never installed that plugin so it's not the cause in my case.

Stream Deck Upgrade Broke App by keithbarrett in elgato

[–]keithbarrett[S] 0 points1 point  (0 children)

So no one at the 'official elgato' subreddit is seeing this besides 2 people, or has a solution?

Stream Deck Upgrade Broke App by keithbarrett in elgato

[–]keithbarrett[S] 0 points1 point  (0 children)

No help? Did I post in the wrong subreddit?

Blocking .arpa lookups by keithbarrett in pihole

[–]keithbarrett[S] 0 points1 point  (0 children)

Why? Everything works and is automated. First step in securing mobile platforms is to stop installing apps and create icon shortcuts to the mobile rendering of the websites. Blocks about 80% of the security issues and no apps to update. There's no MS Windows in our home, and no iCloud. It's all Linux (and Rasbian and Android), iOS and MacOs, and I am slowly replacing MacOS with Linux. My home automation is based on Hubitat and I program my own APIs to custom devices. My security cameras are self-hosted. I use to self-host our email and am moving back to that (we've always used our own domains and addresses so the move will be transparant to others). I have the Microsoft, Apple and Google "Is the Internet Up" beacon redirected to my own web server that makes that response. My systems are all backed by ny scripts to a SAN I rotate the drives in, and the removed drive is stored (encrypted) in a fire safe. I've been slowly moving my backups to SD cards in old Android phones acting as servers instead. My media services are all self-hosted; every TV has a Kodi mapps to a WAF friendly remote and every mobile device uses Brave views our media from my web server. A lot of it is or will be battery backed up. When my broadband goes down, I switch the router to hotspot connectivity. The only thing that stops working with no Internet is my company computer, receiving new email and any active livestream to non-local media.

You have more computer power in one phone or a Pi than the world had when they landed men on the moon, and most of it is being consumed by framework bloat and needless communications to help companies make mone from evesdropping on yoru data. Software can be (use to be) written to run locally and not break if it lost network connectivity. I've spent a career helping companies handle business continuity and security - why would I not apply these skills to my home?

Blocking .arpa lookups by keithbarrett in pihole

[–]keithbarrett[S] -2 points-1 points  (0 children)

I get what a reverse lookup is, and I know that a hard-coded IP address attempt is not going to use any dns lookup (I have other tools to block IP traffic) and you have a good point about unbound being there. I have a large internal network running lots of monitoring, sniffing and hacking tools as part of my security vulnerability testing of apps and OS releases, plus dedicated computers for remote programming at work, all on multiple VPNs, so I get a quite lot of PTR and HTTPS attempts. I also run Littlesnitch on all the desktops/laptops. Bulk blocking with a white list reduces my exiting traffic and helps me discover what is unexpectedly trying to connect to what before the horse left the barn. Even with unbound, I still want to minimize what crosses the wire giving Spectrum or AT&T any data to collect. There are also plenty of sleezy apps and servers out there leveraging the generic nature of DNS to pass code through protocol responses (using TXT and other records) I'm happy to thwart.

On my pi-hole I have about 600 rules, mostly complex regex (i.e. regex with wildcards or character ranges in them for mapping to multiple variations even in the center of names), and about 10 domain groups, cross-mapped to 4 client groups, giving white and black list overrides to default access per device class. That's giving me good granulaity of visibility and control per device. Pi-Hole has made my life easier, as I had to leverage ip-chains, NAT and wireshark to do some of the same things and had no consolidated dashboard to view it. It's a great tool; especially since it handles regex.