

Only if they monetise the hell out of it and sell people’s data.
Only if they monetise the hell out of it and sell people’s data.
I’m not sure, but with routers, I think OpenWRT installs/flashes at the firmware level. There could be hardware level vulnerabilities I suppose.
In the case of Lenovo laptops used in Iraq (2004), China had additional hardware chips snooping and sending data back via Ethernet cable.
Running OpenWRT is generally a good idea. I’m not gonna lie and say it’s easy to setup. But it’s worth it.
15 years to flex as a Discord mod. 😂
If you’re using a drawing tablet, Krita is free.
It’s okay. I’m using Krita. $0
Ah okay. I saw it on Steam listed as just MS Flight Simulator. Assumed it was the latest one.
I read the download size is like 150GB. That’s why I didn’t buy it on sale.
Use different email address, new account, VPN active, uBlock Origin. https://medium.com/@viralboost/how-to-evade-and-prevent-a-reddit-ban-october-2022-7708bcaf366
I just wanted a distro built to my specs, up to date, uses pacman, not run by a for-profit company, with good documentation. The hype is mostly Reddit elitism and gatekeeping. I like that nobody has slipped branding and extra bookmarks into my browser.
There was more than one incident. There’s a whole list of incidents.
In the case of the soldiers in Iraq, China had installed an independent chip specifically for keylogging. I don’t know if replacing the boot loader would even solve that.
They had a Chinese back door in the firmware. Don’t know if that’s still the case. https://www.techworm.net/2015/08/lenovo-pcs-and-laptops-seem-to-have-a-bios-level-backdoor.html They’ve had several major (intentional) security flaws over the years. https://en.m.wikipedia.org/wiki/Lenovo They had a modified UEFI that allows insecure execution of EXEs. The Lenovo laptops given to US military in Iraq had keyloggers that sent all inputs back to China.
LibreSUSE 😎
HTTPS would prevent advert injection, assuming you didn’t accept a bad certificate at any point. But if they control your router and infrastructure, they can still redirect you to other pages however they want.
Some software check for updates without requiring the packages to be signed. The ISP could do a HTTP redirect to a fake torrent client update. The program says “Update available”. It downloads a malicious version.
Other ISPs have been caught injecting adverts into their traffic. So there’s ways.
I guess they’re using browser fingerprints beyond cookies, such as WebGL to ID your hardware. Firefox on Strict with uBlockOrigin would probably prevent them IDing you. I doubt your IP factors in much because many people share IPs and it automatically rotates once in a while anyway.
The selling point is that our product gives you AIDS, for free!