• 1 Post
  • 92 Comments
Joined 3 years ago
cake
Cake day: September 30th, 2023

help-circle
  • I just run on two mini PCs.

    One running OPNsense, fanless N5105, 4x 2.5Gb, it doesn’t need much disk or memory but at the time it was a negligible additional cost to go to 16GB and 500GB.

    The other is running Proxmox, on a Ryzen 7 7840HS, 96GB RAM, 500GB SSD, and with two 5TB USB HDDs plugged in (rotated with a third that I keep at a friend’s place as a cheap but fit for purpose offsite backup).

    It’s just them plus a managed 2.5Gb switch and a couple of wifi routers in AP-only mode. It costs very little to run power-wise and is more than enough grunt for my needs.





  • I was forced to bin my original C64, tape deck, disk drive, joysticks, a couple of printers (one was a daisy wheel lol), many many games and apps and my own projects etc. It still saddens me thinking about it.

    These stories rub a bit of salt in the wound but it’s pretty cool that there’s still interest in them. They were a fantastic thing - easy to use for the basics, powerful enough that once you moved past those basics (and BASIC itself) it still had plenty to offer. And crucially, in a modern context, it’s not so advanced that it leaves nothing for you to do - you still need to figure things out for yourself, and there’s a lot of satisfaction in figuring out a hack to make it do something. So good.

    I’m tempted to get one but that’s a rabbit hole I’m not sure I have the time for these days!



  • I’m not an expert but have worked in these kinds of environments on and off over the years.

    It’s hard to offer broad advice as every encounter is different. Your workplace might offer training though to give you some tools, which will likely also teach you the things not to say (eg promising a result, stoking the fire, preaching, etc).

    Calming someone down isn’t always the goal either, sometimes people just need to process difficult information or grieve for the loss of a loved one. All you can do in this situation is to offer a safe place to do that, and maybe a sympathetic ear if they need to talk, and perhaps to validate their feelings. Otherwise just being present is often enough, as is knowing when to give someone space.



  • Is her goal to make money? Or is it just an outing and a chance to socialise with people who share an interest? If the latter, then she may be getting everything she wants out of the experience so doesn’t see the need to change anything, in fact being more popular might be bad in that context. (Edit: just realised this is pretty much what one of the other replies asked, apologies.)

    Otherwise, and I’m no expert at this stuff by any stretch, but purely from a casual attendee’s perspective, location is really important. Don’t be in a corner where there’s hardly any foot traffic, and if you can, try to set up next to whatever booths are busiest at your events - for the ones near me that’d be things like coffee, ice cream, bakery etc depending on time of year. They are always packed, and food/drink booths usually have people with a few minutes to kill while they’re waiting for their order.

    If you have dozens of people milling about in front of your stall waiting for a coffee, the odds of someone spotting one of your products increases massively, and some of those may turn into sales.




  • By all means call out if I’ve misunderstood, but the tracking vulnerability isn’t that BLE (by design) makes devices visible to everyone within range, it’s that by binding an unclaimed device to an account you gain the ability to look up that device via Google’s service, rather than needing to be nearby - you can simply ask Google to call on its global network to find “your” device. In other words, there’s nothing stopping me from setting an alert when a given BT device is nearby, that’s spot on, but I can’t fire up Google to look up that device when I’m not nearby, or look up its location history.

    And yes needing to have never been connected to an Android device definitely reduces the victim pool, but (and to address the other reply) I’m guessing it’d mean devices that have only ever been connected to iOS, Linux, Windows etc aren’t “claimed” and can still be enrolled by the attacker. It’s not about default creds, only having used devices that don’t enrol with Google is enough, as it leaves the device available to claim.

    3.5mm ftw and all that, but I doubt all the parents of teenagers with potentially vulnerable devices will have much luck convincing their kids to switch!