I stumbled across a project called pihole that makes a pi a hygiene proxy.
I ripped from it the logic that does the "bad guy" list maintenance which
includes some windows and apple spyware address ranges. A dynamic blacklist
would be the way to go in my opinion.
The system blackholes the dns
On Wed, Jun 14, 2017 at 9:07 AM, Kevin Cozens via talk
wrote:
> On 2017-06-14 06:49 AM, o1bigtenor via talk wrote:
>
>> don't want the stupid thing to be transmitting. According to the 'idiots'
>> selling the thing it will only transmit AFTER its been logged onto the
>>
On 2017-06-14 06:49 AM, o1bigtenor via talk wrote:
don't want the stupid thing to be transmitting. According to the 'idiots'
selling the thing it will only transmit AFTER its been logged onto the
companies 'cloud' (like I'm going to pay for insecurity!!). There seems
to be no understanding that
You could short out the antenna but that could burn out the transmitter
and things around it.
You could change the software on the phone and remove the code to start
up the cell transceiver.
If you remove the sim card then the phone will not login to any carriers
network and will not
On June 14, 2017 6:49:07 AM EDT, o1bigtenor via talk wrote:
>On Tue, Jun 13, 2017 at 11:21 PM, ac via talk wrote:
>
>> On Tue, 13 Jun 2017 13:25:28 -0400 (EDT)
>> "D. Hugh Redelmeier via talk" wrote:
>>
>> > | That way the control is what I
On Tue, 13 Jun 2017 13:25:28 -0400 (EDT)
"D. Hugh Redelmeier via talk" wrote:
> | That way the control is what I chose and the information I share is
> my own | security/privacy trade-off.
>
+1
> All systems other than Linux and other open source OSes (BSD,
> FreeDOS...) seem
| From: Alvin Starr via talk
| You can have either security or usability but almost never both.
Not always a direct tradeoff, but certainly often.
| I like devices that I can control from inside the perimiter of my own somewhat
| secured network.
I'e concluded that you need