I run systemd with a different sshd service port and that’s all I changed
I run systemd with a different sshd service port and that’s all I changed
What do you mean? You literally just change the /etc/sshd
config to point at a different port do you not?
That much I certainly remember and is easily verifiable, I wish I had a source for the musk support though.
The lady bird dev is a musk fellating tech bro
EDIT: I can’t remember where I learned this, but I swear someone on lemmy had shown some tweets that were showing support for the musk era changes and were in some way endorsing web3 garbage. Take everything anyone says on the internet with a grain of salt.
Seems like you’re talking about heat pump (technology) and I’m talking about heat pump (commercial product)
But yeah, heat pumps (technology) are used in lots of every day places.
And some companies even install AC only mini splits.
It is the exact same hardware running in different configurations, all that changes is refrigerant flow direction.
Yes, an air conditioner is a heat pump with a fixed orientation, what basically equates to a handful of valves to switch the direction of the refrigerant. The actual expensive parts that generate the temperature difference are identical between the two machines.
It’s literally the same machine
Yes because security researchers and hobbyists would never compare an isolated device to one plugged in next to a TV or in a crowded room, there just isn’t any data to support that anything like that is happening. As many other commenters have said, these devices are less complex than a cell phone and most people have no issues carrying one of those around. If one of your devices was “tapped” it would be that one.
Encrypted doesn’t mean magically violating the laws of physics, data uses bandwidth. There’s no reason for these devices to be using the amount of bandwidth it would take to make what you’re implying even close to feasible.
You realize it’s trivial to isolate and monitor traffic for a device on your network, right? Like this isn’t magic, we have the tools to check whether or not it’s physically possible for these devices to be exfiltrating 24h of audio a day based on the bandwidth they consume, and the variability in the transmitted data. There are free, fully sufficient tools to do this at literally every level of your home network, if these devices were actually recording all the time people would be noticing it and reporting on it.
No, plenty of well paying software internships.
That sounds unnecessarily painful
To put it lightly, the instance owner is sympathetic to grad and hexbear.