I’ve never heard of LoRa. The marketing and whitepapers for HaLow specifically mention the things I did, for example https://www.wi-fi.org/discover-wi-fi/wi-fi-certified-halow
Aussie living in the San Francisco Bay Area.
Coding since 1998.
.NET Foundation member. C# fan
https://d.sb/
Mastodon: @dan@d.sb
I’ve never heard of LoRa. The marketing and whitepapers for HaLow specifically mention the things I did, for example https://www.wi-fi.org/discover-wi-fi/wi-fi-certified-halow
Not sure what you mean by “controlled” given it’s open-source?
That’s pretty good given (as far as I know) the main use case for HaLow is for low bandwidth, very low power use cases, like for IoT devices and other things you’d use Zigbee or Z-wave for today, including devices that run for years off a single button cell battery
Which OS?
On Android, Moon+ Reader is pretty good.
My wife uses the Amazon Kindle app on her Android tablet. You can use it for non-Kindle books by sending an email to a special email address for your Kindle account: https://www.amazon.com/sendtokindle/email.
Calibre is useful for this. It shows an easy to use “send to Kindle” button, and can convert books in ePub, mobi, etc formats to the format that works best in the Kindle app (AZW3).
If you want a web interface for Calibre (eg to run on a home server and download books when you’re away from your computer), Calibre-web works well.
But why deal with separate software like dnscrypt-proxy when AdGuard Home has it built-in?
A recursive DNS server and a local DNS cache/forwarder/are two different things with two different purposes. You will always need both.
Why do you need two separate ones though? Recursive DNS servers also cache responses. Usually the only reason you’d run a local forwarder/cache is if you’re not running a local recursive server.
Throw Unbound on there too as your upstream recursive resolver
If you want to run your own recursive DNS server, why would you run two separate DNS servers?
You don’t even need to worry about an encrypted session to your upstream anymore because your upstream is now your loopback.
Your outbound queries will still be unencrypted, so your ISP can still log them and create an advertising profile based on them. One of the main points of DoH and DoT is to avoid that, so you’ll want them to be encrypted at least until they leave your ISP’s network.
AdGuard Home is a better choice than PiHole since it uses DNS-over-HTTPS by default. There’s also an app called AdGuardHome-Sync to sync settings between multiple instances.
I’d recommend running two DNS servers, and at least one of those separately from the rest of your infrastructure like on a Pi. That way, if you need to pull one of them offline, the internet still works.
Surely you mean WS_FTP LE.
Their main product is a server that you run on a computer and lets you stream your own content.
It doesn’t necessarily need a click - it can be triggered by a keypress too (eg at my workplace we have a few internal pages where you can press a keyboard shortcut to copy a shortened URL for the current page).
It has to be something the browser considers a user interaction, meaning the user has expressed an intent to perform the action. That’s usually a button press or keypress.
but it can place text into the clipboard.
Only as the result of a user interaction, for example by pressing a button.
I set up voice recognition
This feature is extremely insecure now that there’s several AIs that can replicate voices. If a scammer calls you and you say a few words (like if you say “hello” and “sorry, I think you’ve got the wrong number”), a recording of that can be enough for them to replicate your voice.
This happened at my workplace. An attacker got into someone’s Schwab account by calling Schwab support and successfully getting past the voice verification, and attempted to transfer $100k (from a recent stock sale) out of their account. It took a bit of effort but they managed to get all the money back.
Schwab sent out a bulk email to everyone at my company saying they’re improving their security as a result, but I’m not sure if they’ve actually improved it. They’re still promoting this insecure feature.
I kinda understand it from the bank’s perspective… They need to reduce risk which is why a lot of banking apps check if the phone is rooted (if it’s rooted, how can you be sure that a malicious app with root access isn’t patching the app in memory and redirecting transfers to a different account?)
Having said that, I really don’t think they need to restrict it such that the app can only be installed through the Play store, as long as the app is properly signed and uses certificate pinning to prevent MitM attacks.
Public posts only… Not private posts. Honestly, if you ever post anything publicly on the internet (on any site, including here on Lemmy), you should assume it’s going to be used for all sorts of things.
I have no doubt that Lemmy posts are part of the data being ingested into AI training. Lemmy and other Fediverse apps are extremely easy to scrape since anyone can subscribe to a Lemmy community, Mastodon account, etc with ActivityPub and get all new posts and comments pushed to them. Don’t even have to actually scrape anything.
Android already has other apps stores, like F-Droid.
GOG model
wut? The main selling point of GOG is that games purchased from them are DRM-free.
So people that only have a computer and not a smart phone can’t do those things at all?
How many regular people would know that, though?
Clicking a button shows user intent, whereas a page load doesn’t. No user expects loading a page to overwrite their clipboard, but every user that clicks a “Copy to Clipboard” button does expect it.