diaphragm w*rkplace

  • 2 Posts
  • 39 Comments
Joined 6 months ago
cake
Cake day: November 12th, 2025

help-circle




  • Noooo, don’t look at the bad, look at the good. We have this place and Gemini (the good one) to express ourselves.

    And besides, the title in this repost is a bit sensational. That specific captcha needs a phone with the Google app. You can just delete data + refresh until you get a different one. Nothing about specifically degoogled phones, people without phones are affected just as much. I am sure MicroG would work just as well (if not now, at least later). Also, ideally you should click the fuck away from recaptcha sites either way. Paradoxically, Google’s own sites don’t have it usually except the search but nobody needs that (at least anyone you would ask on here), DuckDuckGo + StartPage (OR SearXNG) is good enough.







  • Most compromised routers scrape the hostname (both regular and mDNS) and MAC address. What you do is disable mDNS related daemons like kdeconnect and avahi (until you want them) and put this in /etc/NetworkManager/NetworkManager.conf:

    [main]
    hostname-mode=none
    
    [device]
    wifi.scan-rand-mac-address=yes
    
    [connection]
    ethernet.cloned-mac-address=random
    wifi.cloned-mac-address=random
    connection.mdns=0
    connection.llmnr=0
    

    (yes, the mdns bit above is a bit redundant, but systemd has something related that might read it and better be safe than sorry)

    This won’t protect you if the router is a bit smarter and can see your NTP server (usually like “x.archlinux.pool.ntp.org” instead of just “x.pool.ntp.org”), your connectivity check (same as NTP) and other servers your machine connects to (like Tor nodes if you have the daemon running and oftc.net if you have an IRC client). The good news is that none are known to check that (at least to me).