If you use paper towels to clean your bed: Do your paper towels feel ‘papery’? If not they might be waxed.
If you use reusable towels to clean your bed: Do you use fabric softener? Don’t.
If you use paper towels to clean your bed: Do your paper towels feel ‘papery’? If not they might be waxed.
If you use reusable towels to clean your bed: Do you use fabric softener? Don’t.
I’ll second the thrift store suggestion. I picked up a Samsung BD-H5100 bluray player at the local FreeGreek for $5 and it has been nice to just pop a disc in and not worry about all the streaming shenanigans.
I’d say you might as well look for a bluray player. Second hand bluray discs are some times cheaper than the DVDs and sometimes the quality bump is nice. IMO, 4k bluray isn’t worth it. I’ve watched a few 4k blurays and while I can tell there’s a difference I’ve never felt myself missing the extra quality when watching a normal bluray.
Another option to consider is an old game console. Anything back to the ps3 has a bluray drive. (Though, not the xbox360, iirc? Also at one point Microsoft forced you to make an account and buy a license to watch blurays, so make sure that’s not a thing for any game console you consider.) And I know at least the ps3 had an official remote you could buy so you didn’t have to use a controller.
From a privacy perspective, all your options are the same as long as you don’t connect whatever you get to the internet.
I just pulled my Bangle.js 2 back out to play with making a better reminder system for myself. It works better than any of the other open source watches I’ve had with my GrapheneOS phone. The hardware isn’t open source as far as I know, but their mobile app (fork of gadget bridge) is, as are all the apps that run on the watch, and (I think?) the watch OS.


Check your state or country’s laws, you might not even need the contract amended. In the state that I live in any contract clause that tries to prevent you from doing any work entirely on your own time with entirely your own materials is explicitly unenforceable.
Plus if it’s just a small open source library (assuming your employer is sane) it’d be a waste of money for them to even ask a lawyer to write a letter to you, because why would anyone care.
If you really care about getting it right, you can find a local employment attorney and have them explain your local laws and edit and/or negotiate your contract for you. I did that once, but I felt like it was probably a waste of the $900 I paid. (I mean, it definitely was a waste in that case because that job was a nightmare and it only lasted 2 months, lol.)


It’s not even over USB by default. It’s an internal binary driver API. The USB part is a custom firmware for the ESP that exposes that api via USB that the people giving the talk wrote because it’s useful for pentesting / development of exploits for other Bluetooth devices.


Maybe we can find out for sure through the magic of the fediverse…
@antoniovazquezblanco@mastodon.social Is the “backdoor” mentioned in https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/ about what you shared in your RootedCON talk? If so, how worried should people using devices containing ESP32s be?


I mean, if it were a backdoor, the one thing you can be sure of is that the people who put it there wouldn’t be calling it a backdoor, ever.
Though, I think it’s worth pointing out that the while the security company’s blog calls whatever it is a “backdoor”, “backdoor” (nor “puerta” (though, I have no idea if that would be translated literally or to something else)) doesn’t appear in the the slides. So I’m going to lay that one at the marketing people trying to drum it up into something more impressive than it really is.


Huh, that is interesting. Though, that post doesn’t seem to have any info about what the backdoor is either.
Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. […] This discovery is part of the ongoing research carried out by the Innovation Department of Tarlogic on the Bluetooth standard. Thus, the company has also presented at RootedCON, the world’s largest Spanish-language cybersecurity conference, BluetoothUSB, a free tool that enables the development of tests for Bluetooth security audits regardless of the operating system of the devices. [Emphasis mine.]
Maybe the presentation has nothing to do with the actual backdoor?
Though, this part later might seem to imply they are related:
In the course of the investigation, a backdoor was discovered in the ESP32 chip, […] Tarlogic has detected that ESP32 chips […] have hidden commands not documented by the manufacturer. These commands would allow modifying the chips arbitrarily to unlock additional functionalities, […].
Which, best I can work out, seems to be talking about the information on slide titled “COMANDOS OCULTOS” (page 39 / “41”).
If the “backdoor” is the couple of commands in red on that slide, I maintain what I said above. If it’s not talking about that and there’s another “backdoor” that they haven’t described yet, well, then ¯\_(ツ)_/¯ we’ll see what it is when they actually announce it.
I fully acknowledge there may be something I’m missing. If there’s a real vuln/backdoor here, I’m sure we’ll hear more about it.


What is this article on about?
Here’s the actual presentation: https://www.documentcloud.org/documents/25554812-2025-rootedcon-bluetoothtools/
I don’t speak Spanish and only have the slides to go off of, but this doesn’t sound like a “backdoor”. This sounds like they found the commands for regulatory testing. To do emissions testing you need to be able to make the device transmit on command so that your testing house can verify you’re within legal limits on everything.
These are commands that can be given over USB. You know what else you can do over USB? Fucking anything, these chips have a JTAG USB device. (Now, if these are commands that can’t be turned off, that would be kinda bad, I guess? But still not really a super big problem. And I don’t see anything that implies that in the slides.)
[Edit: It’s not even that this is a “backdoor” in an internal peripheral interface. I think the “backdoor” is if you have software that exposes that interface somehow? Like you’re running an example that blindly copies stuff from an external UART to this interface? Like I think that’s it?]
The tone I get from the slides is more “hey we found this cool tool for doing Bluetooth stuff that doesn’t require writing embedded software”. Which, cool. But that’s sure not the point this article is trying to make.


- FOR PURPOSES OF THIS SECTION, “THREE-DIMENSIONAL PRINTER” MEANS A COMPUTER OR COMPUTER-DRIVEN MACHINE OR DEVICE CAPABLE OF PRODUCING A THREE-DIMENSIONAL OBJECT FROM A DIGITAL MODEL
Well, that’s a broad definition. I guess to whomever wrote that, a CNC mill is also a 3d printer.


I’d personally look for a used Prusa i3 MK3[S[+]]. Part of that is personal bias, it’s what I still print with (specifically the MK3S variant, I haven’t bothered to upgrade it to +), but in all the years I’ve had it it’s been an absolute workhorse and has very much thrived on the copious amount of neglect I’ve given it. The only things I’ve ever done to it are install firmware updates and occasionally smear some grease on the smooth rods with a finger. Still, every time I print with it, it just works.
Prusa just announced a new printer so there might be a little wave of them being put up for sale.
Edit: You mentioned that you want to print ASA, which AFAIK requires an enclosure. The MK3 is annoying to put in an enclosure because you have to move the power supply outside the enclosure. Though the printer that Prusa just announced is enclosed and is < $1000 (just) if that puts it in the “low-cost” category for you. https://www.prusa3d.com/product/prusa-core-one-kit-2/


I asked nicely why do I need to give my phone number and I was told that to register me as a member so I can get the discount.
I declined and said I don’t want to join and would like to just pay.
I’ve just said “I don’t have one” when asked this for awhile. This never seems the phase the cashiers, I’m guessing they know what that really means. Half the time I still get whatever discount, though I’ve never tried to sign up for a membership saying that.
If it’s an online form my phone number is just (local area code)555–5555. I’ve never had that not take, except for one case where it automatically enabled 2-factor auth and I had to create a new account.

This is just a guess, but I’d imagine that happens because the websites use JavaScript to load the actual content of the page, but Lemmy is just parsing the HTML that is returned.
Also, I really doubt you’d have much luck convincing website authors to completely change their architecture just to get previews to work on Lemmy.


[edit: To be clear, I assume the part that OP is not sure if it’s satire or not is “or switching to a more privacy-conscious browser such as Google Chrome.”] The emphasis in
Firefox is worse than Chrome
is in the original. To me that clearly implies that they are of the opinion that in general Google & Chrome are worse on privacy than Mozilla & Firefox. The comment at the end is just tongue in cheek snark alluding to the fact that in this particular case google did better for privacy in Chrome than Mozilla in Firefox.
or switching to a more privacy-conscious browser such as Google Chrome.


Definitely satire, the context from earlier:
- Firefox is worse than Chrome in their implementation of ad snitching, because Chrome enables it only after user consent.
You don’t use fabric softener or dryer sheets, do you? If you do, your cloth has a layer of wax on it that acts as a release agent on your bed.