

Good point about network availability and endpoints.
Good point about network availability and endpoints.
Since I have no patience, I’ll lay out some items for consideration.
1st, I wouldn’t rely on an ISP router to serve as my end point for a VPN. They likely have access to manage that device and it likely isn’t getting any updates. You are better off implementing it with your own equipment that you keep updated.
If you have a capable security device serving as your router to the external internet and you want full access to your internal network, then you might consider using a VPN that terminates at your router.
I myself am a fan of setting up a jump host and initiating a VPN connection directly to that host when using an agent based solution. Then you can monitor the host for activities, more easily keep your edge device patched, and then use the capabilities of your jump host to interact with the rest of your network. This would require either an agent to periodically poll a platform for connection requests or another form of ingress into your network.
Expand on your use case. Why/what do want to access on your local network when you are not there?
https://www.take2games.com/privacy/en-US/#1-categories-of-information-collected
You can read right there in the policy. Just scroll down till you see the categories of information collected. Let me know if you need me to take a screenshot and circle it for you as well.
They don’t need to collect all this data, see the list below. Some, yes, but the majority has nothing to do with the service offered.
Collected Data Types:
• Identifiers / Contact Information: Name, user name, gamertag, postal and email address, phone number, unique IDs, mobile device ID, platform ID, gaming service ID, advertising ID (IDFA, Android ID) and IP address
• Protected Characteristics: Age and gender
• Commercial Information: Purchase and usage history and preferences, including gameplay information
• Billing Information: Payment information (credit / debit card information) and shipping address
• Internet / Electronic Activity: Web / app browsing and gameplay information related to the Services; information about your online interaction(s) with the Services or our advertising; and details about the games and platforms you use and other information related to installed applications
• Device and Usage Data: Device type, software and hardware details, language settings, browser type and version, operating system, and information about how users use and interact with the Services (e.g., content viewed, pages visited, clicks, scrolls)
• Profile Inferences: Inferences made from your information and web activity to help create a personalized profile so we can identify goods and services that may be of interest
• Audio / Visual Information: Account photos, images, and avatars, audio information via chat features and functionality, and gameplay recordings and video footage (such as when you participate in playtesting)
• Sensitive Information: Precise location information (if you allow the Services to collect your location), account credentials (user name and password), and contents of communications via chat features and functionality.
The headlines leave out the part where this is a requirement of their security clearance. It is not uncommon for those holding a security clearance to be discouraged or prohibited from relationships with foreign nationals. It also isn’t a direct prohibition, it would just result in a loss of their clearance, and you are absolutely correct that this will result in more leverage against US personnel.
Let me clarify, I disagree that people should not be informed about jury nullification. Too many people forget that we grant our government power. One way we continue to enforce that power grant is by reserving the right to a trial by a jury of your peers. Too many people take that message to heart that they need to rule in accordance with the law.
I disagree, we also want people to nullify laws that are unjust, such as prosecuting a woman who decides to have an abortion. This is one of the means the people retain to fight tyranny.
Pass out red cards to inform individuals. https://www.ilrc.org/red-cards-tarjetas-rojas
Why not link directly to the article then instead of a Reddit post that links to an article?
A Reddit post is not an article.
165 degrees F is the temperature it takes to instantaneously kill 99.9 percent of salmonella. What also kills salmonella 99.9 percent of the time is cooking at a lower temperature for longer. It’s called pasteurization. The mod that deleted the previous comment about it being misinformation should restore that post. https://www.fsis.usda.gov/sites/default/files/media_file/2021-12/Appendix-A.pdf
I said modern programming languages. I do not consider C a modern language. The point still stands about abstraction in modern languages. You don’t need to understand memory allocation to code in modern languages, but the understanding will greatly benefit you.
I still contend that knowledge of the cpu pipeline is important or else your code will wind up with a bunch of code that is constantly resulting in CPU interrupts. I guess you could say you can code in assembly without knowledge of the cpu architecture, but you won’t be making any code that runs better the output code from other languages.
Assembly requires a knowledge of the cpu architecture pipeline and memory storage addressing. Those concepts are generally abstracted away in modern languages
Thank you both for a positive example of challenging someone’s post.
I’m guessing CF stands for cluster fuck.
Video shows three new origins plus the ability to have non-gestalt consciousness. New megastructures.
The 17th amendment tells them to eat shit. Not sure how they plan to write that legislation so it won’t be found unconstitutional.
I see texting as a method of asynchronous communication. I tell people, “If you need a fast reply from me, call, don’t text.”
It could be they just wanted to checkin and see how you were, not really looking to have a conversation. I think it really depends on what the opening text was.
A jump host is just a system that serves as an exit point into the restricted network. You can do this with Ubuntu desktop but you need to figure out how you are going to jump into your host. Others have mentioned tail scale and head scale as options for doing this. Tailscale would be an example of an agent based adhoc vpn solution; this would place a dependency on an external provider to host a connection broker service and use an agent that periodically checks into the broker service for connection requests. Headscale would be the self hosted option and you would need to forward a port into your network and you should guard it with a reverse proxy.