

Yes, well stated. This is why I usually skip reading people’s comments. The vast majority see everything through their own agendas and just echo words they hear.
Just a techie guy running feddit.online to allow people to communicate, make friends and acquaintances. Odd coming from a happy introvert, right? (https://jerry.hear-me.blog/about)
I also own these publicly available applications:
Mastodon: https://hear-me.social
Alternative Mastodon UI: https://phanpy.hear-me.social
Peertube: https://my-sunshine.video
Friendica: https://my-place.social
Matrix: https://element.secure-channel.net
XMPP/Jabber: https://between-us.online
Bluesky PDS: https://blue-ocean.social (jerry.blue-ocean.social)
Mobilizon (Facebook Events Alt): https://my-group.events
and more…


Yes, well stated. This is why I usually skip reading people’s comments. The vast majority see everything through their own agendas and just echo words they hear.


It’s worse than you think. An IMSI catcher is not even needed to find out what phones are in an area:
Section 3.4.1: Presence Testing in LTE
https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks
Passive Presence Testing
The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).
RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area . In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.
There are descriptions in the article of other ways to find phones without using an IMSI Catcher or fake tower.
I’m on the Mozilla VPN which uses Mullvad and I don’t see a problem.


Coincidentally, there’s this post today about Yunohost: https://my-place.social/display/db471d1f-c06c03be288f78d7-ad573aef
@_elena@mastodon.social


Elena Rossini, well known for her help in growing the Fediverse, raves about Yunohost, https://news.elenarossini.com/my-year-of-fediverse-explorations/. You should be fine using it.
@_elena@mastodon.social


I’m glad you asked. This has been irritating me for a long time.


This tells me that you’d be in a lot of trouble if you lost your phone or had to wipe it because someone got into it. It’s probably good then that you’re now thinking about this so you can prepare for a time when you won’t have your phone for other reasons.
All sites supporting 2FA usually allow you to use a second method. Email is usually an alternative. Assuming that your email is your universal second OTP method, you just need to make sure you will always have access to your email account and you’ll be fine. So just solve for the OTP problem for your email account.
Pre-buy your burner phone and make it a second OTP device for your email account. For more assurance, buy a couple of physical keys (like Yubikey) that can be used with your email account. These can also be set up for some of your other accounts that support it, which may be more convenient than email when accessing them.


This better be an April Fools joke
Well said
I see no legitimate reason for not using a User Agent string, like all the other crawlers use, other than the desire to hide the crawler and make it difficult to block.
I don’t accept his explanation. I see it as gaslighting.
Yes, it’s worth it. I own mine for just the reason you give. You can take it to any other provider. And there’s no danger of the email provider deciding to close your account or cutting you off unexpectedly. Imagine losing your email access. At least with your own domain, you can switch it that same day to someone else.
Unsure about whois lookup privacy. My registrar hides my details as an option. Anyone looking up the domain just sees them as the contact for the domain.


You can go to https://hear-me.social and click on the register button. This puts up a Cloudflare managed challenge screen which endlessly loops when using Pale Moon. It would be interesting to see if Waterfox has the same issue.


I just duplicated this. I downloaded Pale Moon and went to https://hear-me.social and clicked on “Register”. It puts up a Cloudflare “managed challenge” which loops endlessly when using Pale Moon, but not the other browsers I’ve tried it with, including Zen, another Firefox fork.
It’s a problem, for sure.
I’m American. I just bought 12 eggs for $5. What’s this going on about?


Nope. Locked inside a VPC with only one VPS allowed to communicate with it.


I used a straight edge. They aren’t lined up.


Everyone is answering about wearing a mask, when the poster clearly makes the point that they don’t have one. They can’t just poof it from the air. The answers are not helpful.
The question is about whether shallow breathing and nose or mouth breathing is better. It’s a very particular question. An interesting question.
Does anyone know, with real scientific knowledge, what the answer to this specific question is? Can anyone answer to the specific question?
Depends on the application for me. For Mastodon, I want to allow 12K character posts, more than 4 poll question choices, and custom themes. Can’t do it with Docker containers. For Peertube, Mobilizon, and Peertube, I use Docker containers.