• 1 Post
  • 57 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle

  • Tesla Model Y owner here (never again, either). I hate the touchscreen, and also hate the way they’ve shoehorned functionality into the button/scroller controls on the steering wheel to try to address complaints.

    When I first got the MY, the only way to control things like the wipers was through menus in the touchscreen. A software update introduced the ability to control them from the steering wheel controls, but even that “solution” sucks. You have to press & hold the control down while simultaneously scrolling it with your thumb. And most times you can’t scroll it from all the way off to all the way on in a single motion, so you press, scroll as much as you can, release & press again then scroll the rest of the way. A real PITA.








  • Wary why? I work remotely in IT and manage a ton of Linux systems with it. Because my company has a large number of remote employees they limit us to Windows or Macs only, and have pretty robust MDM, security, etc. installed on them. Since MacOS is built on top of a unix kernel it’s much more intuitive to manage other unix & linux systems with it.

    Personally I haven’t used Windows really since before Windows 10 came out, and as the family tech support department I managed to switch my wife, parents, brother, and mother in-law all to Mac’s years ago as well.





  • IphtashuFitz@lemmy.worldtoPrivacy@lemmy.mlfixed
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 month ago

    I doubt it would help. My employer uses Akamai as a CDN & security provider for our websites. Their bot analysis tools regularly flag distributed bot activity that can come from a handful or a few thousand IPs. They do a range of browser fingerprinting, TLS fingerprinting, etc. to uniquely identify traffic across ranges of IP’s. I’m sure Google/Youtube has the ability to do this as well.

    Any given client would need to regularly randomize the order of headers in requests, randomly include/exclude optional headers, and also randomize TLS negotiation to try to circumvent all the fingerprinting these big corporations perform.







  • Play paintball.

    I started playing back in the 80’s when I was in college and everybody used paint guns that could only hold about 15 rounds, and fired one at a time.

    I’m way too old to run around in the woods like I did 40 years ago, and the game has completely changed as well. People have guns that can hold hundreds of paintballs and shoot incredibly fast, so the whole strategy is unlike it was. I just don’t find modern paintball enjoyable at all.



  • If you mailed in a ballot then there should be a way to confirm it was received, but there should NOT be a way to see who you voted for. Just like they can confirm that you voted in person, but again can not tell who you voted for when you showed up to vote.

    Typically when you vote by mail you receive a ballot plus two envelopes. You fill out the ballot and put it in the inner envelope that should contain no markings as to whose ballot it belongs to. This is put inside the second envelope that should have your contact information (my state uses a barcode for this) and that you have to sign.

    When the city/town clerk receives the ballot they look up your voter registration & confirm the signature on file matches the signature on the envelope. They then check off in their records that you voted by mail on that day. They take the inner envelope out of the outer envelope and add it to the other pile of envelopes they’ve received. At some later point they open those envelopes and count the ballots, but have no way of associating a given ballot back with the person who mailed it in.

    If you then try to go vote in person on Election Day (or somebody tries to impersonate you) then their records will show you already voted and you won’t be allowed to vote again.