

Choose a db you’re comfortable with, create structures in it that represent your files and their location in your filesystems, add more structures that represent metadata and then query it when you need to find things.
It’s what phones do.
Choose a db you’re comfortable with, create structures in it that represent your files and their location in your filesystems, add more structures that represent metadata and then query it when you need to find things.
It’s what phones do.
If you go to a website your phone reports its model number to that website. If it doesn’t then that website can (and often does) use javascript to figure out what model it is with, among other things, viewport size.
Unless you have taken the time to turn it off, your phones model is embedded in the metadata of the screenshot you took.
Before anyone takes action based on this post, consider critically weather your device and usage pattern merit concealing your phone model from people or other entities.
It’s also the ops bubble. My replies are generally directed at the op and their post.
I will also point to the requirement though, that us visa applicants give up social media account names or be subject to denial as evidence that it’s considered normal.
If it wasn’t considered normal to have social media then the cbp wouldn’t be so quick to implement that process.
If you’re in dadabots point me at the place to download the full 12hrs of no soul.
The ol’ sarcasm detectors’ flashing red, ringing the bell and pouring black smoke out of all the panel joints but yes: if you want to fit into society it’s important to have social media.
If you wanted to live a private life in the 1970s, would it be better to descend from your cabin hundreds of miles from civilization with a wild mane of shaggy hair wearing your homemade leather suit or with an unstylish but kempt haircut, nondescript jeans and shirt and military duffel bag looking like any other of the myriad characters wandering the roads at the time?
Obviously you’d want the latter. Part of privacy is blending in so that you don’t arouse interest.
Nowadays if you want to be a private person and still interact in society, like the op, you need to have all the trappings of a someone who doesn’t raise alarm bells. That includes, especially as your age drops, social media.
Social media is literally normal.
It has gone through a process called normalization in order to become an expected part of social interaction. The op even said that people expect them to have a particular type of account and they feel like not having one excludes them from having more friends.
Yes, you are normal if you have a social media account and abnormal if you don’t.
Anyone have any advice?
Yes: recognize what you’re trying to accomplish and change your actions.
Privacy requires shutting people out of your life. Meeting new people requires letting people into your life.
If people expect that the first “gate” into your life is your social media then meet that expectation. Have a social media presence. Post shit that you want people to see on it.
If you’re afraid of letting the companies that operate social media see your life, examine why. It may be that you’re perfectly fine with the trade off of a limited hang out in exchange for looking normal. Most people are.
It doesn’t have to be instagram. You could have a snapchat or a tiktok or whatever.
No, you can’t.
You are not the hero, effortlessly weaving down the highway between minivans on your 1300cc motorcycle, katana strapped across your back, using dual handlebar mounted twiddler boards to hack the multiverse.
If ai driven agentic systems were used to obfuscate a persons interactions online then the fact that they were using those systems would become incredibly obvious and provide a trove of information that could be easily used to locate and document what that person was doing.
But let’s assume what the op did worked, and no one could tell the difference.
That would be worse! Suddenly there’s hundreds of thousands of data points that could be linked to you and all that’s needed for a warrant are two or three that could be interpreted as probable cause of a crime!
You thought you were helping yourself out by turning the fuzzer on before reading trot pamphlets hosted on marxists.org but now they have an expressed interest in drain cleaner and glitter bombs and best case scenario you gotta adopt a new pitt mix from the humane society.
This isn’t a very smart idea.
People trying to obfuscate their actions would suddenly have massive associated datasets of actions to sift through and it would be trivial to distinguish between the browsing behaviors of a person and a bot.
Someone else said this is like chaff or flare anti missile defense and that’s a good analog. Anti missile defenses like that are deployed when the target recognizes a danger and sees an opportunity to confuse that danger temporarily. They’re used in conjunction with maneuvering and other flight techniques to maximize the potential of avoiding certain death, not constantly once the operator comes in contact with an opponent.
On a more philosophical tip, the masters tools cannot be turned against him.
The client saves them.
If you have a lot of crap in small files it might be time to stop depending on the directory structure to navigate and switch to a database.
Please stop. They accept cash, just use cash.
It’s been like this forever.
Idk how many postwar vacuum tube radios or amplifiers I’ve been in that don’t even have twisted pairs of wires running around the chassis. Twisting pairs of wire to reduce crosstalk and harmful emi is a technology that costs next to nothing and had existed for thirty years when they were manufactured.
Oh cool, a 70s sears guitar amp, surely this will have the incredibly easy and cost effective measures used in everything since marconi to ensure long service life!
Oh.
Iirc the ps5 needs to do a little dance with the optical drive to accept it but it’s been a while since I replaced one.
Are you making enough to become an apple certified repair shop or whatever they’re calling it now? It’s… uh… worth your time.
You gotta have a real not fake not on paper business and keep their shit secret though. A lot of hobby/student repairers and engineers just overlook that program because they’re working out of a spare room in their apartments or something, but if you can make the jump to a physical location and regular hours it’s a steady stream of work.
Make and model number and I’ll try to point you towards what you can do to fix it.
Computers are like cars. Any amount of money you’re looking to spend on a kia would be better spent on an older, higher mileage Toyota or Honda instead.
In this case, an older thinkpad (or other business class laptop) or mac would be an infinitely better purchase than a newer consumer grade laptop.
Oh fuck I didn’t actually answer your question! Sorry!
You want the two major private trackers for music. They both have active communities and all kinds of groupings of releases.
You have to have the cookie for squid dot wtf first. Go there.
You have two problems, curation and piracy.
Piracy is easy, get into a few good private trackers or download from YouTube or use soulseek (carefully!).
Curation is harder and if you don’t want to do it yourself you have to make friends with people who are into the same music as you or use the tools of feed based services like Spotify to dump into your piracy rube-Goldberg contraption.
It’s worth not doing the latter because you will end up failing the Dow Jones and the Industrials test if you just stick to only what the machine gives you because it’s what you like.
Go make friends with people and enjoy music, a collaborative hallucination unique to humanity, with them.
No (*actually yes).
It’s your round trip ping, how quickly your seeding device responds to some leeching devices request that determines weather or not you end up sending a chunk out to them.
Of course, aside from people on satellite every high bandwidth connection (measured in millions or billions of bits transferred per second) will also have lower latency (measured in increasingly small fractions of a second).
Your only option if you don’t intend to use a very peculiar and limited set of software on it or to write your own from the most terry Davis scratch imaginable is a macbook air or pro.
The m1 air is the cheap option, but for just 3-4 times more than the secondhand price of an m1 air you can get this years m4 air with a bunch of cores and ram. Don’t buy upgrades to the ssd on anything unless you know in specific articulable terms why you need it. Usbc/lightning are plenty fast.
All you will likely need is a base model with 16gb of ram.
What’s your budget and I can actually make a recommendation instead of just broad generalizations?
Oh yeah, you said cheap but what’s your actual budget?
I can make better recommendations if I know what you’re working with.
I didn’t know they fixed metadata on screenshots, good looking out!
I distinctly remember a time when most phones would pass their model in the headers. That may have passed though!
I gotta ask: where would you put “awareness of screenshot size uniqueness” on a continuum from insane schizo shit to reasonable private person?
I guess if there was a security flaw in your device then a screenshot could tell an attacker that you have the flawed device but there’s other, more subtle, ways a person could do that which don’t require that they acquire a screenshot somehow.
And I guess there is some platonic ideal of a private person who wants to share a screenshot, a literal pixel perfect copy of what’s on the screen on their device, but would also like to conceal the specific model from the person they’re sending the contents of their screen to.
It just seems like the kind of information cognizance of which would be useful in a vanishingly small number of scenarios.