Came here to say this, 73 from KB1OTE! Come join us at !amateur_radio@sopuli.xyz
Almost the same, but the RAV4 Prime plug-in hybrid. 50mi electric range, AWD, we almost never have to fill it and there’s free slow chargers in our town!
Pretty niche, but a citrus squeezer. I cook a lot of Asian food and it’s much better to put half a lime in the squeezer at a time than try and hand squeeze the juice out.
Supernote is the alternative I went with. They have a pretty responsive dev team and the cloud integration is optional, you can push stuff over the local WiFi network.
I returned my Remarkable 2 after a couple of days for a Supernote. Can do local network file transfer, and wifi screen sharing.
I always find this one hilarious: https://en.wikipedia.org/wiki/Emu_War
It weighs about 150lbs, I don’t go max speed on windy days, but it’s a nice ride
It’s a Huck Cycles Rebel
I work mostly from home, so no commute. I do pay for 2 days/wk at the co-working space either 7 or 30mi away (so 15-35min). I have an electric scooter that goes 65mph and an incredible view on my commute (see attached from Tuesday’s drive), so I enjoy it and the chance to be social with the people at the cowork space.
How do you like your carbon steel pans? I got one and despite following all the seasoning instructions it never releases food easily so I don’t use it very often.
I’ve had mine for almost 15 yr, same as you, still works like it’s new. I also have a Benchmade knife that I carry all the time that’s unmarred by time.
We got a Baby Bjorn carrier 2nd hand, and it’ll certainly go to another family, and another, and another…
Arrested Development
This is pretty misleading due to its brevity, an attacker on the same network can determine what website you’re going to but not the content being exchanged. A VPN moves the threat of having your browsing destination determined to the VPN provider from the local network.
That said, modern WiFi encryption does prevent other devices on the network from eavesdropping, so the attacker would have to employ a more involved attack (e.g. ARP spoofing) in order to even see the destinations.
It runs well enough in Windows Subsystem for Android!
I’m surprised not to see https://cryptpad.fr/ here, a FOSS, self-hostable E2EE web based office suite. Not as feature rich as GDocs but offers the basics in a more secure manner.
He has been stepping back from Signal over time.
Do you listen to risky.biz?
While Chromium itself is a very solid platform, and correspondingly Chrome is a hard exploitation target, it’s quite easy to screw up a fork of it. Comodo Secure Browser was a chromium fork that was fixed to an old version of the renderer with known security issues and was built to disable the sandbox. It also added libraries that were compiled without ASLR that worsened security for every application that loaded them.
Chrome has an enormous security team behind it in addition to P0, so bounties on Chrome exploits are around $500k. FF bounties are a fifth of that, which is probably a portion of less security, and a portion of lower target market. Brave could be doing terrible things that without an audit would be unknown. Web3 code is pretty terrible on the whole, so adding that to a secure base may not be great…
The Intel ones are quite a bit easier, but still not as easy as a PC. You need to disable some FW security settings to allow for a non Apple kernel to boot.