• 5 Posts
  • 320 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle










  • infeeeee@lemm.eetoPrivacy@lemmy.mlLocal Area FTP
    link
    fedilink
    arrow-up
    7
    ·
    14 days ago

    1.5 A for 10 h is 15000 mAh, at 12V. Current powerbanks can do that. Here is a redmi one, specs says it can do that, 20000 mAh, 12V is the maximum: https://www.mi.com/global/product/20000mah-redmi-fast-charge-power-bank/specs

    Buy an usb-pd 12V cable, one end of the cable is type c, the other end is standard dc coax. The cable has a chip inside, so it will always ask for 12V from the power source, it’s like 5 USD, I have one for a similar usecase, works perfectly. They work only if the source can send the required voltage, if a powerbank can only send 5V or 9V it cant convert it up to 12.

    It should look something like this, make sure the voltage is correct before buying:





  • And with SS7 they can get even more precise location, and you can’t really hide from that if you want to use a phone with a phone number, what is the point. This is an interesting way of attack, noone really thought about this before, but it’s not “oh-my-god everyone can be tracked via signal”. I guess the closest server doesn’t even selected via geographical distance, but much more depends on network infrastructure of your location, so Google Maps API can’t really help here.

    And again any VPN could defend against this, so if you want to hide which country you are in currently, it should be the 0th step to use a VPN.


  • infeeeee@lemm.eetoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    3
    ·
    22 days ago

    Was posted yesterday to a lot of communities, it’s very clickbait:

    allows an attacker to grab the location of any target within a 250 mile radius

    So it’s a bit rough… In Europe it means basically which country the target is in. Also cloudflare servers are not evenly distributed in the world, so resolution can differ wildly worldwide.

    With a vulnerable app installed on a target’s phone

    So it’s not really zero click.

    Sounds interesting though, nice writeup, but not as scary as it sounds from the title.





  • My offline android music workflow:

    • Server: Navidrome but any music server supporting Subsonic API would work here. Navidrome has a nice UI, and reads MusicBrainz IDs, and can scrobble to ListenBrainz, that’s why I settled with this.
    • Mobile app: Ultrasonic, on Fdroid. There are a lot of ways you can set up caching. I set up that it should automatically download everything from my “Now playing” playlist, at home on wifi I just add a bunch of albums and playlists to the “Now playing” list, it takes a while but it transcodes and downloads everything in a couple of minutes. It has very good Android Auto support, and a widget. Due to an annoying bug I had to downgrade to version 4.7.1, but otherwise I love it.