

import requests
theUrl = r’https://threatbutt.com/map/’
response = requests.get(theUrl)
print(response.text)


import requests
theUrl = r’https://threatbutt.com/map/’
response = requests.get(theUrl)
print(response.text)
Nokia 2780 is not bad. It runs KaiOS, supports tethering and 4G cell data. As long as you stick to the script on how you use the device it will have minimal privacy issues IMHO. If that is still not enough you can skip phones altogether and get a 4G dongle for your favorite Linux laptop/tablet and just use a softphone + voip service.


SSH and freeRDP are pretty reliable.
Smart phones are a bad idea. A simple, dumb phone to make calls, texts and occasionally tether your laptop, vehicle tablet to for data access are all you really need. Even the dumb phone should have physical switches for the radios and a battery that can be removed without any tools.
We need improved Linux support for power management on ARM platforms. In general Linux on ARM has been good for a long time now. (ex RaspberryPi, Gentoo, Ubuntu)
Where things aren’t so great is the choice in OEMs putting out ARM parts like Broadcom, Qualcomm and Apple. All of whom aren’t exactly open source champions. In a less imperfect world we’d have something like RISC-V with great power management and linux support available in mobile computing SKUs/TDPs.


KDE usually serves as a great DE for Windows refugees so I am very glad that it exists. Personally, I have not used it since v3.x. When v4/plasma made its debut the bugs were just a bit too much for me. It is a fairly complete overall ecosystem though in terms of "K"apps/utilities.


If your operation can be hacked by Clippy on Acid then it was not exactly Fort Knox to begin with.


Do not, under any circumstances, conduct any private business on it. What isn’t being logged by Microsoft and shared with your employer, advertisers, various governments will be screenshot’d every n seconds. Additionally, I highly suggest, if you haven’t already, to setup a separate VLAN for this device if you ever bring it home and connect it to your home network. Defender absolutely does passive sniffing and active network scanning now. It will also be collecting and logging visible SSIDs as well. Enjoy!


Wireguard should be the default here. The rest is just networking configuration implemented in both routing and firewall. I never understood why people use Tailscale, like why would you intentionally pay someone to be man in the middle of your virtual private network? Twingate I am not familiar with.


Except that Microsoft basically puts a gun to every users head to login with a Microsoft account which can/does backup the recovery keys.


BitLocker provides for a recovery key. This is to allow someone to regain access to an encrypted device in the event that they lose their PIN, any one of these scenarios happen, OR when suspects do not want to cooperate with LEOs.
Find your BitLocker recovery key
If the target device is part of an enterprise and managed with EntraId/Intune this is the option. Escrowed keys.


That’s weird. I was looking at this docs page and assumed that USB is how the update actually happened.


If all you need is basic paint-link functionality on Linux then you might like drawing. It is already in the Debian repositories too.
Dude … just install Debian(stable or testing) and then distro-surf using VMs in kvm/qemu. Just reading this all makes me tired for you.


Use a windows VM and then make sure that your hypervisor is properly passing thru the USB device/connection to the monitor to the windows guest vm. Not sure why you’d need a windows host OS for this.


Bloomberg can fuck off after what they did to Gamers Nexus recently. Zero credibility there.
Maybe it’s time to quit visiting places that don’t want you.
Agreed. Take the hint!
Reddit is an example of dead Internet theory, completely overrun with bots and Russian troll farms. Just move on.


I donate to Signal. I intend to increase my contributions to other open source (Linux) projects this year though. I expect them to need it more than ever soon.


Given that these same objecting companies have had tens of thousands of Indian developers, with source code access for iOS and Android, on their payrolls for decades now … I am not sure why they would suddenly be worried about this now.
Run XFCE and use Thunar. : )