• 0 Posts
  • 113 Comments
Joined 28 天前
cake
Cake day: 2025年10月3日

help-circle




  • One of my first IT jobs in the early 2000’s was managing customer DNS and e-mail boxes for a service provider. I would often have to kick start global propagation of a domain by adding nonsense to their url and removing it, forcing the domain to start propagation… a foo record.

    Now imagine having to check the url to make sure the change worked. Now imagine it was German shit porn. My lunch was ruined on multiple occasions.

    That wasn’t even the worst. We had a section of our run book that was all about contacting the FBI if what we found was bad, and sometimes it was.


  • Yeah, I have SO many rescue animals, it’s hard to explain to normal people. Multiple dogs with all sorts of problems, a few parrots, an angry hedgehog, two cats, and my vet’s first call to foster (almost anything). They are all well taken care of and clean but there’s a… smell.

    I’m also holding Balthazar, a bark scorpion, against his will for invading Pretty Kitty Pepper’s land. Balthazar is kept well and fed a steady diet of pinheads. When he eats, it looks like a dot matrix printer in reverse. That’s the one creature in the house most people freak out about the most, but they would all be wise to fear the parrots.

    Pretty Kitty Pepper for reference








  • I used to study in a cozy little cafe that was a row of houses turned into business. Next door was a bar that could get a bit rowdy sometimes. They had one of those jukeboxes with an app. I would load up Hotel California every chance I got. I could barely hear the music but I could hear the patrons groan every 30 minutes or so. One day the song option wasn’t there, so I switched to American Pie by Don McLean.

    I’m sure they hated me.



  • I’m speaking from the point of view of the app you gave permissions to collect your hardware data. Y’all are talking like I think a MAC is transmitted over tcp. I don’t need an intro to OSI. Those apps use the hardware data to know if you’re using Samsung, LG, Apple, etc and they store large databases of MAC addresses on individuals. They can even build a local hardware profile to see if you sold your device, to whom, and what device you replaced it with.




  • Unless they’re spoofing their MAC address, hardware fingerprinting is much more reliable and predictable. It’s easy to watch a MAC bounce all over the country/world in a matter of minutes.

    At this point in history, it’s too late to implement identity protections. Your profile is already built, stored, and backed up. They even know your deleted edgelord MySpace account and that you unfriended Tom (you monster). I guess if you were born in a ditch without a SSN, and never signed up for anything, not even a house/apartment, you could go under the radar.