Show more

Services from Google and Facebook may appear to be "free", but there's a greater cost: your personal data and privacy. Thanks to BBC News for recommending ProtonMail as an Gmail alternative which protects your personal information & respects your privacy.

From HN discussion - "This is why I use ad blockers and a pi-hole server" (

This is GDPR in action. Wow.

Had a VHS tape converted to a DVD. Now I need to find a DVD player....

📼 ➡️ 💽 ➡️ Profit????

🚀 We're happy to be the first #VPN provider to #opensource apps on all platforms and undergo an independent security audit. Transparency, ethics, and #security are at the core of the Internet we want to build.

Really enjoyed seeing “1917” 👍👍🎥

Hey, two things are wrong in this picture. #1 I'm using Firefox 72, not 68.0, #2 I'm pretty sure 72 > 52

I do like the idea of having a phone that can just make calls and text, but also tether a laptop. I would definitely use that feature during my commute.

Show thread

I could see myself buying one of these "dumb" phones this year. I want to set a better example for my kids and not be on my phone all the time. My existing iPhone7 could be used as an iPod Touch while on wifi, which I'm sure I'd use just as much at home, or I could get an iPad which I feel is more explicit in its usage to act as a deterrent.


Each has their pros & cons unfortunately with no clear winner.

This is a very thorough analysis of the security principles and usability of various Two Factor Authentication systems:

The visuals in Avatar are still really good even after all these years since its release.

I think I would be sold on getting a @purism if it were to include USB-C. Love the form factor and styling.

I like the collection of technical leadership and management books I’ve been collecting. I’ve been donating old or outdated books to my local library, borrowing when I can and purchasing the ones not available. 📚📖

Saw “The Rise of Skywalker” last night. 👍👍

Really enjoying the “On The Metal” podcast by Oxide Computer. Brings back lots of good memories messing around and breaking computers back in the 90’s.

I also have a green “killer bees” deck that I like playing with. I was there was a good online way to play with custom decks on a Mac.

Show thread

Found a white “Magic: The Gathering” deck I copied onto a printed Excel sheet but never had all the cards. Bought the remaining cards from to finally complete it after 15+ years. No idea when I’ll actually play with it.

Replaced this mess of old HDMI and component cables with 10m of HDMI 2.1 8K ready thin cable.....for my NES classic. 🎮👾

Wow, some very interesting new research here:

Researchers published attacks that can recover encryption keys from Trusted Computing Modules (TPMs) (which isn't supposed to be possible) by timing elliptic curve signature generation. "On Intel fTPM, our key recovery succeeds after about1,300 observations and in less than two minutes."

Nearly all Windows computers store BitLocker encryption keys in TPMs.

Show more part deux