• 97 Posts
  • 2.81K Comments
Joined 2 years ago
cake
Cake day: August 15th, 2023

help-circle





  • If you did, the phone-home beacons are super easy to spot and block. Appliance manufacturers don’t think of their products as computers so they don’t bother to hide anything.

    On the flip side, it seems that laptop manufacturers think of their products as appliances, so they don’t even hide their beacons either.

    Spoiler: Acer ties it’s proprietary fan control drivers to"NitroSense" that loves to beacon home with your geo location and serial numbers. If you insert a random python webserver for it to connect to, it will just blurt out its API keys for the Acer CMS. Connecting back to their CMS manually allows you to inject as much shit data into their CMS as you want.








  • It’s also super inefficient. Comrade dipshit missed quite a few communities so it seems he can only ban based on communities I have commented in at one time or another.

    You would think that the free speech leader of the world could write a better mechanism to erase dissent.



  • It would require as much, or more, power to drown out a TV broadcast signal at the source. I believe many of the old towers were 200kW-1000kW so it would have taken one hell of a pirate signal if interfering close to the main source. However, RF follows the same principle as light using the inverse square law so the further you get from the primary transmitter, the signal quickly becomes exponentially weaker for any receiver.

    If you had a TV transmitter on a small hill that is a fair distance away from the target audience, like many were, splitting the distance with a directional antenna wouldn’t require nearly as much power from the pirate signal to overtake the original transmission.

    If I wanted, I could interfere with ham radio signals with as little as a watt of power (in my immediate local area) even though people might be communicating through a ham radio repeater that transmits at a couple of thousand watts that is many miles away. (It’s actually a permitted emergency technique to “break into” active conversations. Actually, other ham radio operators are familiar with what interference sounds like, even for signals that can’t fully overtake a transmission. It’s customary to stop the conversation if detected and wait for the “break”.)