• 0 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: June 3rd, 2023

help-circle
  • Don’t have much personal experience with BX but they’re probably fine. But once you have backups of anything you care about the worst that can happen is you need to restore those backups. If its running a service you can’t do without then maybe a backup pi?

    I have RPis running on SD cards for years with no issues so realistically you probably won’t have any either but better to be prepared than not. And it also means that if you mess something up you can restore it to when it worked.



  • Do you want reliable, or do you want cheap? You must choose 1 from that list.

    If you’re not planning on putting anything critical on it and you’re doing backups, and you don’t mind being without its use for however long it would take you to replace it if it dies, pick anything.

    I’ve never had an SSD die on me Yet but I don’t buy cheap brands though I don’t buy top of the range and I usually buy at a good deal. Crucial MX has been reasonably priced in the past.









  • Rule 41 of the internet - there’s always a relevant XKCD comic.

    I’m not sure that the maths in it is correct - I know there’s some criticism of that in particular example but I think it holds up as long as you make it long enough and don’t just use common short words or common phrases. Its also bad if there’s a pattern to your passphrases e.g. only using colours, or sports team mascots, or all words of the same length, etc

    And where possible use MFA (unless it’s SMS based, then I wouldn’t bother - I suspect when businesses offer that they just want to collect your phone number and don’t care about security).


  • Just a slight correction - the old recommendation of using random chars, numbers, and symbols is no longer best practice as it causes more issues than it solves. New best practice is use long passphrase with minimum 16 characters but I’d recommend minimum 24 for future proofing. That sounds like a lot but “mary-had-a-little-lamb” is 22 chars and not hard to remember or type. Obviously don’t use exactly that password (since it’s mine & passwords should be unique 😉)


  • It’s still possible to prevent you wiping the phone with the sim in. Admittedly that would work most of the time but all that’s needed to change that is a someone watching the right YouTube videos and spreading the word.

    If your phone is encrypted and has the correct security settings then your data isn’t vulnerable. Unless it’s a government agency or something like an APT. If that’s the case there’s little you can do besides not keeping any valuable data on it.

    It’s unlikely they care about your data though. Not unless you’re wealthy enough to be bribed. The main concern for them is getting caught by tracking, depending on how much law enforcement cares.

    What makes you think I’m angry?



  • You keep asking people for proof but yet you provide none for your claims.

    You’re focusing (obsessing) about the wrong thing - you made up your mind as to what you think the solution is before you even asked the question and your rejecting the right answers because they don’t confirm to the answer you want to hear.

    If someone steals your phone, it’s gone. “Locking” the sim card slot will not prevent this. Make your peace with that.

    Sim card in or out, phones can be turned off. If the problem is as ubiquitous in your country as you suggest, law enforcement doesn’t even care that if they didn’t turn off the phone it does not matter. If law enforcement does care, they’ll start using other techniques (Faraday bags) as soon as people start getting jail time. Despite your assertion otherwise, not all criminals are dumb and the ones that are, are still smart enough to copy the ones that aren’t.

    You won’t be able to track them, you won’t get justice, the thief’s will make money, the world will continue to rotate just the same. Try addressing the problem elsewhere.