• 1 Post
  • 43 Comments
Joined 1 year ago
cake
Cake day: July 12th, 2023

help-circle
  • Technology has been solving problems people don’t have since… Always. No one had a problem listening to music from an 8 track tape, but that technology still died and we moved on. The truth is that an increasing majority of consumers either don’t care or even prefer wireless headphones. If you consider not having a headphone jack a deal breaker, then you’re not the market most phone manufacturers are after. Sorry to break it to you. Good news though, there are still several smartphone models that have a headphone jack. Buy one of those. Or get whatever phone you want and get a $5 adapter. Or just sit on the internet seething every time a new phone comes out without an increasingly niche feature. Up to you.


  • I kind of can’t believe we’re still having this conversation. It’s ridiculously cheap and easy to use wired earbuds with a modern phone if you want to. I got it back when it was just iPhones and Apple was selling lighting to 3.5 adapters for like $7k, but that’s obviously not the case anymore. If someone wants to hold on to their 5+ year old phone and run it dead, that’s great. More power to them. Doing it to avoid getting a phone with no headphone jack is a little silly at this point, though.

















  • I’m not super paranoid about security, but I do try to have a few good practices to make sure that it takes more than a bot scanning for /admin.php to find a way in.

    • Anything with SSH access uses key-based auth with password auth disabled. First thing I do when spinning up a new machine
    • Almost nothing is exposed directly to the Internet. I have wireguard set up on all my devices for remote access and also for extra security on public networks
    • Anyone who comes to visit gets put on the “guest” network, which is a separate subnet that can’t see or talk to anything on the main network
    • For any service that supports creating multiple logins, I make sure I have a separate admin user with elevated permissions, and then create a non-privileged user that I sign in on other devices with
    • Every web-based service is only accessible with a FQDN which auto-redirects to HTTPS and has an actual certificate signed by a trusted CA. This is probably the most “paranoid” thing I do, because of the aforementioned not being accessible on the Internet, but it makes me happy to see the little lock symbol on my browser without having to fiddle around with trusting a self-signed cert.