Pokey succulent

  • 2 Posts
  • 4 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle
  • Your ISP controls what ports you can access using one or more firewalls and traffic control devices somewhere past the point where you connect to their network.

    They can block whatever ports they want. The only way around this is to use a VPN, which creates a tunnel directly from your device to a remote server to route traffic. This still goes through your ISP and whatever firewall they have but does so over a port that they (probably) don’t block. They can’t see what ports your web or network requests are using so they can’t block it directly.

    Depending on your technical know how and what type of router you have, you could set up a VPN at the device level (PC, phone, etc.) to send just requests from that device or at the router level which could send all traffic from your network through the VPN.

    It’s important to remember when using a VPN that the VPN servers can still see (and potentially log) all of your traffic, even if your ISP cannot. You still need to find a VPN service that you trust to not monitor your traffic.





  • Modal or bamboo underwear - soft, stretchy, silky, the solution to everything I hated about cotton underwear. They are usually more expensive than Walmart (or other box store) brands and take more care when washing, but to me are definitely worth it. You can find them for fairly good prices on Amazon if you don’t want to splurge on name brands, but you have to do the research and check the reviews. You can get them in boxers, briefs, and thongs for men and even more styles for women.


  • This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you’re doing is delaying or temporarily interrupting any data collection that’s going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

    Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you’re better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you’re relying on for “security”.