quite right, it’s the mk14 my bad
quite right, it’s the mk14 my bad
mk16 for DMR - why does this make it the worst?
nub
Looks like they typo’d “clit-mouse”
Twingate is another option if it’s just device to device networking and you trust all the devices that are in your network. It’s free for personal use and peer to peer so no issues with TOS if you’re streaming.
yes so you’re agreeing with me
Yup, but you have to think “how would malicious software/spyware/whatever get in our source code and if it does, how would we detect it?”
that’s where ISO and SOC II add value and give some assurance that detective, preventative and corrective controls exist and are working to prevent an issue.
If the company maliciously inserts back doors into closed source code and sells it like that, no amount of external audit is going to defend against that because they’ll just hide the code from the auditors.
the closest you’ll get is probably SOC II Type 2 or ISO 27001. While nowhere near perfect, those certifications validate that organisational controls such as change management, employee background screening, SDLC and production access controls functioned over the past 12 months. An external audit by an accredited specialist is required to obtain those certifications.
Tor operator here.
If you don’t have a second IP for your relay, don’t host at home. You will have CAPTCHAs everywhere, many sites will block you and your ISP will eventually contact you to stop degrading their IP space reputation.
Most website owners don’t discriminate between Tor exits and relays. They subscribe to block-lists that include all known Tor IP addresses. Major online services will make your browsing experience really shitty and once you’re a “known Tor IP” it will take months to remove that reputation.
You can run a Bridge instead, but you will eventually have the same problem.