@robbraxman Lunduke have a main page(lunduke.com) where he post links where people can follow. Maybe you should do one like this.
Something very basic that the average person does not care about even if they knew about it. Your every click on a website is tracked. Every single one. How does this work? Surprisingly easy enough to understand yet apparently no one wants to explain this.
There are ways around this for the privacy conscious but the mechanics of the tracking has to be fully understood.
A rant. The most irritating thing for those of us who are privacy conscious are comments like "what are you hiding?" or "as long as you follow the law who cares?" or "you're paranoid".
I'm sure I'm not alone on this. Well, if you get irritated by this, then there is nothing wrong with you. Ignore these NPCs but you also need a smart understanding of why you do need to care and why these NPCs are the ones who are wrong.
The intent to scan content to counter end-to-end encryption is no longer theoretical with the passing of the UK Online Safety Bill.
How would the OS makers then build in client-side scanning? Let's tackle a theoretical project to do this on your favorite operating system (Windows, MacOS, iOS, Android).
This would be how I would do it.
@robbraxman
I just finished to install openWRT on my router and I am thinking maybe something like that should be sold in your store.
Or even better routers with openWRT and wireguard configuration for bytzVPN, so when you buy it just plug it and you have bytzVPN for all devices from your house.
In my case I flashed 2 TP-Link routers with openWRT and believe this brand can be easy used for this purpose.
Flash ESP32(Nostr Signing Device) from Command Line on Fedora:
>>>> Install the pip3 package:
-> sudo dnf install pip3
>>>> To flash an ESP device from the command line on Fedora, you can use the esptool.py utility.
First, ensure you have Python 3 installed, as Python 2 has been deprecated. You can install esptool.py using pip:
-> pip3 install esptool
>>>> Choose the directory where you want to save the firmware:
-> cd <path_to_directory>
>>>> Get the code of nostr sigining device from Github:
-> git clone https://github.com/lnbits/nostr-signing-device
>>>> Go to the folder's firmware:
-> cd <path_to_directory_where_you_saved_the_code>/nostr-signing-device/installer/firmware/esp32/<selected-version-firmware>
>>>> Change the permission of the device
-> sudo chmod 666 /dev/<device-name>
(Ussually the device name begin with ttyACM)
>>>> Erase the Flash:
Use esptool to erase the flash memory of the device:
-> esptool.py --port /dev/<device-name> erase_flash
>>>> Then enter the next commands from terminal:
// reinstall ...